Anti Spam
REGISTER| SIGN IN| HELP| HOME
Browse
Project Tools
About Us
For Vendors
Search by:   
Search
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
F Listings:  Result Page 1
 

Fact or Fiction Security Survival Guide by  Lumension


February 02, 2009 - This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.

 

Fact or Fiction: The Future of Email Attacks by  Symantec Hosted Services


October 31, 2006 - In this expert podcast, Tom Bowers, Technical Editor of Information Security magazine, will confirm or debunk a number of common beliefs about what's coming next. This Podcast features a "fact or fiction"-style interview about future email-based attacks.

 

Fast and Effective Endpoint Security for Business by  ESET


November 10, 2011 - This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.

 

Fast-Growing Communications Agency Gains Reliable Access, Streamlines IT with Google Apps for Business by  Google


January 06, 2011 - This case study examines the specific application adopted by Smile Communications and the benefits they offer.

 

Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition by  AVG Technologies USA, Inc.


March 31, 2010 - The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs.

 

February Essentials Guide on Threat Management by  SearchSecurity.com


February 06, 2012 - Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.

 

Fiber Optic Leader Sheds Light on WAN Data Protection Challenges by  Silver Peak


January 01, 2007 - As a result of the Silver Peak-optimized WAN, Finisar employees can readily access their centralized Microsoft Exchange e-mail, Microsoft Windows file services and other applications.

 

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system by  Intel


January 31, 2012 - Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.

 

File Archive: the next big thing? by  EMC Corporation


October 08, 2013 - Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.

 

File Security for Linux/BSD/Solaris: Antivirus Protection for your servers by  ESET


March 25, 2011 - ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats.

 

Finally, a Simple Way to Deploy a Customer Contact Center by  Contactual (Now 8x8, Inc.)


February 11, 2010 - The goal of customer interaction is to provide consistent and efficient service across all areas of customer contact channels. In this paper we examine two alternatives: building a contact center in-house versus using an online service such as Contactual OnDemand Contact Center to interact efficiently with customers.

 

Financial Institutions, Merchants, and the Race Against Cyberthreats by  RSA, The Security Division of EMC


October 31, 2013 - In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.

 

Finding an Email Archiving Solution for your Organization by  CommVault Systems, Inc.


March 10, 2014 - This informative resource highlights completed research on the needs and benefits of an email archiving platform, and will help guide you to a solution fit for your organization.

 

FireEye 1H 2011 Advanced Threat Report by  FireEye


November 14, 2011 - This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.

 

FireEye Advanced Threat Report - 2H 2011 by  FireEye


May 01, 2012 - This FireEye Advanced Threat report provides key insight into the current threat landscape, the evolution of advanced persistent threat (APT) tactics and the level of infiltration seen in networks today. View now to gain an in-depth look into key findings to help you build and improve your security strategies to tackle today's security issues.

 

Firewall Solutions for Small Business by  Cisco Systems, Inc.


August 14, 2009 - The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.

 

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies by  ArcSight, an HP Company


August 02, 2010 - The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

 

Five Best Practices to Protect Your Virtual Environment by  Juniper Networks, Inc.


April 20, 2012 - <p>Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment. </p>

 

Five Best Practices to Protect Your Virtual Environment by  Juniper Networks, Inc.


September 02, 2011 - This paper lays out five "best practice" ways to fortify your planned or existing virtualized environment, ensuring that it is architected for security, malware suppression, and regulation compliance.

 

Five critical steps to achieving an effective application security program by  IBM


December 31, 2013 - This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes.

 

Five Essential Considerations for Exchange 2007® Implementations by  Dell India


August 01, 2008 - Read this white paper to learn about five essential considerations administrators should address while planning for any Exchange 2007 migration.

 

Five Network Security Threats and How to Protect Your Business by  Qwest Communications


August 25, 2010 - Threats abound in today’s corporate networks. Keeping your enterprise and its assets secure requires a proactive security strategy. Discover the five most costly network security threats and see how you can protect your business with a layered security approach.

 

Five Reasons to Go Wireless by  Cisco Systems, Inc.


October 01, 2008 - Wireless networks are a powerful tool for boosting productivity and encouraging information sharing in a small company. With access to network resources, employees can roam where they need to and have constant access to the tools required to do their jobs

 

Five Things To Do After An Attack by  Hexis Cyber Solutions Inc


May 22, 2014 - Advanced persistent threats are a top priority for many IT departments – as they should be. Access this informative whitepaper and find out 5 things to do after a potential attack.

 

Five Things To Do After You've Been Hacked by  Hexis Cyber Solutions Inc


May 22, 2014 - Access this informative guide to find out 5 things to do after you've been hacked – keeping your system safe and secure.

 

Five Tips to Reduce Risk From Modern Web Threats by  Sophos, Inc.


September 30, 2013 - Safeguarding your systems from ever-changing cybercriminals eyeing your sensitive data can be overwhelming. This guide explores 5 steps you can take to reduce risk from modern web threats.

 

Five Truths About Enterprise Data Protection by  PGP Corporation


December 22, 2008 - How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy.

 

Five Ways to Improve Your Wireless Security by  Cisco Systems, Inc.


February 28, 2008 - A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.

 

Flushing Bank Invests in Internet Security with Webroot by  Webroot


September 27, 2011 - New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.

 

Forging a CEM Strategy That Can Power Commerce by  SearchCRM


April 22, 2014 - With a seemingly exhaustive number of methods to communicate -- not to mention an expected $280 billion in U.S. e-commerce sales in 2015 -- contact center technology today requires a new approach.

 

Fortinet’s Solution for the Enterprise Campus: High Performance Next Generation Firewall by  Fortinet, Inc.


March 31, 2014 - This whitepaper explores major trends behind next-generation firewalls and how you can ensure network security while still enabling your employees.

 

Fortune 200 Firm Achieves Global Email Protection by  WatchGuard Technologies, Inc.


March 15, 2011 - Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.

 

Four Effective Service Strategies that Drive Brand Advocacy by  Oracle Corporation


April 25, 2011 - This paper will provide answers, focusing on the four key aspects of service that can combine to create a "WOW!" experience: convenience, speed, relevance, and relationship.

 

Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware by  Sophos, Inc.


June 24, 2010 - Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.

 

Four Steps to Cure Your Patch Management Headache by  Lumension


January 06, 2011 - The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. Read this free white paper and learn four steps to cure your patch management headache.

 

Four Things Your Server Could Tell You: McAfee Total Protection for Server - Security and Compliance from a Single Solution by  McAfee, Inc.


November 02, 2010 - For years when people thought about security, it was usually in terms of desktop/laptop anti-virus, or perhaps email and spam filtering. Read this paper to learn about specific vulnerabilities that could affect your server and how McAfee Total Protection for Server can help protect company data and ensure compliance.

 

Free yourself to do more, while securing your business simply and cost-effectively by  Sophos, Inc.


June 24, 2009 - It's vital for businesses to secure their systems and data against a growing field of threats. However, implementing and maintaining full-spectrum protection can be a heavy drain on financial and human resources if not done right. Read this whitepaper to learn how a more efficient approach to security can free up much needed resources.

 

From Cold to Hot: Lead Nurturing Programs That Generate Sales by  Vtrenz, Inc


August 20, 2008 - This white paper explains the importance of lead nurturing–in the lead management process. It discusses best practices for nurturing leads in today's competitive business environment, and offers advice for implementing a lead-nurturing program.

 
The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts