February 02, 2009 - This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
October 31, 2006 - In this expert podcast, Tom Bowers, Technical Editor of Information Security magazine, will confirm or debunk a number of common beliefs about what's coming next. This Podcast features a "fact or fiction"-style interview about future email-based attacks.
November 10, 2011 - This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.
March 31, 2010 - The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs.
February 06, 2012 - Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.
January 01, 2007 - As a result of the Silver Peak-optimized WAN, Finisar employees can readily access their centralized Microsoft Exchange e-mail, Microsoft Windows file services and other applications.
January 31, 2012 - Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
October 08, 2013 - Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.
March 25, 2011 - ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats.
February 11, 2010 - The goal of customer interaction is to provide consistent and efficient service across all areas of customer contact channels. In this paper we examine two alternatives: building a contact center in-house versus using an online service such as Contactual OnDemand Contact Center to interact efficiently with customers.
November 14, 2011 - This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.
May 01, 2012 - This FireEye Advanced Threat report provides key insight into the current threat landscape, the evolution of advanced persistent threat (APT) tactics and the level of infiltration seen in networks today. View now to gain an in-depth look into key findings to help you build and improve your security strategies to tackle today's security issues.
August 14, 2009 - The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.
August 02, 2010 - The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
April 20, 2012 - <p>Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment. </p>
September 02, 2011 - This paper lays out five "best practice" ways to fortify your planned or existing virtualized environment, ensuring that it is architected for security, malware suppression, and regulation compliance.
December 31, 2013 - This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes.
August 25, 2010 - Threats abound in today’s corporate networks. Keeping your enterprise and its assets secure requires a proactive security strategy. Discover the five most costly network security threats and see how you can protect your business with a layered security approach.
October 01, 2008 - Wireless networks are a powerful tool for boosting productivity and encouraging information sharing in a small company. With access to network resources, employees can roam where they need to and have constant access to the tools required to do their jobs
September 30, 2013 - Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.
February 28, 2008 - A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
September 27, 2011 - New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.
April 22, 2014 - With a seemingly exhaustive number of methods to communicate -- not to mention an expected $280 billion in U.S. e-commerce sales in 2015 -- contact center technology today requires a new approach.
June 24, 2010 - Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.
January 06, 2011 - The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. Read this free white paper and learn four steps to cure your patch management headache.
November 02, 2010 - For years when people thought about security, it was usually in terms of desktop/laptop anti-virus, or perhaps email and spam filtering. Read this paper to learn about specific vulnerabilities that could affect your server and how McAfee Total Protection for Server can help protect company data and ensure compliance.
June 24, 2009 - It's vital for businesses to secure their systems and data against a growing field of threats. However, implementing and maintaining full-spectrum protection can be a heavy drain on financial and human resources if not done right. Read this whitepaper to learn how a more efficient approach to security can free up much needed resources.
August 20, 2008 - This white paper explains the importance of lead nurturing–in the lead management process. It discusses best practices for nurturing leads in today's competitive business environment, and offers advice for implementing a lead-nurturing program.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.