Anti Spam
REGISTER| SIGN IN| HELP| HOME
Browse
Project Tools
About Us
For Vendors
Search by:   
Search
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
P Listings:  Result Page 1
 

Panda’s Managed Email Protection Service by  Panda Security


July 25, 2009 - This data sheet provides information on Panda's Managed Email Protection Service, a managed email cleaning service guaranteeing 100% malware-free email, as well a series of key features of a great value to any company.

 

PassMark Success: Endpoint Protection by  Symantec Corporation


April 10, 2013 - Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.

 

Password Change Service - Avaya CallPilot by  Global Knowledge


March 20, 2013 - Administrators spend a lot of their time simply resetting passwords for users who have gotten locked out of their mailboxes because they forgot their password. This white paper shows an administrator how to set up and utilize Password Reset Service, introduced with CallPilot Release 5.

 

PC on a Stick: A Portable Endpoint Security Nightmare by  Lumension


January 01, 2007 - Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns.

 

Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company by  Webroot


May 31, 2013 - This resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.

 

Podcast: Cutting Infrastructure Costs by Stopping Unwanted Mail at the Perimeter: Introduction to Stopping Unwanted Mail by  Sendmail, Inc.


October 31, 2008 - This new Ask the Expert podcast series focuses on how businesses can significantly cut costs by modernizing their messaging infrastructure and stopping unwanted mail from ever touching it.

 

Podcast: Emerging Security Threats: Know Your Enemy in 2014 by  Imperva


February 24, 2014 - Enterprises must protect themselves from sophisticated attacks that can escape notice by host-based detection systems and steal millions. Johanne B. Ullrich, dean of research for the SANS Technology Institute, shows you how.

 

Podcast: End-to-End Secure Client to Cloud Access by  Intel


March 01, 2011 - In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.

 

PODCAST: Integrated Network Faxing: The Key To Improved Productivity And Information Security by  GFI Software


August 01, 2008 - With an integrated network faxing solution, you can save thousands of dollars in labor costs alone and improve productivity. At the same time your faxes can be readily prepared, and more professional in appearance. Higher productivity and lower costs...

 

Podcast: Using Directory Servers for Intelligent Email Management: Introduction to Directory Servers by  Sendmail, Inc.


October 31, 2008 - This new podcast series focuses on how businesses can leverage Directory Servers for a more secure and intelligent messaging infrastructure.

 

Poison Ivy: Assessing Damage and Extracting Intelligence by  FireEye


December 31, 2013 - This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.

 

Ponemon Global Study on Mobility Risks by  Websense, Inc.


February 01, 2012 - With the proliferation of mobile devices only progressing, it’s important fully to understand this trend to know how to build a robust security strategy to mitigate risks. This resource uncovers key findings based on a survey of 4,640 IT pros, exploring the major security issues of mobility and what they are doing to effectively address them.

 

Post-Migration Best Practices: Exchange Environment Operation by  Dell Software


April 11, 2011 - In this Quest white paper, discover best practices - straight from Industry experts Nelson Ruest and Danielle Ruest - to help you have a successful post-migration operation. Learn why you MUST have the same level of post-migration planning that you had for pre-migration, and discover four key aspects of post-migration management you must know.

 

Practical Advantages of Fireware® XTM for Hands-On IT Administrators by  WatchGuard Technologies, Inc.


July 26, 2009 - Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.

 

Practical Advice for Migrating to Cloud Collaboration by  Cisco Systems, Inc.


November 08, 2013 - The following white paper outlines the importance of unified communications and how to go about deploying a successful solution. Discover trends of success with application prioritization, best practices for unification, and collaboration solutions.

 

Practical Steps toward Information Lifecycle Management by  EMC Corporation


November 17, 2006 - In this Q4 06 paper by the Clipper Group, you'll get current, practical advice on how your organization can implement an ILM strategy - from discovery of your information assets - to actively managing data over its lifecycle.

 

Premier Issue of the CIO Decisions Midmarket Ezine - "The Green Monster" by  CIO Decisions


June 01, 2008 - This document highlights what you need to know about power consumption, server virtualization and outfitting data centers to make the most of the new technologies.

 

Preparing For Email and File Archiving Best Practices by  Proofpoint, Inc.


January 15, 2009 - Learn how to get started on building a business case for deployment, preparing your organizations' employees and understanding the new federal rules of civil procedure.

 

Presentation Transcript : Using Exchange Server 2007 for Voicemail by  Microsoft


December 17, 2008 - Read this paper to learn the basics of unified communications deployment, unified messaging and office communications server deployment, and the features offered by these technologies.

 

Presentation Transcript: 'Social Email' Drives 4th Generation Collaboration Solutions by  Mainsoft Corporation


February 01, 2011 - How do we overcome the enterprise 2.0 adoption gap and get people to use document collaboration tools, social networks, and more? And, what can we do today to realize the so-called 4th generation workspace, especially when we have a mixed IT environment? Read this presentation transcript with the two leading experts on collaboration to find out.

 

Presentation Transcript: 3 Reasons to Consider Google Apps by  Google


March 17, 2010 - Read this presentation transcript with John Buckholz, VP of IT, to learn how Google Apps compares to on premise and hosted Microsoft Exchange, how LCC migrated the company intranet from Microsoft Sharepoint to Google Sites, and more!

 

Presentation Transcript: 3 Reasons to Consider Google Apps by  Google Apps


January 19, 2011 - Read this presentation transcript with John Buckholz, VP of IT, to learn how Google Apps compares to on premise and hosted Microsoft Exchange, how LCC migrated the company intranet from Microsoft Sharepoint to Google Sites, and more!

 

Presentation Transcript: 3 Steps to Securing Private Data in the Public Cloud by  Sophos, Inc.


June 12, 2012 - Public cloud storage services enable users to easily share and store data, but they also introduce new security challenges that often clash with exiting IT policies. In this presentation transcript, learn how IT managers can help their users manage access to the public cloud without placing your data or business at risk.

 

Presentation Transcript: A Look at Hosted Exchange and Hosted Email by  USA.NET, Inc.


August 01, 2009 - Nowadays, more and more IT shops are considering hosted Exchange services rather than running their mail server locally. They need to decide whether or not it is right for their company. Take a deeper look at hosted Exchange and hybrid models in this presentation transcript of the 'A Look at Hosted Exchange and Hosted Email' webcast.

 

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by  McAfee, Inc.


September 29, 2009 - Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits.

 

Presentation Transcript: Automating Fax and Email Orders into SAP Systems by  Esker Inc.


March 07, 2011 - Most orders sent by fax and e-mail end up as paper that gets pushed around the office. Those are the ones that cost the most to process and can cause costly errors. This webcast transcript explores an approach to automate fax, e-mail, EDI, web and mail orders into SAP to streamline your order processing.

 

Presentation Transcript: Best practices for evaluating and selecting content analytics tools by  IBM


June 22, 2011 - In this presentation transcript with Seth Grimes, Principal Consultant at Alta Plana Corp. and originator of the Text Analytics Summit, listeners will learn about best practices for evaluating content analytics tools and choosing the technology that best meets their business requirements.

 

Presentation Transcript: Building a Comprehensive Notes/Domino Archiving Strategy by  Sherpa Software


March 25, 2010 - This presentation transcript explains why archiving Domino content (including email and applications) is necessary for most companies. Learn about current archiving tool trends and best practices for Domino. Discover how to enlist a strategy that will best fit your organization's archiving needs.

 

Presentation Transcript: Considerations for IT by  Google Apps


December 15, 2009 - Read this transcript of the 'Considerations for IT' podcast to learn why companies have chosen Google Apps to improve their IT infrastructures. Learn which technical and business factors drove one company to adopt this technology. Determine how this technology can be used in your IT environment to improve Web application performance.

 

Presentation Transcript: Controlling Electronic Information: Managing the Flood by  RSD


September 10, 2009 - Many companies use electronic documents to conduct business, but there is only so much storage to hold all of this data. This expert Presentation Transcript discusses how to archive messages without having to manually delete items on a monthly basis.

 

Presentation Transcript: E-mail Archiving-- Enterprise Scalability & Fast Search by  Hewlett-Packard Company - Information Management


August 18, 2010 - Read this three part series of presentation transcripts featuring Gary Bergo, Master Architect for Hewlett-Packard’s Information Management Group. Gary will show you HP’s approach to enterprise scalability and fast search and retrieval capabilities for e-mail archiving.

 

Presentation Transcript: E-mail Archiving-- Preserving End-to-End Chain of Custody by  Hewlett-Packard Company - Information Management


August 18, 2010 - Why is the architecture of your e-mail archiving solution so important? Read this presentation transcript featuring Gary Bergo, Master Architect for Hewlett-Packard’s Information Management Group.

 

Presentation Transcript: E-mail Archiving-- Replication and Disaster Recovery by  Hewlett-Packard Company - Information Management


August 18, 2010 - Why is the architecture of your e-mail archiving solution so important? Read this presentation transcript  featuring Gary Bergo, Master Architect for Hewlett-Packard’s Information Management Group.

 

Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management by  Symantec Corporation


June 29, 2009 - Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.

 

Presentation Transcript: Endpoint security fundamentals by  Sophos, Inc.


June 25, 2009 - This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

 

Presentation Transcript: Getting Started with Unified Communications in an Exchange 2007 Environment by  Dell, Inc.


February 26, 2009 - Check out this webcast transcript to learn how to implement Office Communications Server in a Microsoft Exchange environment, looking at unified communications solutions encompassing unified messaging, data web conferencing and audio conferencing.

 

Presentation Transcript: How to Secure Your Mobile Devices by  Dell SecureWorks UK


August 22, 2011 - In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization.

 

Presentation Transcript: Integrating Virtual-Aware Security Technologies by  Intel


August 24, 2011 - There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options.

 

Presentation Transcript: Iron Mountain - E-mail Management by  Iron Mountain


August 01, 2009 - Read this presentation transcript and free yourself from the daily hassles of e-mail management and fighting the inherent risks of e-mail Spam, viruses and noncompliance. Trust Iron Mountain's enterprise-class, cloud-based e-mail management service for 100% e-mail uptime at a cost savings of up to 60% versus on-premises solutions.

 

Presentation Transcript: Is SaaS the Future of Enterprise Security? by  Webroot


June 04, 2009 - This presentation transcript discusses how The Web has become a primary attack vector most businesses are not yet prepared for. Compliance and data leakage are a growing concern, and the economic downturn is causing every organization to re-evaluate its spending on personnel and IT resources and how SaaS may just be the answer to these

 

Presentation Transcript: Learn How to End Email Downtime, Forever! by  Teneros and HP


April 13, 2009 - Email is the foundation of business communication, so outages can have a dramatic impact on productivity. This webcast transcript showcases a technique to prevent email downtime that's non-invasive, remotely managed 24x7, and eliminates the danger of database corruption.

 

Presentation Transcript: Malware Reloaded - Mitigating the Next Evolution of Cyber Attacks by  Dell SecureWorks UK


August 22, 2011 - View this presentation transcript to explore the evolution of the threat landscape, new behaviours that have been identified, a quantitative analysis of threat intelligence, and inferences, conclusions, and the road ahead.

 

Presentation Transcript: Mobile Strategies, Part 1: Harnessing the IT Consumerization Deluge by  Dell, Inc. and Intel®


January 25, 2012 - This presentation transcript reveals key findings from a recent consumerisation poll and provides recommendations and best practices to help organisations address these key topics. Obtain predictions for the future of the media tablet market and gain insight into five trends that are shaping the consumerisation landscape.

 

Presentation Transcript: PCI DSS v1.2: Best Practices and Useful Tips by  ESET


January 15, 2010 - While there are multiple regulatory compliance standards, the Payment Card Industry Data Security Standard (PCI DSS) addresses a sector with the greatest number of data breaches. Check out this Presentation Transcript to discover key differences between PCI DSS version 1.1 and 1.2, best practices for ensuring compliance, and tips.

 

Presentation Transcript: Phishing and the Underground Economy by  MarkMonitor


January 06, 2009 - This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.

 

Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services by  Websense, Inc.


March 14, 2012 - Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.

 

Presentation Transcript: Revelations and Realities of Endpoint Security by  GFI Software


July 29, 2011 - Companies face numerous complexities when securing endpoints. In this presentation transcript, learn how to evaluate your business needs and come up with a comprehensive strategy to address endpoint security. Experts discuss both challenges with endpoint security as well as solutions available today.

 

Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business by  Sunbelt Software


December 03, 2010 - In this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.

 

Presentation Transcript: Showdown in New Mexico, Google Apps vs. Microsoft Exchange by  Google Apps


January 19, 2011 - Read this presentation transcript featuring James Ferreira, CIO for the New Mexico State Attorney General's Office, to learn about migrating to cloud computing applications.

 

Presentation Transcript: Showdown in New Mexico, Google Apps vs. Microsoft Exchange by  Google Apps


March 15, 2010 - Read this presentation transcript featuring James Ferreira, CIO for the New Mexico State Attorney General's Office, to learn about migrating to cloud computing applications.

 

Presentation Transcript: Showdown in New Mexico, Google Apps vs. Microsoft Exchange by  Google Apps


January 19, 2011 - Read this presentation transcript featuring James Ferreira, CIO for the New Mexico State Attorney General's Office, to learn about migrating to cloud computing applications.

 

Presentation Transcript: State of New York Government Case Study by  McAfee, Inc.


October 14, 2009 - Read this presentation transcript to see how the State of New York saved millions of dollars, reduced management time, and improved compliance by standardizing on McAfee for complete system protection.

 

Presentation Transcript: State of the Threat by  Websense, Inc.


July 29, 2009 - The monetizing of economic crime in Web 2.0 makes Web security a top priority for security pros. Traditional defenses are obsolete, so read this presentation transcript, taken from the video cast of the same name, and learn best practices for creating a new approach to Web security.

 

Presentation Transcript: The Future of .PST Files by  Sherpa Software


June 23, 2010 - In this presentation transcript featuring Microsoft MVP Brien Posey, learn about the challenges of .pst file management and learn how to use this technology in Exchange environments. Discover how the new features in Exchange Server 2010 will impact .pst files. Find out about the future of this technology and learn how to create archive mailboxes.

 

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012 by  Symantec Corporation


June 08, 2012 - In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.

 

Presentation Transcript: Three Reasons Why Security Fails and What to Do About It by  Sophos, Inc.


February 03, 2010 - Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.

 

Presentation Transcript: WWW - World Wide Weaponization by  ESET


November 10, 2009 - The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.

 

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by  Google Apps


June 11, 2010 - Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.

 

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by  Google Apps


January 19, 2011 - Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.

 

Presentation: City & Guilds unified communication stragey by  ComputerWeekly.com


March 18, 2014 - Ian Turfrey, IT director at City & Guilds, explains how unified communications technology has transformed the qualifications awarding body in this presentation .

 

Presentation: The BBC’s Unified Communications Strategy by  ComputerWeekly.com


March 14, 2014 - Steve Shepherd, head of IT and business alignment at the BBC, explains how unified communications technology is transforming the BBC.

 

Presentation: Virgin Media’s unified communications strategy by  ComputerWeekly.com


March 17, 2014 - Colin Miles, director of IT Technical Services of Virgin Media explains how unified communications has transformed the company, in this presentation for Computer Weekly's 500 Club for IT leaders.

 

Preventing Malware Attacks by  Websense, Inc.


February 13, 2012 - As new technologies emerge, so do new, and often defenseless avenues for malware attacks. In this expert guide, uncover proactive security measures for malware defense as well as gain best social networking practices for preventing social network malware.

 

Preventing Weaponized Malware Payload in Advanced Persistent Threats: Strategies for Layered Endpoint Defense Against the APT Kill Chain by  Lumension


February 04, 2013 - This white paper explores a solution through a defense-in-depth approach to endpoint security that will help bolster your security posture including: antivirus, device control, hard-drive and media encryption, and more.

 

Prince George’s County School District Streamlines Email Investigations and Boosts IT Productivity with Google Apps and Google Message Discovery by  Google Postini


December 03, 2009 - In March 2008, Prince George's County Public Schools ran a pilot of Google Apps Education Edition. In this case study, you'll learn how they used it to dramatically reduce time searching for email records from weeks to minutes, and how it also helped reduce costs in their messaging and collection system.

 

Problematic - Unloved - Argumentative (PUA): What is a potentially unwanted app by  ESET


November 04, 2011 - In this paper, discover what is a Potentially Unwanted Application (PUA) and explore the differences between threats posed by malicious types of software such as computer viruses and worms, and those which are classified as being potentially unwanted.

 

Productivity, Internet Abuse, and How to Improve One by Eliminating the Other by  Bloxx, Inc.


September 05, 2008 - This white paper explains the effect of Internet abuse on employee productivity, which is huge and not fully appreciated.

 

Productivity, Mobility and Efficiency: Keeping Your Devices Secure by  Cisco Systems, Inc.


November 07, 2012 - In this research report, uncover how organizations are – or should be – responding to the invasion of mobile devices in the workplace, the emerging trends in enterprise mobility today, best practices for ensuring effective mobile policies, and much more!

 

Proliferation of devices at mid-size businesses impacts change in IT development by  Cisco Systems, Inc.


July 16, 2013 - This helpful infographic demonstrates today's mobility trends so that you can get a firm understanding on where specifically organizations are looking to boost their mobility and where they already have.

 

Proofpoint Messaging Security Gateway Virtual Edition by  Proofpoint, Inc.


November 17, 2006 - VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.

 

Proofpoint TechBrief: Email Archiving and Exchange 2010 by  Proofpoint, Inc.


March 09, 2010 - Proofpoint ARCHIVE™ greatly extends the email retention features promised in Exchange 2010, delivers the robust features and performance that enterprises truly require and makes those features available today, without requiring an upgrade to the 2010 platform. Read this techbrief to learn more!

 

Proper use of VPN and RPC/HTTPS by  F5 Networks


November 12, 2012 - Consult this expert E-guide to find out more about the possible options to connect Outlook to Exchange, and you can find the right match for your organization. Weigh the advantages of VPN or RPC/HTTPS by reading this resource now.

 

Protect and Perform: Ensuring Online Business in Asia-Pacific by  Akamai Technologies


December 31, 2013 - This white paper underscores the importance of cyber-attack prevention, which can be attended to by a third-party supplier. Learn from those who have come before you as you read about a low-cost airline that found a third-party solution for their security needs.

 

Protect Your IT Systems with Next Generation Security by  IBM


October 31, 2012 - This informative whitepaper covers the constant threat of hackers to the security of your organization and offers a solution to help keep your data safe.

 

Protect, Detect, and Correct: What's New in Tripwire Enterprise 8 by  Tripwire, Inc.


February 24, 2011 - Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine.

 

Protecting Against the New Wave of Malware by  GFI Software


March 11, 2011 - Managing threats to the endpoint infrastructure is becoming increasingly difficult for most organizations. At the same time, many anti-malware defenses are not keeping up with the growing threats posed by malware. This white paper addresses the variety of issues facing organizations today in the context of their system manaagement challenges.

 

Protecting Against the New Wave of Web Threats by  BlueCoat


January 15, 2009 - This Osterman Research White Paper discusses the extent of today's Web threats and provides recommendations on key aspects of a defense against them. It also provides information on Blue Coat's offerings.

 

Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization by  McAfee, Inc.


March 08, 2010 - This document takes a look at several aspects of data protection and HIPAA compliance and explains how a Data Loss Prevention (DLP) solution can help IT professionals discover sensitive data at rest, monitor traffic in real time, and capture events for after-the-fact investigations.

 

Protecting Commercial Online Banking Customers from Next-Generation Malware by  IronKey


November 22, 2010 - Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.

 

Protecting Data from the Cyber Theft Pandemic by  FireEye


April 20, 2009 - Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.

 

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by  Websense, Inc.


August 18, 2009 - The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0.

 

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by  Websense, Inc.


July 01, 2008 - Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more.

 

Protecting Microsoft Exchange by  Double-Take Software


October 14, 2009 - Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.

 

Protecting Microsoft Exchange by  Double-Take Software


July 01, 2008 - Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.

 

Protecting the Network Perimeter: Controlling what gets through—into and out of your organization by  McAfee.


February 01, 2012 - The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow.

 

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by  Veracode, Inc.


May 10, 2010 - Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities.

 

Protecting Your Business: Services and Time Critical Applications in and Cost-effective Way by  Alcatel-Lucent


January 01, 2008 - Ensuring that business operations continue regardless of any circumstance is big business. Whether disruptions come as a result of natural disasters; sabotage (malware); technical failures in data storage or networking components.

 

Protecting Your Enterprise Network by  Infoblox


August 30, 2013 - This comprehensive white paper provides deeper insight into enterprise IT security threats and the implementation of modern tools that are available to build more robust domain name server (DNS) infrastructures, including DNS firewalls to close security gaps.

 

Protecting Your Multi-Platform Network: The New Wave of Attacks by  ESET


June 20, 2011 - Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.

 

Protecting your Network and Data Center with Next-Gen Firewalls by  Palo Alto Networks


April 13, 2012 - Learn how your organization can take advantage of next-generation firewalls. This resource provides clarity on this popular security solution so you can determine which features are right for your needs.

 

Protecting Your Website With Always On SSL by  Symantec Corporation


May 01, 2012 - This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.

 

Protection for Banking and Financial Services by  Neustar®


March 20, 2014 - This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.

 

Pursue fraud with IBM Intelligent Investigation Manager by  IBM


October 02, 2013 - Analyst teams frequently do not have enough time to sift through the mountains of information to discover patterns that may lead to investigative breakthroughs. View this resource to learn more about optimizing investigation effectiveness with a flexible collaborative case investigation.

 

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk by  Lumension


August 01, 2008 - This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.

 

Putting Web Threat Protection and Content Filtering in the Cloud by  Webroot


December 31, 2012 - In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.

 
The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts