Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
K Listings:  Result Page 1

Kahuna Ventures Eliminates Email PST Files and Improves Data Retention and Recovery with Metalogix by  Metalogix

February 16, 2012 - Discover how a company reduced its email volume by 50 percent and enabled faster backups and recovery with an email archiving solution. Explore the advantages of implementing this archiving system, including the ability to eliminate management of burdensome PST files and comprehensive legal retention features.


Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure by  McAfee, Inc.

November 09, 2011 - This paper defines and identifies three steps an organization should pursue in parallel to bring mobile devices into your security infrastructure.


Keeping Networks safe from Social Networking by  BlueCoat

November 21, 2011 - Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking.


Keeping Pace with the Consumer: What you Need to Deliver a Next-Generation Customer Experience by  Aspect

August 10, 2010 - This paper outlines key capabilities and top-line technical requirements to consider as you engage with IT to determine the best path forward to meet your customers’ demands. Continue reading to learn tips and techniques to keep pace with the consumer and deliver a next-generations customer experience.


Keeping Your Data Safe and Your Networks Connected by  SonicWALL

January 01, 2008 - This whitepaper explains "business continuity" which is keeping your data safe, and accessible. It also discusses disaster recovery and the typical and atypical ways of gaining network access.


Key Considerations for Migrating to Exchange 2010 by  EMC Corporation

October 01, 2009 - This white paper addresses the key issues that decision makers should consider as they plan their Exchange 2010 migration. It discusses the results of an in-depth primary research survey conducted by Osterman Research that explores how decision makers are planning their migration to Exchange 2010.


Key E-Discovery Issues to Consider in 2011 by  Dell, Inc.

May 16, 2011 - This white paper focuses on the key practices and technologies that organizations should pursue as they seek to improve their e-discovery practices and technologies. It also provides a brief overview on the relevant offerings from Dell.


Key Steps to Securing Your Organization and Evicting a Hacker by  Foundstone, Inc.

May 01, 2008 - This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.


Key tips to socialize your intranet by  Jive Software

July 10, 2013 - Today, businesses need an intranet that's one that's social, engaging, and productive. By combining key social features along with capabilities for driving greater alignment, businesses can experience innovations and productivity not seen within the enterprise since the introduction of email.


Knowledge is Power: The Symantec Guide to Protecting your Website by  Symantec Corporation

January 30, 2014 - This guide explores the importance of securing your system, overcoming any vulnerabilities and how this can help you maintain consumer confidence.


Kofax for Digital Mailrooms by  Kofax, Inc.

February 23, 2011 - Handling large volumes of incoming mail - and making sure it reaches the right recipients at the right time - is key to operational efficiency and customer service quality across a variety of departments and processes. Check out this white paper to learn a better way to automate the business processes in the mailroom.


KPN Automates with Parallels Automation to Maintain Hosting Leadership in the Netherlands by  Parallels, Inc.

April 09, 2010 - KPN was looking to add features such as database support, automated scripting, and applications to their shared hosting environment. Learn how KPN came to select Parallels Automation to provide distributed architecture

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts