Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
R Listings:  Result Page 1

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security by  Dell SecureWorks UK

March 01, 2012 - In this case study explore how implementing Dell SecureWorks enabled Pharmaceutical firm, ProStrakan, to enhance its security and compliance posture by providing 24/7 monitoring, instant alerts and in-depth threat analysis.


Reap the benefits of Microsoft® Exchange sooner with Dell solutions by  Dell and Microsoft

April 15, 2013 - This resource discusses the system requirements for running Exchange 2010 and offers advice to help you evaluate your existing infrastructure. Learn more about advanced system solutions that can maximize the advantages of this latest Exchange upgrade.


Rebranded Quadmark revamps its IT solutions with Google Apps by  Google

February 18, 2014 - This exclusive case study discusses the set of solutions that a global consulting organization was able to use to revamp their IT environment and take full advantage of their mobile workforce.


Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection by  Webroot

September 17, 2013 - This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.


Reduce Risks and Protect Critical Information with Ease - Presentation Transcript by  Symantec

August 02, 2010 - The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.


Reducing Archiving Costs by Implementing Email Labelling Technology by  Boldon James

July 20, 2011 - This paper offers an alternative approach to archive policy selection that uses email message labelling technology. View now to learn how labelling removes the need for end-users to understand archiving, and instead allow them to apply labels to each email message, ultimately reducing your email archiving costs.


Reducing the Cost and Complexity of Endpoint Management by  IBM

September 30, 2013 - This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.


Reducing the Cost and Complexity of Endpoint Management by  IBM

September 30, 2013 - This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.


Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by  Lumension

December 31, 2009 - In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.


Regulations Shift Focus on Outbound Email Security by  Proofpoint, Inc.

July 10, 2008 - Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them.


Reinventing Branch Office Security: Configuration-less UTM protection for small offices by  Astaro

July 15, 2010 - When it comes to IT security, almost all businesses using IP networks to transmit data will know that they have to protect themselves, and they will have systems in place to keep their data secure. However, this is often focused at the head office. For workers that are not at the central office, the question of security is a harder one to answer.


Remote Access VPNs: Business Productivity, Deployment, and Security Considerations by  Cisco Systems, Inc.

February 01, 2008 - This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.


Removing the Risks and Complexities of Business Email Management by  Iron Mountain

June 03, 2009 - Email is central to all organizations and has become the most essential business application of all. As a result, the ability to continuously protect, store, manage and archive great volumes of email is now a key business issue; Iron Mountain's Total Email Management Suite is the answer.


Retail Cyber Crime by  LogRhythm, Inc.

April 18, 2014 - This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.


Rethink Customer Service for a Multichannel World by  SearchCRM

February 27, 2014 - In order to really succeed at customer relationships, C-suite executives are -- finally -- warming up to multichannel communication.


Rethink Defense-In-Depth Security Model For BYOD by  McAfee, Inc.

July 03, 2013 - This e-guide from explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.


Rethinking Your Enterprise Security by  Hewlett-Packard Company

May 31, 2012 - The fact is that the world is constantly evolving, and always connected, and your enterprise must be too. View this resource to learn about modern threats and what you should do to remains safe.


Return to Sender: Improving Email Security with DMARC by  Imperva

February 27, 2014 - Learn how domain-based messaging authentication, reporting and conformance, or DMARC, can enhance your email security in this expert e-guide.


Revamp your IT solutions with Google Apps by  Google

February 25, 2014 - This exclusive case study discusses the set of solutions that a global consulting organization was able to use to revamp their IT environment and take full advantage of their mobile workforce.


Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption by  BlackBerry

November 08, 2007 - This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements.


Rewriting the Rules of Patch Management by  IBM

February 09, 2011 - By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.


RIM/Lotus Collaboration and Mobility: More than Business Value by  BlackBerry

February 19, 2010 - This IT Briefing discusses how advanced collaboration applications from IBM Lotus and BlackBerry smartphones from RIM offer state-of-the-art technology and business advantages to corporate users.



January 01, 2009 - In 2007, TVR found that its dated version of Exchange, which was running on Windows NT 4, was running out of disk space and needed to be upgraded or changed. TVR deployed Google Apps to replace its existing Microsoft Exchange environment and improve collaboration, reducing IT costs and risk while increasing agility.


Routing and switching considerations: What you may be missing by  Cisco Systems, Inc.

October 12, 2011 - This expert E-Guide discusses how routers actually work, how you can keep your network traffic flowing smoothly and five major considerations for your next network infrastructure project.


RTDiscover by  FaceTime Communications

December 10, 2007 - The Internet has changed. Email and Web browsing traffic entering enterprise networks is now dwarfed by greynets like IM, VoIP and P2P, opening channels for potential malware coming in, as well as the danger of sensitive information leaking out


Running A Fully Controlled Windows Desktop Environment with Application Whitelisting by  Bit9, Inc.

June 09, 2009 - Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts