Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
0-9 Listings:  Result Page 1

10 BYOD Financial Insights by  Cisco Systems, Inc.

November 12, 2013 - This exclusive paper analyzes a survey of more than 2,400 users across 18 industries and 6 countries, discussing BYOD's financial impact and the effects that the trend is having on business as a whole.


10 Cool Things Your Firewall Should Do by  SonicWALL

November 18, 2008 - This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.


10 Easy Steps for Email and Web Best Practices by  Symantec Hosted Services

November 01, 2006 - Misuse and abuse of email and Web servers can create costly legal, regulatory, security and productivity risks for organizations. Read this paper to learn 10 best practices for maximizing compliance and minimizing email and Web risk in your org...


10 Network Security Tools and Tests Everyone Should Use by  Global Knowledge

April 14, 2014 - This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.


10 Questions to Ask Before You Buy an Anti‐Spam Solution by  WatchGuard Technologies, Inc.

October 20, 2010 - With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.


10 Reasons Your Existing Security Information and Event Management Isn't Good Enough by  eIQnetworks

February 02, 2009 - "Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available.


10 Steps to Email Security by  Clearswift

August 12, 2013 - This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.


10 Steps to Establishing an Effective Email Retention Policy by  CA Technologies.

January 23, 2009 - Building a well-planned, enterprise-wide email retention policy helps establish uniform and consistent rules for all email and electronic records.


10 tech tips for empowering proactive data center management by  VMware, Inc.

March 12, 2013 - This whitepaper features 10 tips for improving the management of your VMware virtualized environment.


10 Things Your Next Firewall Must Do by  Palo Alto Networks

March 24, 2011 - Users continue to adopt new applications and technologies – and the threats carried by them. In some organizations, obstructing the adoption of new technologies can be a career-limiting move.


11 Myths about Microsoft Exchange Backup & Recovery by  AppAssure Software, Inc.

July 01, 2008 - This paper provides us with the 11 Myths about Microsoft Exchange Backup & Recovery and, how can we overcome them with careful planning and the right toolsets.


11 Steps to Successful Lead Nuturing by  LeadLife Solutions

July 10, 2013 - Access this insightful resource to discover the 11 steps to a successful lead nurturing program, so that you can maximize sales opportunities and build better customer relationships.


12 things effective intrusion prevention systems should do by  Dell Software

October 19, 2012 - Do you know what to look for in an intrusion protection system? Read our e-book, "12 Things Effective Intrusion Protection Systems Should Do," and learn to detect and block the latest generation of exploits used to attack computer systems and resist the most sophisticated evasion techniques.


15 Minutes to a Secure Business: Daily Practices for IT Security Management by  McAfee, Inc.

December 02, 2008 - Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall.


2010 Threat Report by  Websense, Inc.

January 11, 2011 - Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats.


2010: Cybercrime Coming of Age by  ESET

January 01, 2010 - In this paper you'll read that cybercrime is on the rise, not only in terms of the number of perpetrators and the volume of crimes committed, but also in terms of the range of techniques employed to carry them out.


2011 Second Annual Ponemon Cost of Cybercrime Study by  ArcSight, an HP Company

August 31, 2011 - This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organization determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.


2012 - Endpoint Security Best Practices Survey by  Symantec Corporation

September 06, 2012 - Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.


2012 Bit9 Cyber Security Research Report by  Bit9, Inc.

May 23, 2012 - Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers.


2012 Endpoint Security Best Practices Survey Results by  Symantec Corporation

April 08, 2013 - This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.


2012 Security Outlook by

February 24, 2012 - This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.


2013 Cost of Cyber Crime Study: France (Ponemon Institute Study) by  Hewlett-Packard Limited

October 28, 2013 - In this extensive case study by Ponemon Insititute, explore key findings from 27 French organizations from different business sectors, and how they suffered from significant economic damage after falling victim to cyber-attacks.


2013 Cost of Cyber Crime – UK, France and Germany Findings by  Hewlett-Packard Limited

October 31, 2013 - Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.


2013 Cyber Risk Report Executive Summary by  Hewlett-Packard Company

February 28, 2014 - This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014.


24 Questions to Take the Migraine Out of Email Migration by  Intermedia.Net

February 10, 2014 - This whitepaper features 24 questions you should ask as you try to select a service provider to execute your Exchange migration to the cloud.


3 Best Practices for Reducing Exchange Downtime by  AppAssure Software, Inc.

March 02, 2009 - Although there are many e-mail platforms available, Microsoft Exchange is by far the most dominate with a commanding 65-percent share of the overall market. This eGuide explains the three best practices for reducing Exchange downtime and teaches how to proactively approach disaster recovery for Microsoft Exchange.


3 Strategies to Protect Endpoints from Risky Applications by  Lumension

September 10, 2010 - Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.


3-2-1 Contact: The Call Center in a Multichannel World by  SearchCRM

April 18, 2014 - Learn how mobile apps are changing how agents interact with customers -- and how some companies are integrating mobile CRM with the contact center.


4 File Sharing Workarounds That Should Worry CSOs by  GlobalScape

April 10, 2013 - This resource reveals the top 4 file sharing workarounds users are resorting to when organizations don't provide a scalable or easy-to-use resource for large file exchanges.


4 Leading DDoS Protection Strategies by  Verisign, Inc.

December 31, 2013 - This guide explores various ways you can prevent DDoS attacks from harming your system and helps you decide which is best for your system.


4 Questions to Ask When Evaluating Network Security Solutions by  WatchGuard Technologies, Inc.

August 21, 2013 - This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.


4 Stages of Integrated Document Delivery from SAP by  STR Software

April 15, 2009 - This paper is intended to educate users, developers, managers, and executives of companies using SAP, on the efficiencies gained from an integrated, automated document delivery system.


5 Steps to Automating Accounts Payable by  Kofax, Inc.

February 03, 2009 - This white paper proposes a 5-step approach to automate an accounts payable operation, describing the typical costs of processing invoices manually and the saving that can be achieved with each of the incremental steps.


5 Steps to Get Your Team on the Same Page - An Introduction To QuickBase by  Intuit QuickBase

July 01, 2005 - In 30 minutes, we'll introduce you to QuickBase, the leading, hosted workgroup application platform.


5 Steps to Reducing Downtime: Best Practices for Windows Server Application High Availability by  Marathon Technologies

September 28, 2009 - This white paper discusses five steps for protecting Windows Server applications from downtime, offering established best practices to reduce potential single points of failure and ensure rapid recovery or continued operations in the event of failure.


6 Questions to Ask About Your Data Storage-Emily Wojcik byline for ILTA Peer to Peer Magazine by  CommVault Systems, Inc.

December 31, 2013 - In this quick 1-page article, 6 questions are provided to help hash out what data is necessary to store, and what will only add clutter. Read on to discover how your organization can reduce long-term storage costs and improve records management by simply asking the right questions.


6 Reasons Why Software-Based Encryption Doesn’t Stack Up by  MXI Security

April 30, 2010 - Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations.


7 Keys to Making or Breaking Your Exchange Infrastructure by  Dell Software

December 31, 2012 - If you're looking to optimize your email server or Exchange infrastructure, here are seven key steps that will guarantee success.


7 Measures of Scalability for your Next-Generation Firewall by  Dell Software

August 23, 2013 - Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.


7 Requirements of Data Loss Prevention by  Symantec Corporation

March 10, 2009 - This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.


7 Steps to Improve Your Conversion Rates Now: The Do’s and Don’ts of Lead Nurturing & Lead Management by  LeadLife Solutions

July 10, 2013 - Discover best practices to identify your most likely buyers as well as the automated tools you need to accelerate projects throughout the entire buying cycle. Also, learn the seven steps you can take to improve lead progression rates and avoid stalling late in the sales cycle.


7 Ways to Optimize Project Team Productivity: Using Customizable Web-based Software to Your Business Advantage by  Intuit QuickBase

November 14, 2008 - This paper explains seven ways that we can optimize project team productivity with customizable, Web-based project management applications, by taking advantage of easy-to-learn, easy-to-use software.


7 Steps for a Successful GroupWise Migration to Exchange 2010 and BPO by  Dell Software

October 26, 2010 - In this new white paper by Quest Software, learn seven steps for a seamless migration from GroupWise to Exchange 2010. Discover Exchange 2010’s key features, and read about the challenges you face when planning your migration.


8 Point Plan to Eliminate PST Files by  C2C Systems (UK)

May 20, 2014 - The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.


8 Problems of Keyword Search in E-Discovery - A Guide for Fortune 1000 Companies by  FTI Technology

December 18, 2009 - With data collections growing at an epic pace, legal teams must sift quickly through documents and e-mail at rates that would have seemed unrealistic just 5 years ago. Simply put, keyword search strategies break when thrown against the mountains of data which define today’s legal matters.


8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies by  FTI Technology

November 04, 2009 - In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set.


8 Seconds to Capture Attention: Silverpop's Landing Page Report by  Silverpop Systems Inc.

August 01, 2008 - It's estimated that up to 50 percent of visitors to landing pages will bail in the first eight seconds. This evaluation explains how putting more effort on nurturing recipients once they hit those landing pages would be time and money well spent.


Antimalware: RFP Technology Decisions Guide

April 18, 2012 - <p>Part 2 of's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs. </p>


 CIO Strategies for Consumerization by  Dell, Inc. and Intel®

December 23, 2011 - New technology and the expanding role of the Internet are forever changing social relationships, management philosophies, and business models around the world. Access this white paper for insights into current mobile computing trends and recommendations for making the most out of these trends in the enterprise.


 Safer web browsing in four steps by  Sophos, Inc.

October 04, 2010 - Accessing the web poses enormous risks, yet you can’t afford to be isolated from the internet and its resources. This white paper examines the latest web threats, and recommends four best practices and a layered approach that enables your users while also protecting your organization’s endpoints, network and data.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts