Anti Spam
REGISTER| SIGN IN| HELP| HOME
Browse
Project Tools
About Us
For Vendors
Search by:   
Search
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
E Listings:  Result Page 1 | 2
 

e-Guide: Windows Server Disaster Recovery - Planning for the Worst by  AppAssure Software, Inc.


April 09, 2009 - The impact of natural, random and man-made disasters on Windows Server applications, especially email, and their subsequent disruption can cripple an organization. This white paper offers advice for protecting your existing Windows Server infrastructure from disruptive application outages.

 

e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process by  Symantec Corporation


June 07, 2008 - The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.

 

E-Book: Cloud Computing in the UK - The Next Phase by  Google


November 01, 2010 - This e-book is meant to provide guidance for managing applications in the cloud. Read on to learn why cloud adoption is ramping up in the UK, strategies for migrating and integrating new cloud models into your existing infrastructure, best practices from CIOs, solution providers and analysts, and much more!

 

E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010 by  Mimecast


October 04, 2011 - This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.

 

E-Book: Driving Profitability through Information Security by  Astaro


September 27, 2010 - While recognizing the need for security is a positive step, many of these organizations are missing an opportunity to improve their operations by using the same tools. In this document you will find some tactics you can add to your security playbook to help make your employees more productive and to help improve your organization’s efficiency.

 

E-Book: Driving Profitability through Information Security by  Tableau Software


September 27, 2010 - While recognizing the need for security is a positive step, many of these organizations are missing an opportunity to improve their operations by using the same tools. In this document you will find some tactics you can add to your security playbook to help make your employees more productive and to help improve your organization’s efficiency.

 

E-Book: Moving to the Cloud by  Google


July 06, 2010 - When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps.

 

E-Book: Next Steps and Trends in Enterprise Content Management Technology by  ASG Software Solutions


April 16, 2010 - This E-Book will provide an expert overview of ECM, a look at recent trends shaping the market today, advice on navigating ECM technology purchases – and an in-depth look at where this market is headed.

 

E-Book: Next Steps and Trends in Enterprise Content Management Technology by  SpringCM


October 26, 2010 - ECM is a long-established market, but ECM technology is changing, evolving and taking on increased importance to organizations as they look to gain more value and insight from documents, emails, blogs etc. Through this e-book you will obtain an expert overview of ECM and an in-depth look at where this market is headed.

 

E-Book: Technical Guide on Combatting Emerging Web Threats by  SearchSecurity.com


June 09, 2010 - Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.

 

E-Book: The information governance imperative: Expert advice for developing a strategic plan to govern critical enterprise information by  IBM


April 21, 2011 - In this eBook, readers will find an overview of key information governance issues and practical advice on building a business case for information governance, developing an information governance strategy and structuring an information governance program.

 

E-Discovery Cloud Considerations by  Symantec Corporation


December 04, 2012 - In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.

 

E-Discovery, Case Management & Litigation Hold: Comprehensive Archive and Search Capability to Meet Legal and Regulatory Requirements by  Mimecast


August 13, 2010 - Mimecast Unified Email Management™ is a cost effective Software-as-a-Service solution that offers integrated E-Discovery, Litigation Hold and Case Managment functionality, giving you the tools you need to rapidly execute data preservation policies and email discovery requests and guard against the risk of failing to produce required information.

 

E-guide-- Endpoint security suites: What to consider before renewal by  ESET


January 13, 2010 - In this expert e-guide, get tips on what you should consider before choosing, keeping, or upgrading your endpoint security software. Review endpoint security suite management issues, as well as how to negotiate with vendors.

 

E-Guide: A Strategic Approach to Enabling Mobile Business Applications by  BlackBerry


March 01, 2009 - Today's successful enterprises are discovering that granting mobile access to critical business applications can increase productivity and revenue.

 

E-Guide: Bringing Value to Application Monitoring Through SIM by  CA Technologies.


December 05, 2012 - This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.

 

E-Guide: Building Risk Resilience in the Threat Landscape by  CA Technologies.


December 07, 2012 - This expert e-guide explores how next-generation firewalls (NGFW) can overcome the limitations of traditional firewall solutions. Read on to discover key features, functions, and benefits that NGFWs can offer your organization. Also inside, find key tips for building risk resilience.

 

E-Guide: Clearing Up the Confusion to Prepare for APTs by  SecureWorks


December 05, 2012 - Consult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.

 

E-Guide: Climbing the Uphill Battle of Exponential Data Growth by  Symantec Corporation


December 06, 2010 - This guide provides a simple yet reliable approach to securing data for the long term though the efficient optimization of IT resources and a set of straightforward best practices for data protection. Learn archiving best practices, how to choose a data archiving tool, and how to put together the best data archiving strategy for your business.

 

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options by  IBM


May 20, 2011 - Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization.

 

E-Guide: Ensuring Exchange 2010 migration success by  Dell, Inc. and Intel®


August 09, 2010 - In this expert e-guide from SearchExchange.com, learn best practices for migrating to Exchange Server 2010. Let this resource be your checklist as you map out your deployment strategy. Learn key steps that can't be overlooked and find out how to ensure success whether you're upgrading from Exchange 2007 or 2003.

 

E-Guide: Enterprise UTM Security: The Best Threat Management Solution? by  NETGEAR Inc.


December 10, 2010 - If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.

 

E-Guide: How antivirus software works: Virus detection techniques by  M86 Security


October 05, 2011 - Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.

 

E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits by  BlueCoat


July 13, 2011 - Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.

 

E-Guide: New Malware Threats Require New Antimalware Protection Strategy by  SecureWorks


December 05, 2012 - This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.

 

E-Guide: Next Steps and Trends in Enterprise Content Management by  Dell, Inc.


May 27, 2011 - Enterprise content management is a long-established market, but ECM technology is changing, evolving and taking on increased importance to organizations. This eBook provides an overview of ECM, a recap of recent developments in the market and an in-depth look at emerging management trends.

 

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by  Panda Security


September 30, 2009 - In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information.

 

E-Guide: Top virtualization security risks and how to prevent them by  CA Technologies.


June 13, 2011 - There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced by all. In addition, you’ll find best practices for preventing hypervisor malware.

 

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond by  ESET


March 16, 2011 - The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.

 

E-mail Archive Solutions Bring IT Efficiencies and Compliance by  Datalink and NetApp


May 01, 2006 - Email data is growing in most organizations at a tremendous rate and, consequently, becoming more difficult to manage.

 

E-Organizing for Busy Project Managers by  Global Knowledge Network, Inc.


June 01, 2005 - Learn how to manage your electronic tools before they manage you. This paper will teach you how to properly utilize your office technologies and set effective communication rules with your project team.

 

e-Zine: Purchasing Considerations for Exchange 2010 by  Dell and Microsoft


April 18, 2012 - Find out why now is the best time to migrate to Exchange 2010 in this expert e-zine. Plus, discover how to cost-effectively meet the hardware and performance demands of this latest upgrade.

 

Easy DLP - Data Protection Loss by  Boldon James


July 19, 2011 - This paper provides technical solutions that address the security requirements of DLP. Explore how Easy DLP can provide major benefits of controlling information flow and raising end-user awareness without wasting time and effort.

 

eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap by  SearchExchange.com


June 19, 2009 - Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.

 

eBook - Email Retention: Standards and Practices by  SearchCompliance.com


October 08, 2009 - Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.

 

eBook-- Defining an Email-Archiving Policy by  Symantec Corporation


July 09, 2009 - Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.

 

eBook: Email Archiving - Planning, Policies and Product Selection: Analyzing Email Archiving Features for Productivity by  Symantec Corporation


October 01, 2009 - Chapter 4 of this e-book gives advice on determining your email archiving goals and policies to establish a set of system features that match your company’s needs and boost archiving efficiency.

 

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network by  SearchMobileComputing


December 09, 2008 - Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.

 

eBook: Moving to the Cloud by  Google Apps


July 06, 2010 - Content provided by Google. When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps.

 

eBook: Moving to the Cloud by  Google Apps


January 19, 2011 - When it comes to cloud computing, some companies have concerns around security and a perceived loss of control. But others are grabbing the opportunity to move to a more collaborative, Web-based platform. In this E-Book, we take a look at several companies that have migrated to Google Apps.

 

eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong by  SearchSecurity.co.UK


December 18, 2008 - Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.

 

eBook: Software as a Service: What You Should Consider When Moving to SaaS by  SearchSecurity.com


November 13, 2008 - Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.

 

eBook: The Shortcut Guide to User Workspace Management - Chapter 4: Transforming to an Environment of User Workspace Management by  RES Software


October 27, 2010 - You’ve already come to understand the workspace itself, and how that workspace can be made pervasive across the spectrum of delivery mechanisms.

 

Effective B2B Integration by  ComputerWeekly.com


September 21, 2012 - Date Vile identifies 6 key factors to help businesses integrate their supply and demand chains more effectively.

 

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown by  Dell Software


November 15, 2012 - Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

 

Effective Web Policies: Ensuring Staff Productivity and Legal Compliance by  Sophos, Inc.


September 23, 2008 - This paper discusses how to create a policy that balances an organization's need for protection against an individual's expectations.

 

Efficacy of Emerging Network Security Technologies by  ComputerWeekly.com


April 29, 2013 - The report, which surveyed 4,774 global IT and IT security professionals across nine countries identifies the challenges enterprises are facing dealing with emerging security threats.

 

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture by  GlobalScape


December 31, 2012 - This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.

 

eGuide: A Strategic Approach to Enabling Mobile Business Applications by  BlackBerry


March 18, 2009 - Today's successful enterprises are discovering that granting mobile access to critical business applications can increase productivity and revenue.

 

eGuide: Email Security and Compliance Best Practices by  Google Apps


January 04, 2011 - Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.

 

eGuide: Email Security and Compliance Best Practices by  Google Postini


October 25, 2010 - Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.

 

eGuide: Expert Tips for Deploying Secure Messaging Technologies by  Microsoft


October 22, 2008 - This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.

 

eGuide: Information Security - Buyer's Guide to Messaging Security by  Proofpoint, Inc.


November 20, 2009 - Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

 

eGuide:Mitigating malicious advertisement malware by  Sophos, Inc.


June 24, 2011 - More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.

 

Eight Steps to Better Securing Exchange Server 2010 by  Symantec Corporation


December 03, 2012 - Access this expert e-guide for eight important steps to maintaining optimal security for your Exchange Server 2010.

 

Eight threats your antivirus won't stop by  Sophos, Inc.


December 23, 2011 - News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.

 

EMA Analyst Report on the Mobile Device Management Marketspace by  IBM


August 24, 2012 - Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.

 

Email and Web Security SaaS by  Webroot


April 14, 2009 - Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption.

 

Email archiving FAQ by  Symantec Corporation


November 19, 2012 - This exclusive FAQ guide has expert answers to 6 email archiving questions and addresses topics like the pros and cons of managed email archiving services, bandwidth requirements and more.

 

Email Archiving Implementation Five Costly Mistakes to Avoid by  Mimosa Systems


October 03, 2008 - This white paper will describe five key areas of email archiving implementation, drawing upon real world examples and experiences, to explore all the important issues that can impact total cost.

 

Email Archiving in Exchange 2010: Are Third-Party Solutions Still Necessary? by  Proofpoint, Inc.


February 16, 2010 - With the introduction of basic email retention and discovery features in Exchange 2010, some organizations are delaying or canceling the deployment of third-party email archiving solutions. But can Exchange adequately address these three critical business issues? And what about organizations that aren't planning to upgrade anytime soon?

 

Email archiving in Exchange: How to beat its limitations with a successful strategy by  Metalogix


June 14, 2012 - Discover how to successfully overcome the limitations of native Exchange 2010 archiving tools in this expert e-guide. Plus, gain insight into the key considerations to keep in mind when creating a smart email retention strategy.

 

Email Archiving Purchasing Considerations by  Iron Mountain


September 17, 2009 - This E-Guide will highlight the archiving options that prove to be beneficial to storage pros today, as well as the best practices to be put to use when implementing email and file archiving products.

 

Email Archiving Seminar Presentation Download by  EMC Backup and Recovery Solutions


July 02, 2009 - Two sessions are included in this presentation download covering such subjects as why an organisation should archive their email and practical advice on how to get started. Download it now for more information on the benefits of e-mail archiving.

 

Email archiving services by  Arrow Electronics, Inc.


June 01, 2008 - Get details on the dynamics at play around email archiving: SEC regulations, backup considerations and best practices for retention. Finally, find out which hardware and software products do a good job at email archiving.

 

Email Archiving: A Proactive Approach to e-Discovery by  Proofpoint, Inc.


July 01, 2008 - This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them.

 

Email Archiving: Common Myths and Misconceptions by  Dell India


January 01, 2009 - This white paper explores 5 common myths about email archiving, and provides guidance and solutions to solving email management and archiving issues.

 

Email Archiving: Do More with Less – Cut Costs and Improve Productivity by  Mirapoint Software, Inc.


September 18, 2009 - Learn how Mirapoint's RazorSafe™ email archiving appliance addresses email server management, end-user productivity, business mining, e-discovery, and audit challenges in an all-in-one solution.

 

Email Archiving: Planning, Policies and Product Selection - Chapter 3 by  SearchExchange.com


September 14, 2009 - It's critical to identify the key features when selecting an email-archiving system for risk reduction. The most important part of the process is defining the company's email-retention goals and policies. This chapter will discuss several tips for choosing the proper email-archiving product features for your organization.

 

Email Archiving: To SaaS or Not to Saas? by  Proofpoint, Inc.


January 12, 2009 - This paper discusses the overall benefits and drawbacks of SaaS solutions, outlining the type of situations that are best suited for this kind of implementation.

 

Email as Part of a Business Continuity Strategy: Why always-on-business requires always-on-email by  Mimecast


November 22, 2010 - The paper looks at the general approaches available to ensure email continuity from a high level and the implications of deploying each strategy on infrastructure, budget, people and resilience.

 

Email As Part Of A Business Continuity Strategy: Why Always-On-Business Requires Always-On-Email by  Mimecast


August 05, 2009 - The modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event. Maintaining access to email while upholding risk mitigation and compliance is a challenging endeavor.

 

Email Continuity: You don't know what you've got till it's gone by  Symantec Hosted Services


July 01, 2008 - Because email is ubiquitous, necessary and convenient, it cannot be allowed to fail. This whitepaper looks at the value of email and outlines the issues and concerns of IT managers involved in managing and maintaining business-critical email systems.

 

Email Management in Today's Regulatory Environment by  Ontrack® PowerControls™ by Kroll Ontrack


February 10, 2009 - Many businesses use the Exchange email server because of its full feature set and integration with Microsoft Office via the Outlook email client. But Exchange has one glaring drawback - it is very difficult to restore messages, mailboxes, and other data. Ontrack® PowerControls™ for Microsoft® Exchange Server solves the problem..

 

Email Management Services (EMS™) by  Dell MessageOne


July 01, 2008 - Email Management Services provide a total solution for email and BlackBerry® continuity, recovery, security, archiving, e-Discovery, and storage management.

 

Email Management Services (EMS™) - Data Sheet by  Dell MessageOne


February 08, 2008 - MessageOne's Email Management Services provide a total solution for email and BlackBerry® continuity, recovery, security, archiving, e-discovery, and storage management.

 

Email management suite by  Iron Mountain


June 25, 2008 - Email management solutions are designed to simplify your email management complexities. In this brief Videocast, legendary British comic, John Cleese, explains why you should want a total email management suite.

 

Email Marketing Goes Social by  Silverpop Systems Inc.


November 01, 2008 - Read this paper to get tips about how to best implement a successful social email marketing campaign.

 

Email Recovery & Management Software by  Ontrack® PowerControls™ by Kroll Ontrack


Email administrators and other I.T. professionals have access to valuable email recovery and repair solutions from Kroll Ontrack.

 

Email Security for Midsize Organizations by  McAfee, Inc.


August 11, 2009 - Whether you address all five areas in a unified approach or concentrate on strengthening your email protection, McAfee has proven products and a dedicated focus to meet the requirements of your organization.

 

Email Security in the Cloud: More Secure! Compliant! Less Expensive! by  McAfee, Inc.


April 01, 2010 - Based on Aberdeen’s analysis, cloud-based email security is superior over the alternatives based on the critical areas of security, compliance, reliability and cost. This research brief breaks down email security in the cloud, including trends, drivers and best practices for secure email.

 

Email Security Technical Guide by  SearchSecurity.com


April 05, 2013 - Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.

 

Email Security- The IBE Architectural Advantage by  Voltage Security, Inc.


April 05, 2012 - This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.

 

Embracing the Cloud: Top Seven Imperatives for an Organization by  Wipro Technologies


March 01, 2009 - This paper analyzes the impact of the cloud on the IT Ecosystem and provides answers to what an organization needs to do in embracing a right cloud strategy.

 

EMC SourceOne for Microsoft Exchange 2010 by  EMC Corporation


October 12, 2010 - This Data Sheet describes the new capabilities Microsoft and EMC provide for managing Microsoft Exchange 2010 e-mail, while meeting security, compliance, and eDiscovery requirements. The paper is jointly written with Microsoft.

 

EMC SourceOne for Microsoft Exchange Server 2010 by  EMC Corporation


May 03, 2010 - Microsoft and EMC provide compelling new capabilities for managing your Microsoft Exchange 2010 e-mail, while meeting security, compliance, and eDiscovery requirements.

 

Emerging Security Threats: Know Your Enemy in 2014 by  Imperva


February 21, 2014 - Enterprises must protect themselves from sophisticated attacks that can escape notice by host-based detection systems and steal millions. Ullrich shows you how.

 

Emerging Security Trends and Risks: Insights for the Business Executive by  IBM


June 30, 2012 - This report identifies key emerging cyber-threats, detailing why IT managers need to create proactive security intelligence capabilities, unified endpoint management, data protection, and social guidance to best prepare for today's evolving threat landscape.

 

Emerging Threats: The Changing Face of Email by  Kaspersky Lab


August 19, 2009 - More than three years after the infamous declaration from Microsoft's Bill Gates that "spam will be solved" in 2009, unsolicited junk mail continues to bombard email servers, dumping malicious attachments, phishing lures and spam advertising for fake pharmaceuticals.

 

EMS Email Continuity™ - Data Sheet by  Dell MessageOne


February 08, 2008 - EMS Email Continuity ensures that email will always work and messages will not be lost no matter what happens to your local systems, staff or infrastructure.

 

Enable Flexible Workstyles Without Sacrificing Security by  Citrix


May 24, 2013 - Register for this event to learn how to enable flexible workstyles without compromising management, security or control.

 

Enabling a safer internet: The positive approach to web security by  Sophos, Inc.


April 08, 2009 - This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.

 

Enabling Enterprise 2.0 by  Websense, Inc.


August 01, 2009 - Read this whitepaper to learn ways that organizations can create a strategy that embraces Web 2.0 technologies securely and enables a successful transition to Enterprise 2.0.

 

Encouraging Greater SharePoint Adoption by  AvePoint, Inc.


February 21, 2011 - This paper discusses the progression of SharePoint usage, features available to encourage SharePoint adoption, focusing on the technology components required, scalability of the platform to accommodate growth, migration strategies, and how AvePoint’s DocAve Software Platform help ensure a scalable, reliable platform for bolstered adoption.

 

Encouraging SharePoint Collaboration by  AvePoint, Inc.


February 21, 2011 - This paper discusses how Microsoft SharePoint is the platform of choice for organizations to store enterprise-wide content. New features in SharePoint Server 2010 take the platform to the next level by improving the platform’s scalability and usability to further enhance collaboration among knowledge workers.

 

End Point Security in Medium and Large Organizations by  Dell, Inc.


March 20, 2014 - This white paper provides informative steps that IT organizations can take to ensure that data on endpoint devices is more consistently protected from theft, leakage and loss.

 

End-to-End Secure Client to Cloud Access by  Intel


March 01, 2011 - In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.

 

Endpoint Protection Cheat Sheet by  Webroot


August 28, 2012 - Consult this cheat sheet to discover a revolutionary approach to cloud security. Find out more about some of the key advantages and fast facts regarding, deployment and performance, threat detection and remediation and more.

 

Endpoint Security and Control by  Sophos, Inc.


October 02, 2008 - Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.

 

Endpoint Security Management (Antimalware Technologies) Technical Guide by  SearchSecurity.com


September 11, 2013 - This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months.

 

Endpoint Security Suites Take Center Stage in the Enterprise by  Symantec Corporation


January 04, 2013 - This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.

 

Endpoint Security Technology by  TechTarget


March 18, 2014 - With the increasing number of client devices-endpoints, IT is challenged with managing this sheer volume of endpoints as your organization is left with multiple vulnerabilities. This expert guide details how endpoint protection software can help block malicious network traffic while providing secure access to your sensitive business data.

 

Endpoint Security Value Calculator by  Lumension


August 12, 2009 - This flexible, easy to use tool enables you to rapidly evaluate a wide range of scenarios and gather compelling proof of the dramatic impact that Lumension Security’s effective application and device whitelisting can have on your bottom line.

 

Endpoint Security: Defining the Total Cost of Ownership by  Sophos, Inc.


March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

 

Endpoint Security: Visible Coverage in a Single, Scalable Platform by  Trend Micro, Inc.


January 06, 2009 - Read this brief data sheet to learn how Trend Micro's Endpoint Security Platform delivers pervasive visibility and control, speeds time to protection, and increases management efficiency.

 

Endpoint Threat Management: The Benefits of Cloud-Based Security Services by  Trend Micro, Inc.


January 12, 2009 - Read this short paper to learn how your organization can use a hybrid approach to acquire an endpoint security solution that consumes less CPU time, memory, disk, and network bandwidth.

 

Engaging with the New eLearning by  Adobe Systems, Inc.


August 01, 2008 - Industry studies reveal evident increases in training and development delivered via eLearning. This white paper explores the advantages of eLearning and highlights 12 strategies with focus on virtual learning programs.

 

Engaging Your Subscribers Using Interactive Media in Email by  Bronto Software


October 01, 2008 - This paper reviews the best practices for integrating engaging interactive media elements into your current email marketing program. It will cover video in email, utilizing polls, flash presentations, RSS feeds and more.

 

Enhance Security with Intel® vPro™ Technology by  Intel Corporation


September 08, 2009 - Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.

 

Enhanced Detection of Malware by  Intel


December 03, 2009 - We present a cloud-computing-based architecture that improves the resiliency of the existing solutions anti-malware solutions, and we describe our prototype that is based on existing Intel platforms.

 

Enhanced faxing and PDF creation with 2007 Microsoft Office System & Exchange Server 2007 by  Equisys Inc.


February 01, 2008 - Learn the limitations of fax implementations and how to overcome them, problems with document creation and delivery, and factors to consider if you decide to use a third party.

 

Enhancing Exchange Server 2010 Availability with Neverfail: Best Practices for Simplifying and Automating Email Continuity by  Neverfail Group Limited


February 15, 2011 - This white paper provides an overview of the availability features in Microsoft’s Exchange Server 2010 platform. Details include planning, migration, and cost-related considerations. The paper also includes details on how Neverfail’s technology can help IT organizations build an efficient, manageable, and cost-effective messaging infrastructure.

 

Enhancing Security with Intel® Trusted Execution Technology by  Dell, Inc. and Intel®


August 29, 2013 - This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

 

Ensuring Cost-effective, High-performance Storage Deployments for Microsoft Exchange Server 2007 Environments by  Hitachi Data Systems


June 15, 2009 - A well thought out storage design will help your organization achieve the most from your Exchange solution architecture - taking into consideration capacity, performance and availability, as well as budget, requirements. This Solution Brief includes nine key considerations for storage deployments to support your Microsoft Exchange environment.

 

Ensuring The Availability of Blackberry Enterprise Server by  Double-Take Software


October 16, 2009 - In order to implement a plan for protecting and backing up BlackBerry handhelds, it's important to understand how the Blackberry Enterprise Server solution works within an existing email environment. This paper gives a quick lessong to that end, then concentrates on ensuring the availability of the Blackberry Enterprise Server

 

Enterprise antimalware excess? Managing antimalware security products by  Lumension


April 27, 2012 - Antimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.

 

Enterprise Antivirus Security: How Does Your Solution Stack Up? by  Webroot


March 30, 2012 - Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.

 

Enterprise Archive Solution (EAS) Product Family by  ZANTAZ


January 01, 2008 - The products in the ZANTAZ EAS family all share a common, distributed architecture engineered for robust scalability, performance, and flexibility.

 

Enterprise Information Archiving: It’s Time for a New Strategy by  OpenText


February 24, 2014 - Access the following white paper to discover what poor archiving really is. Learn if you're keeping too much or too little, where to turn for cost-effective storage, and more.

 

Enterprise Information Management, Enterprise Content Management, Master Data Management - How Do They Fit Together by  IBM


January 01, 2008 - Enterprise Content Management (ECM) has started to move beyond departmental deployments and into an important competence and infrastructural technology.

 

Enterprise Information Security in Transition: An Opportunity for IBM by  IBM


October 31, 2012 - Enterprise information security is growing increasingly difficult by the minute. This ESG Technology Brief outlines why information security is so challenging and explores how fundamental changes across your people, processes, and technologies are critical to staying ahead of the security curve.

 

Enterprise Messaging That Is Agile, Simple, and Efficient: Deploy Microsoft Exchange Server 2010 on Cisco UCS by  Insight


April 25, 2013 - The resource outlines a combined refresh and upgrade strategy for Exchange Server 2010 that improves efficiency and agility of your messaging environment while reducing costs and complexity by converging your email infrastructure.

 

Enterprise Mobility: 9 Best Practices for CIOs by  Dell, Inc. and Intel®


February 21, 2011 - New technology and the expanding role of the Internet are forever changing social relationships, management philosophies, and business models around the world. Access this white paper for insights into current mobile computing trends and recommendations for making the most out of these trends in the enterprise.

 

Enterprise Vault and Microsoft Business Online Productivity Suite by  Symantec Corporation


November 18, 2010 - Microsoft Business Productivity Online Suite (BPOS) is a set of Microsoft hosted messaging and collaboration services, which includes Exchange, SharePoint, LiveMeeting and Office Communications Online. This document outlines the integration of the offsite BPOS email service with an on-premises Enterprise Vault solution.

 

Enterprises See Clear Advantage of Cloud Computing and BYOD Combo by  Cisco Systems, Inc.


January 20, 2014 - This expert guide from searchCloudComputing.com answers some of the most frequently asked questions when it comes to making cloud computing and BYOD work in your enterprise without disruption.

 

Entrust Entelligence™ Messaging Server by  Entrust, Inc.


January 01, 2007 - The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.

 

Escalating Targeted Web and Email Attacks by  M86 Security UK


February 23, 2012 - Today's cybercriminals are more dangerous and sophisticated than ever before, launching more targeted attacks for bigger payoffs. And with new emerging technologies, also come new ways of exploitation. In this resource, explore the growing issue of targeted web and email threats and discover a unique approach to mitigating them.

 

ESET File Security for Linux/BSD/Solaris by  ESET


August 03, 2010 - Increasing volumes of malicious software are launched daily to steal passwords or sensitive corporate and customer information. ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats.

 

ESET Mail Security for Microsoft Exchange Server by  ESET


August 03, 2010 - Read this paper to learn how ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed — so slowdowns will be a thing of the past.

 

ESET: Threat Center by  ESET


September 02, 2010 - IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

 

ESG Lab Review: RSA ECAT Signature-less Malware Detection Tool by  EMC Corporation


December 31, 2013 - Check out this informative lab review to uncover the key findings of the evaluation of an industry-leading signature-less malware detection tool that specifically focuses on endpoint compromise assessment and monitoring.

 

ESG: Realizing and Maximizing E-mail Archiving ROI by  EMC Corporation


April 23, 2009 - ESG research indicates that organizations with e-mail archive implementations experience several measurable benefits, including lower storage costs as well as more efficient compliance, electronic discovery, and data protection operations. This white paper discusses the benefits of evaluating solutions to achieve the statuses mentioned above.

 

Essential Enterprise Mobile Security Controls by  IBM


January 04, 2013 - How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.

 

Essential Guide to Threat Management by  SearchSecurity.com


March 15, 2011 - Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

 

Evolution to the Cloud by  Ciena


May 29, 2012 - Learn – in less than six minutes – about a cloud approach that can be labelled a “data centre without walls,” enabling a virtual capacity that is both distance-independent and dynamically scalable. View now to learn the cost- and productivity benefits this approach can offer your organisation.

 

Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud by  Webroot


October 18, 2013 - In this expert e-guide, you will gain insight into an endpoint security strategy that looks beyond antivirus and the key functions that are missing in many cloud-based endpoint security services. Read the e-guide and discover how to evolve your endpoint strategy.

 

Evolving IT security threats: Inside Web-based, social engineering attacks by  Websense, Inc.


September 02, 2011 - In order to adequately defend IT infrastructure, organizations must have a solid understanding of the various attack methods that are effective today. This expert e-guide takes an in-depth look into the latest IT security threats and provides strategic recommendations on how to deal with them.

 

Evolving Security: 5 Reasons to Outsource Network Security Management in Today's Threat Environment by  XO Communications


April 30, 2012 - Discover five reasons why outsourcing your network security management can help you combat malware, hackers, and the evolving threat landscape.

 

Evolving Threats Demand New Approaches To Security by  Akamai Technologies


November 28, 2012 - Consult this white paper for a profile of the evolving cast behind today's advanced threats and find out the key steps you can take to ensure enterprise security – click through to read on.

 

Examining SSL-encrypted Communications by  Netronome Systems


October 16, 2007 - SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.

 
The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts