Anti Spam
REGISTER| SIGN IN| HELP| HOME
Browse
Project Tools
About Us
For Vendors
Search by:   
Search
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
N Listings:  Result Page 1
 

NAC at the Endpoint: Control Your Network through Device Compliance by  Sophos, Inc.


July 01, 2008 - Organizations have increasingly turned to Network Access Control (NAC) technologies to deal with their shifting IT perimeters. Software-based NAC is proving superior to hardware-based solutions as it easily provides coverage for all endpoint devices.

 

NAC: Bridging the Network Security Gap by  Sophos, Inc.


February 01, 2008 - IT managers are aware of threats to their networks, and have spent heavily on solutions to protect the corporate environment. This paper examines technology and initiatives designed to capitalize on existing investments and prevent any gaps in security.

 

NAC: Managing Unauthorized Computers by  Sophos, Inc.


February 01, 2008 - Unauthorized endpoint computers pose security risks to organizations. This paper looks at how a complete Network Access Control (NAC) solution can protect the network from unauthorized access from unknown computers or people with malicious intent.

 

Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months by  MarkMonitor


October 01, 2008 - Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.

 

NETGEAR Prosecure Security Threat Management by  NETGEAR Inc.


October 20, 2010 - An end-point solution for each threat was not a cost-effective solution, and paying for security on a per-user license basis was clearly out of the question. What’s more, a number of appliances only protected either web or email, but not both at the same time. Read this case study to learn more about an effective solution to these problems.

 

NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects by  NETGEAR Inc.


December 17, 2010 - Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.

 

Network Applications and the Impact on Corporate WANs by  XO Communications


March 06, 2012 - Learn about the expanding requirements placed on the WAN and uncover how a WAN solution can help you meet the growing needs of applications and users.

 

Network Evolution February 2013 by  SearchNetworking.com


February 01, 2013 - This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues.

 

Network Faxing and HIPAA: Security and Privacy in the Health Care Industry by  Castelle


January 01, 2007 - The Health Insurance Portability and Accountability Act (HIPAA) prescribes new health care industry rules and recommendations for the handling and transmission of patient health information.

 

Network Faxing With Open Text Network Servers by  OpenText


October 30, 2009 - <p>This resource highlights the benefits of network fax servers over traditional standalone fax machines, from reduced cost to enhanced productivity.</p>

 

Network Foundation - Cisco 1700 Series by  Cisco Systems


Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies.

 

Network Intrusion Prevention Systems -- McAfee M-8000 Aces NSS's Performance Tests by  McAfee, Inc.


March 09, 2009 - In Q4 of 2008, NSS Labs performed comprehensive testing of the McAfee M-8000 Network IPS against our Network Intrusion Prevention Systems (NIPS) testing methodology v5.22. This report summarizes the results from the tests performed in our real-world test lab.

 

Network Security Checklist by  Cisco Systems, Inc.


February 28, 2008 - Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.

 

Network Security for Small Business by  Cisco Systems, Inc.


September 25, 2008 - Achieving effective network security for small business requires a solution designed to fit your needs today and can adapt to tomorrow's threats. This paper examines how best to protect your network, as well as the benefits a secure environment offers.

 

Network security is being redefined to better block data raiders by  ComputerWeekly.com


January 26, 2011 - This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.

 

Network Security Technologies Technical Guide by  SearchSecurity.com


December 31, 2012 - Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.

 

Network Testing Labs Review: Make Internet Risks and Perils Disappear by  McAfee, Inc.


June 30, 2009 - Read this paper to learn how your organization can install a filtering device that blocks malware from your network. McAfee's Email and Web Security appliance is recognized as an effective tool for identifying "bad" URLs.

 

Network Traffic Analysis Using Cisco NetFlow by  SolarWinds, Inc.


January 01, 2008 - Take the guesswork out of network performance management by gaining complete visibility into the network in order to resolve problems as well as to optimize the network infrastructure and make informed infrastructure investment decisions. Let this whit...

 

Network Visibility Primer by  Ixia


October 25, 2013 - Access this brief webcast to discover an improved visibility solution that will help reduce network complexity, as well as offer dynamic filtering under a simplified architecture.

 

NetWrix Active Directory Change Reporter - Free! by  Netwrix Corporation


July 15, 2010 - Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance.

 

New Contact Center Metrics to Fit Busy New Customers by  Aspect


March 14, 2014 - View this exclusive e-guide to learn more from Fluss and other CRM experts as they explore the right and wrong way to leverage mobility to reach busy customers, as well as how to implement new contact center metrics to measure the effectiveness of new channels -- including email, chat, and social media.

 

New CRM Technologies Bring Sales Success to Businesses by  Scribe Software Corporation


December 26, 2013 - Creative companies are making broader use of smartphones to access more than just email – phone and mobile customer relationship management (CRM) software and finding uses for GPS, cameras and other technologies are transforming CRM practices, even for more traditional industries.

 

New CRM Technologies bring sales success to businesses by  SearchCRM


November 26, 2012 - In [this expert e-guide], read about how one emergency response software company integrated a CRM platform, resulting in major time-saving efficiencies – most importantly, an improved process that enables the company to sell product licensing. Also read about a lumber executive who recently bought into a successful social CRM.

 

New Reality of Stealth Crimeware Video by  Intel


October 03, 2012 - An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.

 

Next-generation capabilities of enterprise application-aware firewalls by  SonicWALL


March 07, 2011 - The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.

 

Next-generation Enterprise Collaboration: The Case for Deploying Open Source Solutions by  Rivet Logic Corporation


October 01, 2008 - View this paper and learn how deploying effective enterprise and Web collaboration solutions can result in significant organizational and end user benefits for the enterprise, internal and external audiences, business end-users and IT departments.

 

Next-Generation Firewall by  SonicWALL


February 28, 2011 - It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.

 

Next-Generation IPS for Dummies by  Sourcefire


January 01, 2013 - Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.

 

Next-Generation Secure Web Gateways:The Case and Criteria for Embedded DLP with Advanced Malware Defenses by  Websense, Inc.


May 03, 2012 - <p>While the Web has become a core business communication platform, it’s also a highly popular target for cybercriminals and hackers. This resource explores how to mitigate the risk of data loss over Web channels, uncovering the business need for DLP as part of Web Security Gateways and the key criteria to consider when choosing a solution.</p>

 

NGFW Critical to SMB Network by  Dell Software


January 08, 2013 - In today's sophisticated and rapidly changing threat landscape, traditional firewall could be increasing your security risks rather than alleviating them. Next-Generation Firewalls dramatically improve protection over traditional firewalls.

 

Nice Office® from AT&T by  AT&T Corp


October 14, 2011 - Professionals who are always on the go need more than just access to email to stay productive. Nice Office for AT&T is a simple way to take your business on the road, synchronizing your smartphone, Outlook and web account. View this product brief to explore key features and benefits.

 

Niksun NetDetectorLIVE Data Sheet by  NIKSUN


NetDetectorLive is a content and compliance monitoring appliance enabling companies to monitor content flowing in and out of their corporate networks.

 

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls by  IBM


December 31, 2013 - This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key techniques for preventing these intrusions.

 

Not all Malware Detection is Created Equal by  Sophos, Inc.


November 05, 2009 - The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.

 

Not Living Up to Expectations? Use Cases and Solutions for Common SCCM Issues by  Promisec


May 23, 2014 - This informative guide outlines 5 use cases and solutions for common SCCM issues.

 

Notes Migration Tools That Reduce Stress and Increase Success by  Dell Software


March 07, 2011 - Migrating from Lotus Notes to Exchange and SharePoint can be complex and expensive, so proper planning and execution is key. You must ensure that you minimize downtime and data loss – while keeping productivity high - when transitioning mailboxes and applications.

 

NSS Labs - Breach Detection System Product Analysis by  Fortinet, Inc.


April 07, 2014 - This informative whitepaper discusses the effectiveness of one top-tier breach detection platform and how it can improve your security strategy.

 

Nutra-Flo Drives Global Business with Robust Collaboration Platform by  IBM


March 13, 2009 - Read this case study to see how Nutra-Flo Company adopted Lotus Notes and Domino 8 to collect collaborative applications in a single customizable interface and conveniently group communications, helping to improve staff productivity.

 
The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts