Email Security Hardware Reports

Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jan 2018

TechTarget ComputerWeekly.com

CW EMEA: Investing in the future
sponsored by TechTarget ComputerWeekly.com
EZINE: There is a lot of uncertainty in the world right now, and businesses might be forgiven for taking a cautious approach to their planning. But one thing is certain, and that is that oil-rich countries in the Middle East will continue to invest heavily in diversifying their economies.
Posted: 23 Jan 2024 | Published: 23 Jan 2024

TechTarget ComputerWeekly.com

SIEM, SOAR or both? Our security experts weigh in
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we turn to the Computer Weekly Security Think Tank, a hand-picked panel of cyber security insiders, experts, analysts, and advocates with over a century's worth of collective experience between them, to explore the topic of Security Information and Event Management (SIEM), and Security Orchestration, Automation and Response, (SOAR).
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

Top 10 IT security stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 08 Feb 2021 | Published: 09 Jan 2019

TechTarget ComputerWeekly.com

Uptime Software
sponsored by DellEMC and Intel®
CASE STUDY: Learn how uptime software has improved customer service through virtualization. uptime is now able to rapidly deploy virtual machines to replicate customer environments and close support requests quickly.
Posted: 19 Sep 2008 | Published: 19 Sep 2008

DellEMC and Intel®

Information Security Magazine, July 09: Controlling Privileged Accounts
sponsored by Information Security Magazine
EZINE: This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
Posted: 13 Jul 2009 | Published: 13 Jul 2009

Information Security Magazine

Dell PowerVault MD3000 1000 Mailbox Local Continuous Replication Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 1000 mailbox Exchange Server 2007 environment with Local Continuous Replication (LCR) feature.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Increasing Business Performance: Using Virtualization for SAP Applications on IBM System p Servers
sponsored by IBM
WHITE PAPER: This white paper captures the experiences of six large companies running SAP applications using IBM® System p™ virtualization.
Posted: 17 Jun 2008 | Published: 16 Jun 2010

IBM

Products of the Year 2006
sponsored by Information Security Magazine
JOURNAL ARTICLE: As spyware becomes increasingly prevalent, antispyware tools are becoming more a necessity than a luxury.
Posted: 10 Aug 2006 | Published: 01 Feb 2006

Information Security Magazine

NetBackup Disk Based Data Protection Options
sponsored by Symantec Corporation
WHITE PAPER: This paper explains the disk options and their capabilities as well as the other new features in NetBackup 6.5 that make up the Enterprise Disk Foundation, also it provides guidance in choosing the appropriate disk options for your environment.
Posted: 03 Jun 2008 | Published: 01 Oct 2007

Symantec Corporation