Anti Spam
REGISTER| SIGN IN| HELP| HOME
Browse
Project Tools
About Us
For Vendors
Search by:   
Search
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
L Listings:  Result Page 1
 

Laws, regulations and compliance: Top tips for keeping your data under your Control by  Sophos UK


December 01, 2008 - The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.

 

Layered Security: Why It Works - December 2013 by  Symantec Corporation


December 31, 2013 - This guide explores the importance of deep, layered security strategies and how network security can help ensure security for your system.

 

Leadership and Technology: A Total-Cost-of-Ownership Comparison for Unified Communications by  Cisco Systems, Inc.


July 19, 2012 - This exclusive whitepaper covers an affordable and effective unified communications solution for mid-market businesses.

 

Leveraging Information for Innovation and Competitive Advantage by  IBM


January 01, 2007 - This paper by Hurwitz & Associates provides an overview of what is required to create an environment that leverages information dynamically in your enterprise.

 

Leveraging security from the Cloud by  IBM


July 01, 2011 - Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services.

 

Liebert Monitoring by  Liebert Corporation


The Albér Cellcorder CRT-300 cell resistance tester displays and records cell float voltage, internal cell resistance and intercell connection resistance. The portable unit includes a memory card, backlit graphical reflective LCD....

 

Lifecycle of an Advanced Persistent Threat by  Dell SecureWorks UK


August 16, 2012 - Advanced Persistent Threats (APTs) are a serious concern for both governmental and private-sector organizations. Read this white paper to get the situational awareness and understanding you'll need to develop an effective and efficient Advanced Persistent Threat (APT) defense strategy.

 

Live Help: Global Consumer Views & Trends Live Voice and Live Chat by  Art Technology Group (ATG)


June 07, 2010 - This report presents the results of a global survey commissioned by ATG that reveal that consumers want more than just a phone number or e-mail address when it comes to online customer service. Continue reading this report to learn more about the consumer views and trends of voice and live chat.

 

Lloyd Gosselink Rochelle & Townsend Ensure Reliable, Constant, E-mail Services with Replay AppImage by  AppAssure Software, Inc.


June 01, 2009 - The network administrators at Lloyd Gosselink Rochelle & Townsend, PC have taken many steps to ensure reliable, constant, e-mail services. Like any law firm, e-mail is a central application and protecting the e-mail system is a central function of information services. One of the most important steps was implementing Replay AppImage.

 

Longline Phishing: A New Class of Advanced Phishing Attacks by  Proofpoint, Inc.


December 31, 2012 - In this white paper, gain valuable information about longlining, the newest method in phishing attacks, and key recommendations for how to enhance your email security defense.

 

Lotus Sametime works with Microsoft Office and Outlook by  IBM


August 12, 2010 - Check out this Lotus Sametime demo to learn how this software integrates with Microsoft technologies to enhance unified communications and help users gain real-time access to a complete set of collaboration capabilities.

 

Lotus Symphony Demo by  IBM


October 05, 2009 - Work smarter with Lotus Sympony document software from IBM.

 

Lowering IT Costs: How to Reduce the Need for Desktop Remediation and Shave Millions off IT Expenses by  M86 Security


November 18, 2011 - The average malware attack can cause significant damage, forcing organizations to exceed their budgets. In this paper, gain a better understanding of how much the next-generation threats impact remediation costs and discover a solution to minimize those cost, while maximizing efficiency.

 

Lowering MSP TCO for Endpoint Security Solutions - Bottom-Line Benefits of Cloud-Based Antivirus Architecture by  Webroot


January 31, 2014 - This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.

 

Lumber Company Cuts Customer Delays down to Size by  Cisco Systems, Inc.


January 01, 2006 - In this case study, Mountain Lumber Company streamlined their customer and employee communications with a Cisco Unified Communications system. They have also eliminated the need for a separate intercom system. Read this study to learn more.

 

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change by  Lumension


September 01, 2008 - Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.

 

Lumension Endpoint Security: Device Control and Application Control by  Lumension


September 13, 2010 - The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

 

Lumension Sanctuary Device & Application Control for Endpoint Security -- 30-day Free Trial by  Lumension


January 01, 2008 - Protecting networks from malware can seem like an insurmountable challenge. In this 30-day free trial download, see how Lumension's Sanctuary Device and Application Control enable only authorized applications to run and only authorized devices to connect to a laptop or desktop, removing the risk of data leakage and malware.

 

Lumension Sanctuary Device Control by  Lumension


February 13, 2009 - Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints.

 

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by  Lumension


November 01, 2008 - Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting.

 

Lumension® Device Control for Microsoft® System Center by  Lumension


January 21, 2010 - Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.

 
The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts