Anti Spam
REGISTER| SIGN IN| HELP| HOME
Browse
Project Tools
About Us
For Vendors
Search by:   
Search
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
R Listings:  Result Page 1
 

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security by  Dell SecureWorks UK


March 01, 2012 - In this case study explore how implementing Dell SecureWorks enabled Pharmaceutical firm, ProStrakan, to enhance its security and compliance posture by providing 24/7 monitoring, instant alerts and in-depth threat analysis.

 

Reap the benefits of Microsoft® Exchange sooner with Dell solutions by  Dell and Microsoft


April 15, 2013 - This resource discusses the system requirements for running Exchange 2010 and offers advice to help you evaluate your existing infrastructure. Learn more about advanced system solutions that can maximize the advantages of this latest Exchange upgrade.

 

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection by  SearchSecurity.com


September 17, 2013 - This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.

 

Reduce Risks and Protect Critical Information with Ease - Presentation Transcript by  Symantec


August 02, 2010 - The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.

 

Reduce Storage Costs with Enterprise Info Archiving by  CommVault Systems, Inc.


November 11, 2013 - This in-depth resource provided by Gartner evaluates 22 vendors in the enterprise info archiving market by highlighting their strengths, weaknesses, and completeness of vision. Read on to see where each vendor is headed, and which vendors to watch.

 

Reducing Archiving Costs by Implementing Email Labelling Technology by  Boldon James


July 20, 2011 - This paper offers an alternative approach to archive policy selection that uses email message labelling technology. View now to learn how labelling removes the need for end-users to understand archiving, and instead allow them to apply labels to each email message, ultimately reducing your email archiving costs.

 

Reducing the Cost and Complexity of Endpoint Management by  IBM


September 30, 2013 - This guide explores key tactics for thwarting cyber-attacks, how to protect your system, and the benefits of utilizing endpoint management.

 

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by  Lumension


December 31, 2009 - In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.

 

Reducing the Risks of Social Media by  SearchSecurity.com


November 15, 2013 - Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media.

 

Regulations Shift Focus on Outbound Email Security by  Proofpoint, Inc.


July 10, 2008 - Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them.

 

Reinventing Branch Office Security: Configuration-less UTM protection for small offices by  Astaro


July 15, 2010 - When it comes to IT security, almost all businesses using IP networks to transmit data will know that they have to protect themselves, and they will have systems in place to keep their data secure. However, this is often focused at the head office. For workers that are not at the central office, the question of security is a harder one to answer.

 

Remote Access VPNs: Business Productivity, Deployment, and Security Considerations by  Cisco Systems, Inc.


February 01, 2008 - This white paper outlines the two primary methods of deploying remote access VPNs: IPsec and SSL. Read how to choose the right VPN technology for your organization, understand security considerations, and how to secure your remote-access VPN.

 

Removing the Risks and Complexities of Business Email Management by  Iron Mountain


June 03, 2009 - Email is central to all organizations and has become the most essential business application of all. As a result, the ability to continuously protect, store, manage and archive great volumes of email is now a key business issue; Iron Mountain's Total Email Management Suite is the answer.

 

Resilient, Stable, Scalable and Flexible IT Infrastructure for Exchange 2010 by  Hitachi Data Systems


November 13, 2013 - This informative paper explores a converged platform for Microsoft Exchange 2010 that's engineered for rapid deployment and tightly integrated with powerful new features in Microsoft Exchange 2010 for resilience, predictable performance and seamless scalability. Read on now to learn more.

 

Restructuring, Consolidating, and Merging Active Directory, What You Need to Know Before Your Start by  Dell Software


March 06, 2012 - This whitepaper details the importance of detailed planning when making changes to your directory service domains and provides some key considerations and more.

 

Retail Cyber Crime by  LogRhythm, Inc.


April 30, 2014 - This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.

 

Retail Cyber Crime by  LogRhythm, Inc.


April 18, 2014 - This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.

 

Rethink Customer Service for a Multichannel World by  SearchCRM


February 27, 2014 - In order to really succeed at customer relationships, C-suite executives are -- finally -- warming up to multichannel communication.

 

Rethink Defense-In-Depth Security Model For BYOD by  SearchSecurity.com


July 03, 2013 - This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.

 

Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption by  BlackBerry


November 08, 2007 - This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements.

 

Rewriting the Rules of Patch Management by  IBM


February 09, 2011 - By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.

 

RIM/Lotus Collaboration and Mobility: More than Business Value by  BlackBerry


February 19, 2010 - This IT Briefing discusses how advanced collaboration applications from IBM Lotus and BlackBerry smartphones from RIM offer state-of-the-art technology and business advantages to corporate users.

 

ROI CASE STUDY - GOOGLE APPS & TVR COMMUNICATIONS by  Google Apps


January 01, 2009 - In 2007, TVR found that its dated version of Exchange, which was running on Windows NT 4, was running out of disk space and needed to be upgraded or changed. TVR deployed Google Apps to replace its existing Microsoft Exchange environment and improve collaboration, reducing IT costs and risk while increasing agility.

 

Routing and switching considerations: What you may be missing by  Cisco Systems, Inc.


October 12, 2011 - This expert E-Guide discusses how routers actually work, how you can keep your network traffic flowing smoothly and five major considerations for your next network infrastructure project.

 

RTDiscover by  FaceTime Communications


December 10, 2007 - The Internet has changed. Email and Web browsing traffic entering enterprise networks is now dwarfed by greynets like IM, VoIP and P2P, opening channels for potential malware coming in, as well as the danger of sensitive information leaking out

 

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting by  Bit9, Inc.


June 09, 2009 - Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment.

 
The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts