Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
D Listings:  Result Page 1

Data archiving software helps cancer institute store medical data by  HP & Intel®

May 14, 2013 - This e-guide from explores the path of Roswell Park Cancer Institute, as they invested in a tool that allowed them to store and archive medical images and other data while meeting HIPAA guidelines while solidifying their disaster recovery and business continuity efforts.


Data Breach Detection and Response by  Hexis Cyber Solutions Inc

May 22, 2014 - This informative resource explores the changes in data breaches and outlines a strategy for incident response.


Data Deduplication with the PowerVault DL2000 - Powered by CommVault by  Dell, Inc.

January 30, 2009 - IT Departments today are facing an explosion in the amount of data they have to manage, backup and restore. In this videocast, learn how data deduplication can help address the problems of redundant data and reduce storage disk storage requirements.


Data Exchange & Event Processing for Oracle EBS by  STR Software

October 19, 2010 - Oracle E-Business Suite users can now control the transfer and processing of data from within the familiar EBS forms interface.  In this short video you will experience how a standardized process allows EBS users to become self-sufficient in the transfer of data to and from EBS and other systems, internally and externally to your IT environment. 


Data Loss Prevention from the Inside Out by  Cisco Systems, Inc.

June 26, 2008 - In this Techwise TV episode learn about data loss prevention and the three primary loss vectors that you must assess for your organization.


Data Loss Prevention Requirements Roadmap by  CA Technologies.

April 14, 2009 - The technologies that aid a successful company in sharing digital information and maintaining swift communications also leave companies vulnerable to a variety of security risks. Read this paper to learn how a comprehensive data loss prevention solution can protect your company's sensitive data.


Data Loss Prevention: Email and Web Gateway Best Practices by  M86 Security

October 07, 2010 - This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them. Read this paper to learn more about single-channel DLP at the email and Web gateways.


Data Loss Prevention: Keep Sensitive Data-In-Motion Safe by  WatchGuard Technologies, Inc.

February 24, 2011 - In today’s business environment, media headlines are increasingly featuring data breaches of large magnitudes that put people’s personal information at risk, and no country or industry is immune.


Data Protection Solutions at Midsize Organizations by  Trend Micro, Inc.

February 01, 2008 - In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.


Data Protection: Solutions for Privacy, Disclosure and Encryption by  Trend Micro, Inc.

July 15, 2010 - Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.


Data Sheet: Sunbelt Exchange Archiver by  Sunbelt Software

October 01, 2007 - This white paper explains how a comprehensive email archiving approach can help administrators relieve storage pressures off Exchange servers and streamline backup while achieving compliance with regulations.


Datalink's White Paper Library by  Datalink Corp

May 06, 2010 - Welcome to Datalink’s White Paper library. Inside you will find valuable data expertise - from an objective perspective. Here, you can find the information about the latest storage trends, relevant data topics, and new strategies to store, manage, and protect your data.


DDoS Attacks Reach Critical Levels: How to Proactively Combat Network Threats by  Verisign, Inc.

December 31, 2012 - This paper draws on Verisign's DDoS mitigation expertise to examine the threat of DDoS in the context of IT availability and enterprise risk management.


DDoS Attacks: 5 Steps to Prepare by  Verisign, Inc.

December 31, 2013 - This helpful guide provides a number of considerations for your company to look over prior to a distributed denial of service (DDoS) attack in order to get your site back up and running as quickly as possible.


DDoS Malware: Strategies for Mitigation by  Verisign, Inc.

December 31, 2013 - This technical brief covers DDoS-enabled malware and several DDoS-specific tools, their capabilities, and the network indicators they generate while performing attack methods.


DDoS Mitigation and DNS Availability: Key Components of Your Resiliency Strategy by  Verisign, Inc.

December 31, 2013 - This white paper provides enterprises with a list of recommendations for ensuring resiliency and minimizing risk in the event of a DDoS or DNS attack.


DDoS Mitigation: Best Practices for a Rapidly Changing Threat Landscape by  Verisign, Inc.

December 31, 2012 - This guide explores one company's set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations.


DDoS Prevention: Time for "Defense in Depth" by  Fortinet, Inc.

April 24, 2014 - This informative guide provides you with key strategies to prevent DDoS attacks and outlines what you can expect in the coming years.


Death and Taxes...and Hackers by  Imperva

April 01, 2011 - View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.


Debunking the Top 5 Misconceptions about Data Protection by  Lumension

May 01, 2008 - Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.


December Storage Mag 2013 by

December 06, 2013 - In the December 2013 issue of Storage magazine, we make our predictions for 2014 storage trends, reveal the winners of our latest Quality Awards survey for tape libraries and much more!


Deep Defender Blogs by  Intel

October 03, 2012 - Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.


Deep Defender Demo Video by  Intel

October 03, 2012 - Cyber criminials have begun to design malware that can infiltrate security. View this informative webcast to learn more about what you can do to eliminate vulnerabilities and prepare for potential attacks. Stay ahead of criminals by viewing this resource now


Deep Security 7.5 by  Trend Micro, Inc.

September 15, 2010 - Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.


Deep Security as a Service: Cloud Security for Amazon Web Services (AWS) by  Trend Micro

December 16, 2013 - Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.


Defeating Advanced Persistent Threat Malware by  Infoblox

January 31, 2013 - How can you protect your organization from APT Malware?  Read this whitepaper to learn why a DNS Firewall implementation is a MUST for your organization and how the Infoblox DNS Firewall may be the industry's first true DNS security solution.


Defending Against APTs: Do You Have the Complete Picture? by  Hexis Cyber Solutions Inc

July 17, 2013 - Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.


Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks by  IBM

January 31, 2014 - This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.


Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks by  IBM

January 31, 2014 - This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.


Defending Systems on a Wide-open Network with Symantec Endpoint Protection by  Symantec Corporation

July 02, 2012 - Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.


Defense Against the Dark Arts: Finding and Stopping Advanced Threats by  Proofpoint, Inc.

October 29, 2013 - Learn critical information about today’s advanced threat landscape and what you need to do to stay secure.


Definitive Guide to Exchange Server 2010 Migration: Chapter 1: Under the Hood of Exchange Server 2010 by  Dell, Inc. and Intel®

May 20, 2011 - Migrating to Exchange Server 2010 from the 2007 edition is becoming a must, as the 2010 edition offers improved email archiving, high-availability, and optimal storage features. But as you begin to explore the possibilities of upgrading to Exchange 2010, do you have a proper plan in place?


Definitive Guide to Exchange Server 2010 Migration: Chapter 1: Under the Hood of Exchange Server 2010 by

May 20, 2011 - Migrating to Exchange Server 2010 from the 2007 edition is becoming a must, as the 2010 edition offers improved email archiving, high-availability, and optimal storage features. But as you begin to explore the possibilities of upgrading to Exchange 2010, do you have a proper plan in place?


Definitive Guide to Next Generation Threat Protection eBook by  FireEye

December 31, 2013 - In today's evolving threat landscape, businesses of various sectors and sizes have fallen victim to sophisticated cyber-attacks. This in-depth eBook explores the next generation of threat protection and delves deep into various topics, such as advanced persistent threats.


Deliver Application-level Security at Data Center Performance Levels by  Check Point Software Technologies Ltd.

September 08, 2008 - The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security.


Deliver the Web Access Your Users Want With the Control You Need by  BlueCoat

November 04, 2011 - URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.


Deliver the Web Access Your Users Want With the Control You Need by  DataDirect Networks

November 04, 2011 - URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.


Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by  Citrix

August 07, 2012 - A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.


Delivering on the Promise of eLearning by  Adobe Systems, Inc.

May 01, 2008 - This white paper considers some of the reasons that institutions and enterprises are turning to eLearning to engage learners with ideas and information. It also gives suggestions for creating digital learning experiences that engage learners.


Delivering ROI with Enterprise Social Computing by  NewsGator

April 01, 2009 - This paper will demonstrate how social computing solutions can help improve three core areas of your business: 1)Reducing expenditures 2)Leveraging current investments 3)Improving operating efficiency


Dell Compellent for Microsoft Exchange Server 2010 by  Dell, Inc.

April 18, 2012 - Dell Compellent SANs help ensure high performance, cost-effective storage, simplified operations and data protection for all Microsoft Exchange 2010 environments. Check out this comprehensive webcast to learn how Dell Compellent SAN can help you manage Exchange 2010 storage complexity.


Dell PowerEdge R720xd by  Dell, Inc. and Intel®

September 30, 2013 - Get an inside look at Dell's cutting-edge rack server with this concise, quick-reference guide to get you started along the path to exceptional maintenance of your thriving workload and business.


Dell Server Solutions - PowerEdge Blade Servers by  Dell, Inc. and Intel®

April 12, 2011 - Blade servers are great for businesses that require much larger computing capacity for performance-intensive business-critical applications. Blade Servers allow your business to add significant performance in an energy efficient and easily managed form factor. Learn more about Dell PowerEdge Blade Servers in this video.


Dell Server Solutions - PowerEdge Tower Servers by  Dell, Inc. and Intel®

April 12, 2011 - Tower Servers are ideal first servers for small businesses with the right combination of value, reliability, collaboration and data protection features to improve your business continuity and productivity. Learn more in this video which takes a look at a growing restaurant's adoption of a Dell PowerEdge Tower Server.


Dell™ PowerVault™ DL2000 Powered by Commvault® - Data Protection by  Dell, Inc.

January 26, 2009 - The PowerVault DL2000 is the first of Dell's TierDisk family of products, designed to provide cost-optimized solutions for secondary storage environments for data protection and data management.


Dell/EMC CX4 Exchange Performance by  Dell, Inc.

October 08, 2008 - This white paper takes a high-level look at the features and functionality that make the CX4 an excellent choice for Microsoft Exchange and other electronic mail systems. It examines new features, discusses disaster recovery and VMware integration, and provides a brief example of CX4's performance in Exchange environments.


Dell™ PowerVault™ MD3000i 5000 Mailbox Single Copy Cluster Microsoft® Exchange 2007 Storage Solution by  Dell, Inc.

August 01, 2008 - This document provides information on Dell's PowerVault MD3000i Plus MD1000 storage solution for Microsoft Exchange Server 2007, based on Microsoft Exchange Solution Reviewed Program (ESRP) Storage program.


Demystifying IT Risk to Achieve Greater Security and Compliance by  Lumension

January 26, 2010 - Read this white paper to learn how organizations need an intelligent approach to gaining the upper hand when it comes to assessing IT risk and managing compliance.


Deploying BlackBerry Enterprise Server Express by  BlackBerry

March 27, 2010 - Learn how BlackBerry® Enterprise Server Express can help you get the most out of your BlackBerry® smartphone. From smartphone applications to help you do more of what you love, to connecting you to business applications.


Deploying Firewalls throughout Your Organization by  Cisco Systems, Inc.

November 01, 2006 - Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.


Deployment Guide: Configuring a highly available Microsoft® Exchange Server 2013 environment on a Dell™ PowerEdge™ VRTX by  Dell and Microsoft

August 13, 2103 - This white paper outlines the best practices for configuring Microsoft Exchange 2013 environment on Dell PowerEdge VRTX architecture.


Detecting Sophisticated Online Attacks with Streaming Analytics by  EMC Corporation

December 31, 2013 - Discover how RSA Web Threat Detection delivers actionable intelligence by leveraging big data to correlate anomalies and detect online threats in real time.


Detecting Zero-Day Exploits in the Wild by  Websense

March 28, 2014 - This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security.


Developing an Effective Corporate Mobile Policy by  BlackBerry

June 01, 2008 - By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.


Developing an Effective Email Management Solution in SharePoint by  Colligo Networks Inc.

May 18, 2011 - Today, email management is a critical requirement. But deploying and supporting an effective email management solution poses significant challenges for IT. Check out this white paper to learn the case for SharePoint.


Disaster Recovery Planning for BlackBerry Enterprise Server for Microsoft Exchange by  BlackBerry

March 18, 2009 - This document provides an overview of BlackBerry® Enterprise Server components and is intended to help administrators prepare for the design and delivery of disaster recovery procedures for the BlackBerry environment.


Disaster Recovery with Sunbelt Exchange Archiver by  Sunbelt Software

August 06, 2008 - Sunbelt's Exchange Archiver simplifies disaster recovery by using its revolutionary designed Hierarchical Storage Management (HSM). The HSM store is integrated into the SEA server and redirects archived email into various storage media.


Discover How Mail Express Solves 2 of Your Biggest IT Headaches by  GlobalScape

December 31, 2012 - Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.


Dispelling Myths & Revealing Truths about Email Management with SharePoint by  Colligo Networks Inc.

May 18, 2011 - This white paper outlines five things you need to know before developing an email management solution. It also seeks to dispel myths about SharePoint and Exchange.


DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry by  FireEye

May 30, 2014 - This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.


DNSSEC - Secure DNS For Government by  BlueCat

August 31, 2010 - This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines.


Do I Need a Server? If you’re looking to grow your small business, make sure you have the right tools by  Dell, Inc. and Microsoft

December 15, 2009 - Whether they know it or not, many small businesses can benefit greatly from adding a centralized server to their network. In this article, you'll read about many of these benefits.


Does Your Communications and Collaboration Solutions Meet your Mid-Size Business Needs? by  Cisco Systems, Inc.

January 29, 2014 - This exclusive paper examines how cloud collaboration technologies can help your organization overcome some of the common communication challenges face today.


Domino Security Vulnerabilities to Watch For by  Symantec Corporation

December 04, 2012 - Access this expert e-guide that discusses what to watch out for when it comes to the security vulnerabilities of Domino and key tips to avoid these threats and risks to your organization.


Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It by  Symantec Corporation

October 24, 2013 - Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid.


Driving Down the Total Cost of Protection by  Kaspersky Lab

May 11, 2011 - This white paper touches on a new malware protection system that was designed for today and tomorrow. It provides the best overall protection for all businesses and does this with the best total cost of protection available today.


Driving Down the Total Cost of Protection by  Kaspersky Lab

November 11, 2010 - In recent years there has been an exponential growth in malware proliferation around the world. Over 30,000 new threats hit the wire each day, requiring more than 3,500 new malware signatures being released daily by anti-malware companies. Read this white paper to learn about Kaspersky's world class, yet affordable anti-malware protection systems.


Driving Revenue Through CRM Integration by  Marketo

June 27, 2013 - In this helpful resource, discover four keys to establishing successful integration of your CRM system and marketing automation. Explore how your sales, marketing, customer service, and accounting teams can work together to close the loop of great customer experience.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts