Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
G Listings:  Result Page 1

Gaining credibility in the fight against spam by  Symantec Hosted Services

March 24, 2008 - In this expert podcast, we look at what role reputation systems play in gaining credibility in the fight against spam.


Gartner Magic Quadrant for Unified Threat Management by  Sophos, Inc.

March 05, 2012 - Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.


Gartner: Deploying iPads on the corporate network by

March 16, 2012 - Tim Zimmerman, Gartner research director offers some practical advice to organisations wanted to use iPads on their corporate wireless networks.


Getting Ahead of Malware by  Intel

December 01, 2009 - To minimize the threat of Malware, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches Intel’s user base. Continue reading to learn more.


Getting Started With E-mail Archiving for Exchange by  Sherpa Software

May 01, 2008 - This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.


Getting Started With Email Archiving for Exchange - The Exchange 2010 Edition by  Sherpa Software

March 30, 2011 - This white paper discusses the reasons email archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.


Getting the Foundation Right: Unified Communications by  ShoreTel

May 19, 2009 - Check out this white paper to learn how to achieve UC and other next-generation benefits by building a strong foundation that encompasses a full palette of unified communications capabilities.


GFI EventsManager by  GFI Software

June 01, 2007 - GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.


GFI FAXmaker by  GFI Software

GFI FAXmaker is the leading enterprise quality fax server when it comes to reliability, ease of use and administration, and price.


GFI FAXmaker for Exchange/SMTP/Lotus -- 30-day Trial by  GFI Software

November 01, 2007 - Fax servers can make sending and receiving faxes an efficient, simple and cheaper process. The problems with manual faxing are solved because GFI FAXmaker allows users to receive and send faxes directly from their email client. Download this 30-day trial version to see how GFI FAXmaker can save valuable time for IT administrators and managers.


Global Best Practices in Email Security, Privacy and Compliance by  Proofpoint, Inc.

August 06, 2008 - A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.


Global Cloud-Integrated Storage by  Panzura

June 05, 2012 - Check out this white paper to discover a file system designed to provide global file sharing and collaboration, centralized storage capacity and easy cloud-based storage - while presenting all clients with real-time common and consistent views of the files.


Global profiles of the fraudster by

November 11, 2013 - Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.


Global Threat Report - September 2011 Backup strategy for your home users by  ESET

November 10, 2011 - This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.


Global Threat Report December 2011 by  ESET

January 26, 2012 - Stay informed about the most important cybersecurity issues facing the IT community today. Review this 2011 Global Threat report to help you protect your business in 2012 and beyond. Explore key topics including threat trends and security gains, monthly malware reports and the essential Top Ten Threats lists.


Global Threat Report January 2012: Where are the 419s of Yesteryear? by  ESET

February 13, 2012 - This January 2012 Global Threat report offers information and articles on today's threat environment including the lastest list of the top 10 threats. View now to gain key insight from security researchers and experts exploring 419s, the need for need anti-virus, anti-malware or anti-spam, 2012 trends, PUAs and more.


Global Threat Report: July 2010 by  ESET

August 13, 2010 - Read this paper to get a full analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month with almost 12.47% of the total was scored by the Win32/Conficker class of threat.


Global Threat Trends - December 2009 by  ESET

September 02, 2009 - Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net.


Global Threat Trends- February 2010 by  ESET

January 25, 2010 - Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net®.


Global Threat Trends- Year-End Report 2009 by  ESET

January 21, 2010 - In this paper you'll learn the most prevalent threats, including their percentage values relative to all the threats detected by ThreatSense.Net®.


Global Threat Trends: October 2010 by  ESET

November 10, 2010 - Read this month's Global Threat Trends to learn about the top 10 security threats in October. Discover what’s new on the cyber front and get an inside look at this year's eCity Symposium, and more!


Global Threat Trends - March 2010 by  ESET

April 16, 2010 - Read this analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month, with almost 10.32% of the total, was scored by the Win32/Conficker class of threat.


Global Threats Report Dec 2011 by  ESET

January 26, 2012 - The Global Threat Report offers a monthly overview of the most important cybersecurity issues facing the IT community today, offering informative articles, security tips, viral online resources, expert advice and opinions from ESET researchers, and the essential Top Ten Threats lists. Access now to learn how you can stay informed.


GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware by  GlobalSign

May 17, 2011 - This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.


GlobalSign Security Services for Hosting Companies - Understanding the true opportunity for Hosting Companies & ISPs to resell Online Security Services by  GlobalSign

March 16, 2011 - This white paper explains GlobalSign’s Internet security technology, its uses and necessity (and therefore the sales opportunity), advises on how to fit the services into existing hosting portfolios, and details how provisioning SSL can now be automated to degrees previously considered impossible.


Going Mobile: Developing an Application Mobilization Plan for Your Business by  BlackBerry

June 01, 2008 - The BlackBerry Enterprise Solution is a comprehensive platform, designed to meet your organization's needs to mobilize enterprise applications and systems.


Gone in 30 Days: Exchange, Retention, and Regulatory Compliance by  Sherpa Software

September 10, 2009 - In this white paper, we will discuss how to discover, manage, and archive information within your Exchange enterprise to successfully limit your legal exposure and protect your corporate information.


Goodman's LLP Case Study: Law Firm Plans for Contingencies with Indispensible BlackBerry Smartphones by  BlackBerry

September 16, 2011 - Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption.


Google Apps Sync for Microsoft Outlook by  Google

March 01, 2011 - This paper provides an overview of Google Apps Sync for Microsoft Outlook, which eases the transition to Google Apps by providing all the benefits of the Google cloud to users of Outlook.


Granular application control, intelligence and real-time visualization by  SonicWALL

February 28, 2011 - It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked.


Granular application control, intelligence and real-time visualization by  SonicWALL

March 17, 2011 - Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls.


Graydon, Head & Ritchey, LLP Migrates From Microsoft Hyper-V To VMware, Virtualizing Key Applications And Centralizing Management Of Their Virtual Environment by  VMware, Inc.

April 19, 2011 - After an outage occured, shutting down email and document management systems, management at Graydon, Head & Ritchey lawfirm decided to invest in a new IT infrastructure. Read this case study to learn how VMware helped the firm virtualize key applications and centralize management of their virtual environment.


Great Things Happen on the Road to Disaster Recovery by  AppAssure Software, Inc.

April 10, 2009 - In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup.


Guarantee Application Performance with Dynamic Hybrid Networking by  IPANEMA TECHNOLOGIES

September 26, 2013 - Gain expert insight to a dynamic hybrid networking system and uncover how this platform enables IT to regulate bandwidth usage by application while offering streamlined management to ensure optimal application performance.


Guarding the Castle by  Dell Software

May 08, 2014 - Learn the strategies and tools that cybercriminals use to infiltrate your network and how you can stop them. See how you can secure your network every minute of the day, against all types of malware, with a high performance firewall that protects against the latest global threats.


Guide for migrating to Exchange 2010 by  Microsoft

May 09, 2011 - Before migrating to any email server, it is important to confirm that you meet the prerequisites, including having sufficient hardware—and this holds true when considering migrating to Exchange Server 2010. Ensure you are prepared for this migration and learn more here.


Guide to Mobile Device Management Software by

September 19, 2012 - This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success.


Guide: Desktop Authority by  ScriptLogic Corporation

August 27, 2009 - Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership.


Guide: Patch Authority Ultimate by  ScriptLogic Corporation

August 27, 2009 - With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts