Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
B Listings:  Result Page 1

B2B Collaboration: Assessing the ROI of Process Integration Business Value Research Series by  Sterling Commerce Manufacturing Solutions

March 01, 2008 - Business and IT leaders are under increasing pressure to improve B2B collaboration and the electronic communication capabilities of their organizations. This report looks at the key drivers for B2B collaboration in both the purchase-to-pay and...


Backup and Recovery for Microsoft Exchange Server - Data Domain Deduplication Storage Best Practices Guide by  EMC Backup and Recovery Solutions

May 08, 2009 - In many companies, Microsoft Exchange is now commonly viewed as a mission-critical application. Protecting Exchange information is critical and backup is still the primary method used. This paper focuses on the traditional backup and recovery practices for Microsoft Exchange Server along with solutions from Data Domain.


Bailing Out Your Budget: How Websense Lowers Your TCO by  Websense, Inc.

December 01, 2010 - The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership.


Bailing Out Your Budget: How Websense Lowers Your TCO by  Websense, Inc.

January 13, 2011 - The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the same time that the resources available to mitigate them are diminishing or, at best, remaining constant.


Balancing Social Networking with Network Security Objectives by  BlueCoat

March 04, 2011 - Social networking has achieved a level of popularity that requires reasonable access at work, but it is also sufficiently mature to bring value to many businesses. But safe social networking requires an aggressive and layered security strategy at the web gateway, as well as the definition of new usage policies and priorities from management and IT.


Ballarat Grammar Secures BYOD with HP Sentinel SDN by  Hewlett-Packard Company

August 31, 2013 - In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.


Battling Modern Botnets by  FireEye

April 28, 2008 - The FBI ranks cybercrime among its top priorities in part because botnets are proliferating at an alarming rate, crossing corporate boundaries and spreading infections behind corporate firewalls. Learn how FireEye provides advance detection and a blended approach to today’s botnet problem that "traditional" solutions do not.


Battling Modern Botnets in the Enterprise by  FireEye

September 01, 2008 - The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business.


Beating the Bad Guys: Strategies to Mitigate the Malware Threat by  RSA, The Security Division of EMC

November 23, 2011 - While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.


Beating Web Application Security Threats by  Thawte Inc.

March 18, 2010 - The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.


Become a social business on the cloud: IBM SmartCloud for Social Business collaboration services by  IBM

April 16, 2012 - This brief paper outlines a social business cloud solution that provides integrated e-mail, social business capabilities and third-party applications, all delivered through cloud computing. Learn how it offers a security-rich environment that will allow your business to become a social butterfly in addition to reducing costs and complexity.


Benefits of Unified Messaging in Exchange Server 2007 by  Global Knowledge

December 10, 2008 - Unified Messaging integrates different streams of communication (e-mail, fax, video, SMS, voice, etc.) into a single, or, unified message store, that is accessible from a wide range of different devices.


Best and worst practices for email archiving in Exchange Server by  Symantec Corporation

September 09, 2011 - Email administrators battle with Exchange Server maintenance and storage allocation while scurrying to meet stringent business plans and hunting down the CEO's lost email message. In this expert eguide from, learn how to store the right content in the right place for the right length of time.


Best and Worst Practices for Exchange email archiving by  Metalogix

March 29, 2012 - In this expert e-guide, discover the best and worst practices for email archiving, and review an essential checklist for ensuring that Exchange archives remain compliant.


Best Practices for Cloud Security by  Qualys

January 31, 2012 - In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.


Best Practices for Defining and Establishing Effective Archive Retention Policies by  Symantec Corporation

June 30, 2007 - Electronically stored information (ESI) has become a major source of business records, and any organization that uses ESI - from email to word processing to instant messaging - must manage those records. This paper explains best practices for establishing effective archive retention policies.


Best Practices for E-Mail Management by

October 24, 2012 - Access this expert e-guide to discover best practices for managing your organization's email and email servers.


Best Practices for Home Agents by  Avaya Inc.

June 01, 2008 - Employing home agents allows you to expand and improve your call center team. And they can be a form of insurance to keep your business running if disaster strikes. This white paper contains best practices for developing a Home Agents program.


Best Practices for Improving Mobile Data Security by

July 15, 2013 - This expert guide from takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.


Best Practices for Preventing Malware by

November 21, 2011 - Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.


Best Practices for Securing Exchange Email by  Perimeter eSecurity

November 10, 2011 - End-to-end security is as vital to today's businesses as email itself. Find out how you can achieve best practices in secure email utilizing an email hosting provider.


Best Practices for Securing Exchange Email When Using a Hosted Email Solution by  USA.NET, Inc.

January 01, 2007 - For SMBs and large enterprises seeking secure, affordable Exchange email hosting, USA.NET offers a comprehensive blend of best security practices and best-of-breed technology.


Best Practices for Windows Vista Planning, Migration, and Ongoing Management by  Symantec Corporation

March 01, 2008 - It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.


Best Practices For Your Threat Management Program by  IBM

November 26, 2013 - In this expert e-guide, industry leader Diana Kelley shares 5 exclusive tips on how to build successful threat and vulnerability programs. Click now to uncover these key features!


Best Practices In Document Management: Five Tests to Evaluate Cloud Enterprise Content Management (ECM) by  SpringCM

January 01, 2007 - Document management, either as a stand-alone technology or as part of a broader ECM initiative, enables an organization to effectively and efficiently control and leverage its content. This white paper will explore five tests to determine whether your organization can benefit from a Cloud ECM solution.


Best Practices in Instant Messaging Management by  Dell Software

October 01, 2008 - Instant messaging is a powerful tool, but is your organization protected from malware/viruses, reduced productivity and accidental transfer of sensitive documents? Read this paper to learn how to mitigate these risks.


Best Practices in Using Reputation-based Anti-Spam Services for Email Security by  IronPort Systems

February 09, 2009 - This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services.


BEYOND CLOUD...THE AGE OF THE CUSTOMER How the convergence of key tech trends is changing business forever by  IBM

September 13, 2013 - Explore how you can move your business beyond the cloud and into the way of future IT.


Beyond Passwords & Outdated Physical Access Systems by  Entrust, Inc.

August 31, 2012 - Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.


Beyond the Breach by  FireEye

June 04, 2014 - This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.


Beyond the Hype: Real-world APT Solution Testing by NSS Labs by  Fortinet, Inc.

April 07, 2014 - This resource provides a thorough analysis of the Fortinet FortiSandbox 3000D v1.2 breach detection system. It looks at aspects like the effectiveness, performance and TCO of the solution and finds it to be an effective way to detect breaches and breach attempts.


BIG-IP Local Traffic Manager by  F5 Networks

The BIG-IP® Local Traffic Manager is an application delivery networking system that provides the most intelligent and adaptable solution to secure, optimize, and deliver applications, enabling organizations to effectively and competitively run their business


BlackBerry Device Software v4.5 by  BlackBerry

October 01, 2008 - Upgrading to BlackBerry® Device Software v4.5 opens up a whole new world of features and functionality.


BlackBerry Enterprise Server Express by  BlackBerry

March 17, 2010 - By mobilizing email, calendar, personal information management, and your business applications, your company can boost business performance, increase productivity and enable workers to make timely decisions based on the most accurate information available.


Blackberry Enterprise Server for IBM Lotus Domino - Service Pack: 6 by  BlackBerry

February 25, 2009 - BlackBerry® Enterprise Server version 4.1 SP6 supports HTML and rich-content email messages for BlackBerry devices that are running BlackBerry® Device Software version 4.5 or later. IBM® Lotus® Domino® version 7.0.2 or later is required to support rich-content email messages on the BlackBerry Enterprise Server.


BlackBerry Enterprise Server for Microsoft Exchange by  BlackBerry

August 01, 2006 - The BlackBerry® services are designed to provide productivity tools—such as email, instant messaging, and personal information management (PIM) functionality—and data from enterprise applications to mobile users.


Blackberry Enterprise Server for Microsoft Exchange - Service Pack: 6 by  BlackBerry

February 25, 2009 - BlackBerry® Enterprise Server version 4.1 SP6 supports HTML and rich-content email messages for BlackBerry devices that are running BlackBerry® Device Software version 4.5 or later.


Blackberry Enterprise Server for Novell GroupWise by  BlackBerry

February 25, 2009 - The collaboration client that was previously named BlackBerry® Instant Messaging for Novell® GroupWise® Messenger is now named the BlackBerry® Client for Novell® GroupWise® Messenger.


Blackberry Enterprise Server v4.1 Service Pack 6 by  BlackBerry

August 25, 2008 - The BlackBerry Enterprise Solution provides push-based access to email; calendar, contacts, tasks and notes; instant messaging; web-based applications and services and enterprise applications.


BlackBerry Widget SDK Beta by  BlackBerry

May 24, 2010 - The BlackBerry Widget Packager v1.0 is a tool that allows web developers to package their web assets into BlackBerry Widgets.


Bloomberg Personal Vault by  Bloomberg

November 11, 2013 - Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.


BLS Telecom Improves Customer Support Management with Sugar Professional by  SugarCRM Inc.

November 08, 2010 - This case study discusses how in order to fight delayed resolutions of customer support issues, inefficient workflow management and decentralized data, BLS Telecom switched to Sugar Professional. Continue reading to learn how, with Sugar Professional, BLS telecom improved customer support management.


Blue Coat Reporter by  BlueCoat

May 14, 2009 - Blue Coat Reporter gives managers powerful visibility into all web-related user activity. Beyond URL filtering, Reporter provides customizable, at-a-glance dashboards and reports along with intuitive drill-down capabilities making it an invaluable part of security, compliance, bandwidth management, and other business critical efforts.


Blue Coat WebFilter by  BlueCoat

December 31, 2008 - Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.


BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving by  IBM

May 31, 2013 - This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!


Botnets at the Gate: Stopping Botnets and Distributed Denial of Service Attacks by  Imperva

March 10, 2011 - This paper attempts to lift the veil on botnets and the cyber-criminals behind them. It analyzes the history, growth, and economics behind botnets. It then investigates one of the most common attacks executed by botnets: the Distributed Denial of Service (DDoS) attack.


Breach Detection System Product Analysis by  Fortinet, Inc.

April 07, 2014 - This informative whitepaper discusses the effectiveness of one top-tier breach detection platform and how it can improve your security strategy.


Bringing System Management to Messaging & Collaboration by

April 24, 2014 - The fast growing interaction between email, collaboration and social media is creating new management pressures. Analysts Bernt Ostergaard and Clive Longbottom offer answers in this paper from Quocirca.


Bringing the Power of Web 2.0 to the Enterprise by  OpenText Corporation

May 09, 2008 - The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.


Bruce Silver & Associates: A Practical Approach to Enterprise Records Management by  EMC Corporation

August 01, 2008 - Enterprise records management (ERM) is an important initiative for many organizations today. Learn about the diversity of records management requirements at the enterprise level and why other solutions fail to meet these requirements.


BuilderMT Increases Customer Satisfaction from 66% to 90% in Less than a Year with Parature by  Parature, Inc.

February 01, 2008 - BuilderMT is the nation's leading provider of production management software for residential homebuilders, and has achieved wide notoriety and national awards for streamlining the workflow management process and improving the efficiency.


Building a Smarter Operational Response by  Bytware, Inc.

July 01, 2008 - Caught in a pinch of downsizing, restore IT productivity through automation.


Building higher IT business continuity in the face of disaster by  Dell Software

September 04, 2013 - In the past, one- or two-day outages were cause for concern. Today, an outage of a few hours can cripple your organization. It's not just your employees who are affected; partners and customers also link to your IT operation through email and database applications. Make sure you're up to date on operational continuity: Read the White Paper


Building Mobility into Your Network by  NETGEAR Inc.

October 11, 2010 - Business environments have become increasingly dynamic and have created the demand for unprecedented levels of workforce mobility. These demands for business mobility require networks and data to be securely accessible anytime and anywhere − throughout the office, as well as from remote locations. Read this white paper to find out more.


Building momentum: Symantec's new approach to security by  TechTarget

March 18, 2014 - Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth.


Building the Right Mobile Security Toolkit by

June 01, 2011 - Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.


Business Case for Integrated Unified Communications and Contact Center Solution by  ShoreTel

June 30, 2010 - In this whitepaper, discover how using unified communications (UC) in your contact center can help you increase effective communications between employees and clients, which will improve your customer satisfaction, retention, and loyalty rates.


Business Continuity and Resiliency Services from IBM: Strengthen Your Business with Cloud Computing—Delivering Greater Resiliency and a More Globally Accessible Environment by  IBM

May 15, 2009 - Cloud computing can simplify scalability to improve business resiliency and flexibility. Read this paper to discover how cloud computing combined with IBM continuity and resiliency services can improve the efficiency of your infrastructure while also improving your business continuity.


Business Reimagined by

June 28, 2013 - Reimagining business is about waking up to a new environment based on technology that liberates rather than constrains, writes Dave Coplin.


Business Together with Microsoft: the unified communications and collaboration solution of Orange Business Services and Microsoft by  Orange Business Services

July 20, 2009 - With the momentum of IP convergence and the movement toward an all digital world, professional communication systems combining telephony over IP, e-mail, instant messaging and audio/video conferencing services are sparking serious interest due to the benefits they offer. Read on to learn more.


Business Value Analysis Study: Citizens Business Bank by  Symantec Corporation

March 09, 2009 - As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found.


Business-Class Security and Compliance for On-Demand Instant Messaging by  WebEx Communications, Inc.

December 01, 2006 - Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM.


Buyer's Criteria for Advanced Malware Protection by  Sourcefire

April 07, 2014 - This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.


Buyer's Guide to Antimalware by

March 16, 2011 - Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.


Buyer’s Guide to Antimalware by  AVG Technologies USA, Inc.

November 20, 2009 - Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.


Buyer’s Guide to Antimalware by  Panda Security

October 27, 2009 - Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.


BYOD Financial Assessment Tool by  Cisco Systems, Inc.

November 13, 2013 - This exclusive resource allows you to assess the incremental value from implementing a BYOD policy more strategically in your business.


byREQUEST®: Automatically Sweeps Files into Sharepoint by  Hillary Software

July 21, 2009 - From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts