Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
M Listings:  Result Page 1

Magic Quadrant for Endpoint Protection Platforms by  Sophos, Inc.

April 11, 2011 - Read this Market Overview of the different malware protection and prevention solutions that various vendors are offering.


Magic Quadrant for Endpoint Protection Platforms by  Sophos, Inc.

May 12, 2009 - Gartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.


Magic Quadrant for Intrusion Prevention Systems by  Sourcefire

December 31, 2013 - This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.


Magic Quadrant for Secure Web Gateway by  BlueCoat

September 17, 2010 - Web application control and data loss prevention are important considerations for future-proofing investments; however, these features are not very mature or widespread. Read on to learn about a critical tool for protecting endpoints from various forms of malware and other security risks.


Magic Quadrant for Secure Web Gateway by  BlueCoat

May 02, 2011 - This Gartner report delves into the SWG market, highlighting today’s key drivers, emerging trends, and available solutions. View now to explore a variety of SWG providers of both on-premise equipment and cloud-based services, and discover where each vendor stands in the market based on Gardner’s Magic Quadrant.


Mail Attender, Archive Attender, Discovery Attender & PST Backup Attender by  Sherpa Software

May 23, 2011 - Although Microsoft introduced a number of features designed to accommodate the Exchange 2010 larger inbox size, your business may require a more sophisticated approach to retention policies, content management or searching. This white paper reveals software that supplements Microsoft Exchange 2010 Deployment and expands administrative control.


Mail Security for Microsoft Exchange Server by  ESET

March 25, 2011 - ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past


Maintaining Trust: Protecting Your Web Site Users from Malware by  IBM

November 02, 2009 - This paper explores the problem of malware and how it is increasingly being delivered through legitimate Web sites. It also introduces new techniques from IBM that are designed to go beyond standard security measures to help organizations proactively defend against threats.


Make E-Discovery Painless Through Effective Records Management by  Iron Mountain

March 13, 2012 - Read this expert e-guide from to discover how a records management system can simplify the e-discovery process with innovative features for e-mail retention, predictive tagging and conceptual search.


Make Virtual Desktop Security Simpler and More Scalable by  Citrix

May 16, 2011 - Virtualization calls for new security strategies that integrate user profile information, location, and other relevant data. But many companies are unsure how they can adapt their approach accordingly. Develop a deeper understanding of the malware landscape so you can empower end users and protect your organization against potential threats.


Making Office 365 More Secure and Compliant by  Proofpoint, Inc.

December 19, 2011 - Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.


Making the FACTA Red Flags Rules Operational by  RSA, The Security Division of EMC

October 16, 2008 - Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.


Malicious JavaScript Attacks: What Can You Do? by  Sophos, Inc.

January 11, 2011 - We’ll review what to watch for, as well as the security strategies that will help keep you safe.


Malicious Mobile Apps by  Webroot

June 14, 2013 - In this white paper, get industry statistics about today's IT threat landscape, and why IT professionals should heighten mobile security to defend against significant malicious mobile applications.


Malicious Mobile Threats Report, 2010-2011 by  Juniper Networks, Inc.

February 15, 2012 - Threats to mobile devices are real, and lacking proper oversight and awareness can lead to serious consequences. In this report explore new and emerging mobile threats and attack vectors, as well as gain practical threat mitigation techniques.


Malware Attacks Demand a New Malware Defense Approach by

June 19, 2013 - Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from offers advice on protecting your organization from these new threats. View now to learn more!


Malware Security Report: Protecting Your Business, Customers and Bottom Line by  VeriSign Australia

August 06, 2010 - This white paper will help you understand the threats from Malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect them.


Malware Security Report: Protecting Your Business, Customers, and the Bottom Line by  VeriSign EMEA

February 18, 2011 - This white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible.


Managed File Transfer: The Need for a Strategic Approach by  Inovis

September 01, 2008 - This paper discusses how business environments are governed by increasingly stringent regulations and consumer demands for privacy. Learn how Managed File Transfer (MFT) can be your solution.


Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email by  Coviant Software Corporation

December 14, 2010 - Read this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers.


Managing Mobile Application Security in the BYO Device Era by

January 04, 2013 - Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now!


Managing PST Files: From Discovery to the Archive by  C2C Systems

May 20, 2010 - As the need to retain corporate data has increased to meet regulatory requirements, the very existence of PST files may put you at risk of failing to meet these legal requirements which could have significant implications. So what can you do about PST files? 


Managing Security on Mobile Phones by  Nokia

January 11, 2008 - This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges.


Managing Security Risks and Vulnerabilities by  IBM

January 31, 2014 - Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.


Managing the Challenges of Email Marketing by  Unica Corporation - An IBM Company

May 06, 2011 - The ideal email marketing technology solution provides the best of both worlds: timely data access to develop segmented and personalized content, plus offloading the responsibility for managing the delivery infrastructure, and ensuring deliverability. This brief paper explores the brains and beauty of successful email marketing.


Managing the Chargeback Life Cycle by  SAP America, Inc.

September 18, 2008 - The SAP Paybacks and Chargebacks application by Vistex allows manufacturers and distributors to manage the entire chargeback process life cycle, from claim initiation and receipt through adjudication, accrual, settlement, and post settlement adjustment.


Managing Web Security in an Increasing Challenging Threat Landscape by

May 31, 2013 - This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.


Managing Web Security in an increasingly Challenging Threat Landscape by

December 19, 2012 - In this expert guide, discover how new trends such as mobility, social networking, and cloud computing may be putting your organization at risk, and learn essential strategies for securing your extended enterprise from Web-based threats – read on to learn more.


Marel guarantees MS Lync & SharePoint performances to reduce travel costs by  IPANEMA TECHNOLOGIES

September 27, 2013 - This case study take an in-depth look at how one manufacturing company was able to enhance their Microsoft Lync and SharePoint solutions to improve user experience and cut travel costs.


Market trends: The Future of E-mail by

September 17, 2012 - Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.


MarketScope for E-Discovery Software Product Vendors by  Clearwell Systems

December 21, 2009 - Recession has accelerated the move to in-house e-discovery and more companies have brought, or are considering bringing, e-discovery in-house. This report will help enterprises build a business case, create a list of possible vendors and determine which ones best meet their needs.


Mastering Exchange Migrations: Controlling the Top Ten Critical Issues by  Dell Software

May 09, 2013 - This whitepaper details the top 10 Microsoft Exchange migration pain points and how you can avoid them.


Mastering Exchange Migrations: Controlling the Top Ten Critical Issues (webcast) by  Dell Software

October 08, 2013 - This webcast offers tips for planning, deploying and managing a new Exchange platform that links email, voice and fax communications into one unified infrastructure, creating a seamless user interface, integrated online services and controlled compliance.


Maturing Your DLP Strategy for Today’s Threats by

February 02, 2012 - Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.


Maximize ROI with Email Security in the Cloud by  Proofpoint, Inc.

January 09, 2009 - Watch this webinar replay and hear SaaS expert Paul LaPorte discuss how in-the-cloud and new hybrid email security solutions can deliver more value than on-premises solutions.


Maximize Your Collaboration Investment by Choosing the Right Services Approach by  Cisco Systems, Inc.

June 01, 2010 - This IDC Vendor Spotlight reviews Cisco's collaboration services. This paper also reviews IDC research on the overall collaboration market, including unified communications (UC), and looks at the impact and benefits of collaboration services on customers and partners.


Maximizing Business Email Security in Gmail by

March 28, 2013 - This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.


Maximizing the Power of Your Desktop Database: Top business advantages of moving your data online by  Intuit QuickBase

February 24, 2009 - Many organizations that rely on desktop solutions to house data are frustrated with their lack of flexibility and scalability. This paper shows how online databases are an alternative to desktop products, combining speed and ease of use with the collaborative functions required to power organizations' unique business processes and performance.


Maximum-Strength Threat Detection for Mid-Size Enterprises by  EMC Corporation

December 31, 2012 - This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.


McAfee 15 Minutes to a Secure Business: Daily Security Practices by  McAfee, Inc.

November 23, 2009 - This paper explains how McAfee has developed 15 Minutes to a Secure Business. This unique approach to security management gives IT professionals a roadmap for ensuring a safe and secure IT environment, even with limited time.


McAfee Cloud Security Platform by  McAfee, Inc.

August 11, 2011 - View this paper to explore how McAfee® Cloud Security Platform can help organizations take advantage of the cloud safely and confidently by extending existing security practices and policies to data flowing to and from the cloud.


McAfee Deep Defender: Hidden Malware Protection by  Intel

January 02, 2013 - This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.


McAfee Email and Web Security Appliance Trial by  McAfee, Inc.

September 02, 2009 - Email--Turn on the best filters, and walk away. Better malware detection rate and better spam and phishing catch rate--simply more effective than other filters. If that sounds like something you need, install a free trial of McAfee Email and Web Security Virtual Appliance behind your existing spam filter and see what real protection offers.


McAfee Endpoint Protection Suite by  McAfee, Inc.

May 31, 2013 - This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.


McAfee Initiative to Fight Cybercrime by  McAfee, Inc.

December 15, 2008 - Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.


McAfee Security Journal by  McAfee, Inc.

December 15, 2008 - This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception.


McAfee Tackles the Complexities of Endpoint Security by  McAfee, Inc.

December 02, 2008 - McAfee's solution provides strong security while lowering operational costs and simplifying compliance management. This paper describes the different components of the solution, the business value of deploying ToPS for Endpoint, and the benefits of purchasing a complete endpoint security solution from a single vendor.


McAfee Tackles the Complexities of Endpoint Security by  McAfee, Inc.

March 29, 2013 - This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.


McAfee Tackles the Complexities of Endpoint Security by  McAfee, Inc.

December 02, 2008 - McAfee's solution provides strong security while lowering operational costs and simplifying compliance management. This paper describes the different components of the solution, the business value of deploying ToPS for Endpoint, and the benefits of purchasing a complete endpoint security solution from a single vendor.


McAfee Threats Report: Third Quarter 2010 by  McAfee, Inc.

December 02, 2010 - This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe.


McAfee Total Protection for Secure Business by  Insight

August 31, 2010 - Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.


McAfee Total Protection for Secure Business: Comprehensive security in one easy-to-manage suite by  McAfee, Inc.

December 02, 2008 - Check out this brief paper to learn how McAfee helps keep small and medium-sized businesses protected with a smart, simple, secure solution designed for small and medium enterprise customers. McAfee Total Protection for Secure Business provides comprehensive endpoint, email, web, and data security--all in a single, integrated suite.


McAfee Total Protection for Secure Business by  Insight

March 16, 2010 - McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.


MDM features vs. native mobile security by

April 20, 2012 - When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each.


MDM Software: Benefits of Mobile Configuration Management by

November 27, 2012 - This E-Guide from explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.


Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight by  Core Security Technologies

October 11, 2013 - This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.


Meeting the Future with a Converged Infrastructure: Delivering Applications for the 21st Century by  VCE

July 05, 2012 - This white paper explains the flexibility and agility that a converged infrastructure can bring to your IT environment, specifically focusing on your email system. Learn how your organization can benefit from a single platform that contains everything you need to deliver a flexible, scalable email and collaboration system.


Mergers and Acquisitions: Impacts on Active Directory and Exchange Infrastructures by  Dell Software

January 29, 2013 - This whitepaper covers your three main options for your underlying infrastructure and Microsoft Exchange during a merger or acquisition.


Messaging and Web Security Best Practices for 2011 and Beyond by  GFI Software

March 01, 2011 - This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.


Messaging in the Cloud: Embedding an Email, Mobile, and Social Infrastructure by  ExactTarget

October 29, 2010 - MPaaS is a newer niche in cloud computing, but it’s a natural fit for gaining efficiencies of scale and reliability by using the infrastructure of messaging providers like ExactTarget. Read on to learn more about an unmatched one-to-one messaging solution that provides unbeatable deliverability - without the hassle of new capital investments.


Messaging Security Goes Virtual: Improve Email Security and Lower Costs with Virtual Appliances by  Proofpoint, Inc.

July 01, 2008 - Virtualization provides the ability to increase server and storage capacity without reinvesting in new hardware. That can translate into huge cost savings - not only in hardware costs, but in power, cooling, and management as well. Read on to learn how virtual appliances can deliver huge ROI.


Messaging Security: Understanding the Threat of eMail and IM Attacks by  Symantec Corporation

November 14, 2006 - Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products.


Metalogix Content Migration and Upgrade for Microsoft SharePoint Server 2010 by  Metalogix

April 28, 2010 - This paper discusses both Microsoft's out-of-box migration approaches and Metalogix's SharePoint Site Migration Manager 2010. It describes common migration scenarios, and how those scenarios can be addressed using the different migration approaches.


Microsoft Business Productivity Online Suite: Communicate Success by  Microsoft

November 11, 2009 - So you want to supercharge your team's productivity? The key is to get them together. The tools you need are ready right now in the Microsoft Business Productivity Online Suite. Watch this informative video to learn about the myriad of features and benefits that this Microsoft solution has to offer.


Microsoft Exchange 2010 on Dell Systems: Small and Branch Office Configurations by  Dell and Microsoft

January 01, 2013 - This whitepaper demonstrates the Dell Systems configuration models that are available for small and branch office configurations with Microsoft Exchange 2010. These solutions are especially designed for businesses of up to 1,000 mailboxes.


Microsoft Exchange Server: To Outsource or Not to Outsource by  Bsafe Information Systems

November 01, 2008 - Microsoft Exchange Server can bring to your company but the internal deployment delays, administrative complexity and cost of Exchange just isn’t practical.


Microsoft Exchange Server: To Outsource Or Not To Outsource by  mindSHIFT Technologies, Inc.

July 27, 2011 - Follow the lead of tens of thousands of small and mid-size businesses who use Microsoft Exchange as a hosted service and provide your company with the full power of Microsoft Exchange without the high costs, deployment delays, drain on IT resources, maintenance and upgrade headaches.


Microsoft Office Communicator 2007 R2 by  Microsoft

March 04, 2009 - This paper details Office Communicator 2007 R2, an application that provides an immediate, visual representation of a person's availability across your network. Communicate with greater flexibility, streamline communications from the applications you use most, and work from anywhere with the Office Communicator 2007 R2.


Microsoft Online: Exchange Online Forum by  Microsoft

April 16, 2010 - Access this discussion board to get with some of the most relevant tasks related to understanding, setting up, and using Microsoft Exchange Online. It will cover capabilities and operation of Exchange Online, both Standard and Deskless.


Microsoft® Exchange Server 2010 on Dell™ Systems Agile Consolidated Configurations by  Dell and Microsoft

April 12, 2013 - This informative paper provides configuration guides for consolidating and standardizing your Exchange Server 2010 environment to increase efficiency and productivity while reducing costs.


Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud by  Mimecast

August 17, 2010 - The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.


Mimosa NearPoint for Microsoft Exchange Server by  Mimosa Systems

October 01, 2008 - This white paper describes how NearPoint complements and extends Exchange 2007 and how it adds important benefits for compliance, storage management, and recovery.


Mine valuable data and achieve new levels of productivity by  CommVault Systems, Inc.

March 31, 2014 - This case study talks about the challenges one organization faced when they were attempting to keep up with growing storage demands while also growing as a business. The solution they implemented provided efficient storage capabilities with a powerful search functionality to provide easy access to valuable information.


Mirapoint RazorSafe™ by  Mirapoint Software, Inc.

September 18, 2009 - RazorSafe operates in a low-risk, passive mode and archives all emails, while ensuring minimal impact on your email infrastructure. RazorSafe uses open, standard protocols (POP, IMAP, SMTP) to archive all emails sent or received from the email server.


Mitigating Email Virus Attacks by  Cisco

June 30, 2013 - Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.


Mitigating Email Virus Attacks by  Cisco Systems, Inc.

April 21, 2014 - This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.


Mitigating Risk in a Mobile World by  Symantec Corporation

September 05, 2012 - Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.


Mitigations for Mobile Phishing Problems on the iOS Platform by

May 03, 2013 - Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.


Mobile BI: A Must Have in the New Mobile-First World by  MicroStrategy Incorporated

April 02, 2014 - "Anyone that uses BI has the need for mobile BI," said BI analyst Howard Dresner, president at Dresner Advisory Services. In this exclusive e-guide, learn more from Dresner and other mobile experts about why mobile BI is a must-have for forward-thinking businesses, and get advice on best practices for developing a mobile plan.


Mobile Collaboration from IBM - Support for Fast-Moving Businesses by  IBM

December 05, 2008 - Mobile business solutions & services keep employees on the go and in the loop.


Mobile Collaboration: Strategies and Challenges by

January 25, 2013 - This E-Guide from explores the challenges small screens present to mobile collaboration and unveils how UC strategies and vendors are responding to these issues.


Mobile Data Security and Compliance Challenges in the Enterprises by

September 19, 2012 - The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.


Mobile device protection: tackling mobile device security risks by

June 04, 2012 - The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.


Mobile Device Security: Emerging Threats, Essential Strategies by  Juniper Networks, Inc.

February 15, 2012 - In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution.


Mobile Devices Reshaping the Customer Experience: Learn how a mobility strategy can drive innovation and add a competitive edge to your contact center by  Avaya

December 31, 2012 - This resource details the opportunities that mobility presents for contact centers, and offers guidance to help you weave these opportunities into a strategy that empowers you to capitalize on mobile benefits and sharpen your competitive edge.


Mobile messaging is the key to connecting communities by

November 25, 2010 - Few could have envisioned the global success of SMS (short message service) when the first text message was sent in 1992. SMS has crossed network and technology boundaries, and continues to find new applications, as well as providing inspiration for industry innovation as IP (Internet Protocol)-based messaging builds momentum.


Mobile Phones Emerge As Security Threat Targets by  Trend Micro, Inc.

October 26, 2010 - Due to their portability and advanced computing features, mobile phones are becoming popular devices for Web surfing. Just like PCs, however, these gadgets are also susceptible to various security threats. Users must remain cautious when using their mobile phones to surf the Internet to keep their phones malware free.


Mobile Security Strategies by

November 09, 2012 - This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.


Mobile Security: A global perspective on emerging mobile security issues by

August 09, 2013 - This in-depth expert guide examines the mobile security issues that arise as organizations seek to empower their workers and connect better with consumers through increased enterprise mobility.


Mobile Security: Email is Your Biggest Risk by  TITUS

December 31, 2012 - In this white paper, you'll learn why proactive, purpose based mobile security solutions that focus on keeping e-mail secure are essential for your organization, and discover how you can start improving your own security posture today.


Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them by  GroupLogic

September 15, 2011 - Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.


Mobile Unified Communications and Collaboration (UCC) on BlackBerry 10 by  BlackBerry

April 26, 2013 - This presentation will introduce you to the solutions that BlackBerry® 10 offers for unified communications and collaborations, and how they can help your organization stay more connected than ever before. Dive in to learn more.


Mobile, Social Engineering Top Data Security Management Concerns by  Thawte Inc.

November 15, 2013 - This e-guide, from, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns.


Mobility as a Service: Best Practices for Managing Mobile Work by  Fiberlink Communications

March 15, 2008 - Fiberlink Communications studied the challenges of mobile computing as well as the best practices for the management, control and operations of a mobile platform.


Mobility, Virtualization and the Next-Generation Workplace by  Cisco Systems, Inc.

June 30, 2012 - By reading this report from Forrester Consulting, you’ll gain an understanding of the benefits, challenges and timelines for implementing workspace initiatives such as BYOD programs as well as collaboration, desktop virtualization, app virtualization and security solutions.


Mobilizing Lotus Domino by  Sybase iAnywhere

April 26, 2007 - Mobile applications must be as reliable and secure as those that run within the enterprise. View this webcast to get a demonstration of focused features to secure wireless email.


Modern Cyber Threats and Government Agencies by  M86 Security

November 18, 2011 - View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.


Modern Infrastructure June issue, The Case for Platform as a Service by

June 05, 2013 - Understanding the differences between Infrastructure and Platform as a Service can be tricky in the cloud world. This issue of Modern Infrastructure explains where Platform as a Service (PaaS) can fit into the enterprise, and how IT managers are using it.


Modern Malware Threats and Countermeasures by  Sunbelt Software

November 12, 2008 - Many of the early mass-infection events were highly publicized and very obvious events to the user, modern malware is usually designed to be much more subtle in its behaviors. learn about the newest methods and practices hackers are using.


Monitoring the Computer Room's Physical Environment by  Sensaphone

April 01, 2008 - This paper addresses the greatest environmental threats to the functionality of small to medium computer rooms and presents the time and cost savings associated with the integration of a remote monitoring system.


Motorola's Wireless Broadband Indoor/Outdoor Solution by  Motorola, Inc.

April 02, 2009 - With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution.


Moving Email Management to the Cloud: Understanding IT Transitions by  Mimecast

August 13, 2010 - During this Mimecast webinar, you'll gain an understanding of what to look for in a cloud services provider, learn how to identify your own IT transitions points related to their specific email environment, uncover how to address any potential internal security questions when transitioning to a cloud-based service, and more!


Moving to BI Publisher - Now What? Best Practices in Document Delivery Webcast by  STR Software

October 29, 2010 - Learn about native Oracle E-Business Suite BI Publisher document delivery functionality including an overview of bursting control files, what an example looks like and how you upload a bursting control file into Oracle EBS.  In addition, you will learn about advanced fax and email technology available to Oracle E-Business Suite users.


Multi Stage Filtering by  APCON, Inc.

May 07, 2014 - This informative guide explores the current challenges networks face when it comes to increased traffic and how effective packet filtering can help you.


Multi-Channel Contact Center Metrics for Analyzing Customer Satisfaction by  Five9

March 14, 2014 - This exclusive e-guide discusses the contact center metrics necessary to measure customer experience across multiple channels, including: chat, communities, email, social media, text messaging, and more.  Also, get an in-depth look at social media channels and how to avoid the top five pitfalls of social media in the contact center.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts