Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
S Listings:  Result Page 1 | 2

Saaspoint Speeds Project Completion by Making Information Available “Anytime, Anywhere” With Google Apps for Business by  Google

January 06, 2011 - To reinvent their internal communications, Saaspoint implemented Google Apps for Business, bringing Gmail, Google Calendar, Google Docs, Google Sites and Google Video to all of their internal users. Access this case study now to learn about this transition and the benefits achieved.


SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization by  FireEye

March 06, 2014 - Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security.


SAP Hands-On Mobile BI Experience Webcast by  SAP America, Inc.

December 02, 2011 - When you’re on the go, you need to do more than simple tasks. You need to tackle the same challenges as when you’re in the office. But how easy is it to do all of that on your iPad? Take this opportunity to find out for yourself. Watch this webcast and walk through the complete mobile experience using your iPad.


School Bus Operator Drives Competitive Advantage with Blackberry Solution by  BlackBerry

February 25, 2009 - Southland Transportation, providing school bus and other transportation services, deployed BlackBerry® smartphones, with a custom-built application, to their drivers so they can report road conditions and delays quickly and easily providing timely and accurate updates for everyone.


SCOPIA Connector for IBM Lotus Sametime by  RADVISION

March 28, 2008 - RADVISION's SCOPIA Conferencing Platform with SCOPIA Desktop brings advanced conferencing capability to IBM's next generation unified communications enhancing the instant messaging and conferencing capabilities of Lotus Sametime.


Scribe - Equinox Fitness Case Study by  Scribe Software Corporation

March 12, 2008 - Active and prospective members have diverse needs and interests, and Equinox uses two primary applications to adress them.


Second 'Annual Cost of Cyber Crime' Study by  ArcSight, an HP Company

August 03, 2011 - This study quantifies the economic impact of cyber attacks and observes cost trends over time. View now to gain a better understanding of the cost of cyber crime to help your organisation determine the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.


Secure Cloud Access Reference Architecture Model by  Intel

May 10, 2011 - Enterprise cloud computing continues to evolve in 2011, and organizations are developing strategies to ensure that they remain aware of security risks when it comes to operations in the cloud. In this webcast, learn strategies for enhancing cloud security in areas such as encryption, access control, malware protection and more.


Secure Enterprise e-mail Solutions with Microsoft® Exchange by  Agilysys-Sun Technology Solutions

July 07, 1967 - This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.


Secure File Transfer Tech Guide by

February 06, 2013 - Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.


Secure SOA Infrastructure - Better Control Mission Critial SOA Deployments by  Forum Systems

September 13, 2005 - Industry wide SOA rollouts have seen enterprises deploy critical supporting infrastructure around Web services security and Web services management. Forum Systems and Oracle Corporation "Secure SOA Infrastructure" is a market-leading solution that integrates software and hardware for mission critical SOA deployments. Find out more.


SecureAnywhere Web Security service by  Webroot

May 17, 2013 - This case study highlights one organization's journey in finding a simple to install and easy to configure web filtering service that is as effective on the client side as it is on their network. Learn how they were able to boost their ability to effectively identify and protect all of their mobile users.


Securing Data, Not Endpoints: The Best Way to Control Consumerization by

November 27, 2012 - Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.


Securing End-User Mobile Devices in the Enterprise by  IBM

August 12, 2011 - As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.


Securing Microsoft Exchange 2010 with VeriSign Authentication Services by  VeriSign EMEA

October 26, 2011 - This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).


Securing the Borderless Enterprise by  Websense, Inc.

February 04, 2010 - A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more.


Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk by  Websense, Inc.

July 14, 2011 - Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security.


Securing your Microsoft Internet InformationServices (MS IIS) Web Server with a Thawte Digital Certificate by  Thawte Inc.

July 03, 2012 - This resource is designed to take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.


Securing your Midsized Business by  IBM

October 31, 2013 - This guide explores security management strategies and how to combat the growth of sophisticated threats.


Securing Your Private Keys as Best Practice for Code Signing Certificates by  Thawte Inc.

September 30, 2013 - This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.


Securing your Private Keys as Best Practice for Code Signing Certificates by  VeriSign EMEA

July 28, 2011 - This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.


Security - Pix 500 Series Firewalls by  Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions.


Security and Data Protection with Intelligent Desktop Virtualization by  Virtual Computer, Inc.

January 01, 2012 - The biggest draw of VDI for many organizations is resolving endpoint security and data protection concerns while enabling mobility. However, VDI is expensive to implement and has many limitations. Discover how Intelligent Desktop Virtualization (IDV) can offer the same security benefits as VDI at lower costs.


Security Bloopers: Five Common Mistakes by  Cisco Systems, Inc.

February 02, 2009 - IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network.


Security considerations for small and medium-sized enterprises (SMEs) by  GFI Software

February 20, 2012 - SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.


Security For Virtualization: Finding the Right Balance by  Kaspersky Lab

February 20, 2012 - While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.


Security from Above: How Cloud based Security Delivers Up‐to‐the‐Minute Network Protection by  WatchGuard Technologies, Inc.

February 24, 2011 - The convergence of numerous trends is causing organizations to reconsider their approach to security.While widespread email viruses and worms have decreased, attacks via the web are on the rise.


Security Goes Virtual by  AT&T Corp

October 28, 2009 - Virtualization offers the opportunity for a more hands off approach to security. It eliminates the need for local hardware, as well as the time required for security administration. It frees users from worrying about arcane technical details, and eliminates the need for constant attention. Read on to learn more about the benefits of virtualization.


Security Labs Report by  M86 Security UK

February 20, 2012 - This Security Labs report offers insight into the significant trends and developments in web and email security today. View now to uncover key findings and gain recommendations on how to protect your organisation.


Security Report Card: NSS Labs Puts APT Solution to the Test by  Fortinet, Inc.

April 07, 2014 - This resource provides a thorough analysis of the Fortinet FortiSandbox 3000D v1.2 breach detection system. It looks at aspects like the effectiveness, performance and TCO of the solution and finds it to be an effective way to detect breaches and breach attempts.


Security Threat Report 2014 Smarter, Shadier, Stealthier Malware by  Sophos, Inc.

December 23, 2013 - Looking back at the 2013 threat landscape, one thing is clear, malware attacks are becoming increasingly camouflaged. This in-depth report explores the ever-changing threat landscape and the growing trends of cybercriminals.


Security Threat Report: 2010 by  Sophos UK

May 25, 2010 - The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.


Security Threat Report: 2010 by  Sophos, Inc.

March 02, 2010 - The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organized, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.


Security Threat Report: July 2008 by  Sophos, Inc.

November 13, 2008 - This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.


Security Threat Report: July 2009 Update by  Sophos, Inc.

July 06, 2009 - Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.


Security Threat Report: July 2009 Update by  Sophos, Inc.

July 01, 2009 - Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.


Security Threat Report: Mid-year 2010 by  Sophos, Inc.

October 04, 2010 - Halfway through 2010, cybercrime continues to evolve and grow. As social networking becomes ever more deeply embedded in our lives, it has become an ever more fertile hunting ground for those who would steal and abuse our personal information. Knowledge is power, and understanding the dangers posed is the first step toward keeping safe and secure.


Security, Connectivity and Compliance in the Amazon Cloud by  Vyatta Inc.

November 21, 2011 - The Vyatta Network OS for Amazon helps enterprises overcome the limitations of VPC and delivers enterprise class and complete control of network security and connectivity within the Amazon VPC environment. View this data sheet to explore some of the common use cases for Vyatta Network OS and its key benefits.


SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by  Lumension

September 25, 2012 - Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.


SecurStor 12000/16000 RAID by  Excel Meridian Data, Inc.

SecurStor 12000/16000 RAID series are high performance cost effective IDE-to- Ultra160 SCSI or 2 Gb Fibre RAID solutions for workgroups, departmental or LAN storage needs. Scalable from 80 GB to 4TB with up-to (16) IDE hard disk drives.


SecurStor 2500 RAID by  Excel Meridian Data, Inc.

SecurStor 2500 RAID is designed as a high-performance and high-availability solution, with multiple configuration options providing available No Single Point of Failure redundancy for up-to 64 TB of multi-host cluster-capable storage.


Select the Right Solution for Endpoint Management by  IBM

May 31, 2013 - This guide explores how you can improve your overall security with endpoint management – ensuring greater visibility with a more unified approach.


Selecting a Practical Enterprise Content Management Solution: Critical Considerations by  Xerox DocuShare

May 01, 2008 - Learn how to put together your content management strategy from the ground up, taking into account business needs, organizational structure and strategic objectives.


Selecting the right DLP solution: Enterprise, Lite, or Channel? by  Websense, Inc.

October 06, 2011 - DLP describes a wide range of solutions from simple tools that identify file types to enterprise-level products that make intelligent decisions based on network traffic. View now to discover which solution is best for your organization by exploring different type of DLP solutions, capabilities to consider, pros and cons of DLP types and more.


Senior Vodafone Staff Access BlackBerry Service at all Times with Rapid Disaster Recovery by  Neverfail

June 24, 2013 - This case study discusses how one company implemented a high availability solution that delivers 24/7 availability and allows for routine maintenance while their system is live.


Separate But Equal: Mitigating Risk of Web-Borne Malware Infections Through Separation by  Thawte Inc.

January 29, 2014 - In this expert e-guide, Pete Lindstrom shares insight on Web-browser security methods that reduce or eliminate user involvement to more effectively prevent malware infections.


September CIO Decisions Ezine: Architecting a Nimble Enterprise by

September 06, 2013 - Agile and lean are the cornerstones of many a successful IT strategy, but what if a CIO works in a sector that hasn't yet embraced the agile enterprise?


Server Security Survey Report by  Bit9, Inc.

November 13, 2013 - In October 2013, Bit9 conducted a survey on server security designed to analyze challenges in the inability to detect or stop advanced attacks – click now to discover key findings and takeaways.


Seven considerations for utilizing cloud computing and how to get there with virtualization by  AMD, Hewlett-Packard and Microsoft

December 27, 2010 - This expert e-guide from explains how to take your Hyper-V investment to the cloud. Learn which decisions need to be made during the migration process and determine which cloud strategy is right for your organization. Plus, learn about seven uses for the cloud you might not have considered.


Seven Criteria for Evaluating Security as-a-Service (SaaS) Solutions by  Websense, Inc.

November 15, 2010 - This white paper examines the security challenges organizations are facing today; addresses misconceptions about Security as-a-Service (SaaS); and provides criteria to help you evaluate SaaS solutions.


Seven Design Requirements for Web 2.0 Threat Protection by  McAfee, Inc.

April 02, 2009 - Read this paper to learn about new Web 2.0 threats and why most security solutions in place today can't adequately protect against them. Check out the Seven Design Requirements for Web 2.0 Threat Prevention and an overview of McAfee product and technology offerings that address these requirements.


Seven Email Marketing Refreshes by  Bronto Software

October 01, 2008 - This whitepaper will detail seven key points that will help you quickly enhance your email-marketing program. You may also find some low hanging opportunities that you weren't aware you were missing.


Seven Key Considerations for Successful Deployment of Unified Communications by  Dimension Data.

December 01, 2007 - Integrating all forms of communication - from telephony to email, web conferencing to instant messaging (IM) - helps to deliver a richer communications environment that ultimately results in cost savings and productivity increases. Before embarking on such a journey there are a number of elements that require careful consideration.


Seven Keys to Making or Breaking Your Exchange Infrastructure by  Dell Software

November 03, 2010 - Exchange Server 2007 changed the way your communications infrastructure operated forever, delivering a potent and powerful e-mail engine. And with Exchange Server 2010, Microsoft’s upped the ante, delivering a more powerful feature set and functionality. But does all of this mean bigger management headaches?


Seven Questions to Determine if E-mail Archiving, Migration, or Both, Are Right for You by  Dell Software

April 12, 2011 - This Quest Software white paper discusses seven important questions you should ask before migrating to Microsoft Exchange - and how these questions can help you determine which solution will help to make your migration project exceptional.


Seven Secrets to 24x7 Exchange Availability by  Marathon Technologies

September 01, 2008 - Read this paper to learn the seven secrets to 24x7, disaster-tolerant Exchange and get step-by-step tips on how to implement an Exchange environment with zero lost data and continuous application availability.


Seven Steps for a Successful GroupWise Migration to Exchange 2010 and BPO by  Dell Software

September 15, 2010 - In this new white paper by Quest Software, learn seven steps for a seamless migration from GroupWise to Exchange 2010. Discover Exchange 2010’s key features, and read about the challenges you face when planning your migration.


Seven Strategies for Identifying Who’s Behind Advanced Cyber Attacks by  FireEye

December 31, 2013 - When establishing your security strategy, the ability to recognize who your attackers are and how they work is essential. This informative guide breaks down the nature of malware attacks and what they reveal about the culprit, including their location, ties to other malware attacks, and connections to common threat factors.


SharePoint Apps for the Enterprise - Email & Document Management by  Colligo Networks Inc.

June 27, 2012 - Many businesses are looking for ways to enhance the productivity, simplicity, and security of their SharePoint environment to foster better, easier, more effective collaboration across the enterprise. Check out this resource to discover how you can adapt SharePoint for applications and devices such as smartphones, tablets, Outlook, and more.


Sharepoint E-zine Vol.3: Using SharePoint's InfoPath feature to generate forms by  SearchWinIT

October 23, 2008 - This guide explains planning global enterprise SharePoint deployments, creating custom global search scopes in SharePoint and top tips for harnessing Microsoft SharePoint governance.


SharePoint E-Zine Volume 19: Time to Beef Up Code Retention Policies by  SearchWinIT

May 18, 2010 - When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk.


Sharpening the focus on mainframe security by  IBM

November 29, 2011 - Data breaches are becoming more common, with hackers targeting confidential information, causing losses in profitability, customer confidence and competitive advantage. As a result, mainframe security is under more scrutiny than ever before. Access this tip guide for steps every company can take to ensure the security of their most valuable data.


Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by  Shavlik Technologies

May 20, 2009 - This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.


Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed by  Shavlik Technologies

May 20, 2005 - This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.


SheepDog Builds a Profitable IT Services Business Around Google Apps by  Google Apps Authorized Reseller Program

September 23, 2009 - See how SheepDog used Google Apps to capitalize on growing business opportunities for advanced cloud computing solutions, generate both one-time and ongoing revenue streams, and build a lucrative and sustainable business model.


Should You Install Messaging Security Software on Your Exchange Server? by  Sunbelt Software

August 06, 2008 - This white paper discusses the pros and cons of installing third-party software on the Exchange Server, and information on Sunbelt Software's Ninja Email Security.


Should Your Email Live In The Cloud? A Comparative Cost Analysis by  Google

January 05, 2009 - This report presents a spreadsheet cost model to help you calculate your fully loaded on-premise email costs and compare it against cloud-based alternatives. Bottom line: Cloud-based email makes sense for companies or divisions as large as 15,000 users.


Should Your Email Live In The Cloud? A Comparative Cost Analysis by  Google

January 05, 2009 - This analyst report presents a spreadsheet cost model to help you calculate your fully loaded on premise email costs and compare it against cloud-based alternatives.


Should Your Email Live In The Cloud? A Comparative Cost Analysis by  Google Apps

January 19, 2011 - This report presents a spreadsheet cost model to help you calculate your fully loaded on-premise email costs and compare it against cloud-based alternatives. Bottom line: Cloud-based email makes sense for companies or divisions as large as 15,000 users.


Shutting the Door on Data Theft by  Websense, Inc.

September 15, 2011 - Today's threats are much more sophisticated than ever. Hackers write and execute code that's pre-tested to elude antivirus programs. Join Patrik Runald, as he reveals how you can stay a step ahead of these attacks. Learn how inbound and outbound threats bypass traditional defenses, and how shared security intelligence can protect you.


Simplifying branch office security by  Sophos, Inc.

December 01, 2011 - Enforcing consistent network security throughout your enterprise can be challenging—especially for those of you with branch offices with few users and no IT expertise. This paper introduces a new standard — an innovative, unified, cost-effective solution for managing branch office security.


SIP contact centers: Key benefits and potential challenges by

February 24, 2012 - Learn how Session Initiation Protocol (SIP), unified communications (UC) and contact centers fit hand in hand in this e-guide from


Six Email Security Best Practices for Email SaaS by

April 22, 2013 - This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.


Six Email Security Best Practices for Email SaaS by  Symantec Corporation

December 03, 2012 - Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.


Six Secrets to 24x7 Exchange Availability by  Marathon Technologies

September 28, 2009 - The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster.


Six Steps to a Successful Microsoft® Exchange Server 2010 Deployment by  Dimension Data.

June 01, 2010 - If an organisation wants to realise the full advantages of Exchange Server 2010, it's important to take a systematic approach that includes a thorough understanding of all of the integration points, dependencies and end user profiles. Read this paper for 6 steps to a successful Microsoft® Exchange Server 2010 deployment.


Six Threats That Can Tarnish Your Website - And What You Can Do To Stop Them by  Symantec Corporation

April 30, 2013 - This comprehensive white paper explores six threats to your website and provides a solution for how you can prevent them.


Slipping Through The Cracks Of Web Services To Serve Malware by  Trend Micro, Inc.

October 26, 2010 - Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.


Small Business Firewall Software Vs. Hardware Firewalls by  Cisco Systems, Inc.

February 02, 2009 - Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.


Small Business Security: What You Need to Know by  Cisco Systems, Inc.

February 02, 2009 - Small business security is dependant upon defending against common threats, such as viruses, spyware, malware and hackers.


Small Business VoIP: The Basics by  Cisco Systems, Inc.

September 01, 2008 - Small business VoIP combines voice and data together on a single, secure network allowing your employees to stay connected with the people and data they need. The following is a guide to why you might want to consider a small business VoIP system.


Smart Decisions for Extraordinary Times by  Microsoft

September 09, 2009 - With Microsoft Unified Communications businesses can simplify management and maximize budget and resources. You can consolidate costly third-party solutions and avoid capital investments.


Smart Devices, Smart Security by  Voltage Security, Inc.

July 09, 2012 - This short white paper explores the top 5 tips for protecting your organization against new looming security threats from smartphones and tablets. These 5 tips can make or break mobile data security efforts. Read now to learn more.


Smart Strategies for Securing Extranet Access by  Oracle Corporation

March 01, 2010 - Download this whitepaper to learn how you can mitigate risk, improve extranet security, streamline compliance and enable your organization to boost its bottom-line by taking advantage of advanced access management technologies.


Smartphones: A Savvy Strategy for Government Employees by  BlackBerry

January 11, 2011 - There is no reason why government agencies shouldn’t take advantage of all that smartphones have to offer. Employed efficiently, smartphones can address several organizational imperatives, including cost savings, greater mobility, increased telework options and sensitivity to environmental concerns. Continue reading to learn more.


SMB Guide to Continuous Operations by  CA Technologies.

November 08, 2010 - SMBs can’t afford not to have a plan for continuous operations, especially when it comes to the computer systems, applications and data the business depends on to keep going — and growing. This paper highlights some of the issues around implementing SMB business continuity practices and provides guidance on developing an effective BC strategy.


Social Engineering: Hacking People, Not Machines by  AVG Technologies USA, Inc.

March 31, 2010 - Hackers are often portrayed as technical geniuses plying their trade through the use of complex computer code. But gaining access to a computer can be as simple as fooling someone into a revealing a password. Read this paper to learn more about social engineering threats and how to defend against them.


Social Networking malware: The dangers facing SMBs by  GFI Software

November 21, 2011 - View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.


SocialText Case Study: Boston College by  Socialtext

February 01, 2008 - Boston College evaluated various options for increasing communication and collaboration in the classroom, including staying with Facebook, but in October 2006 ultimately decided to use the Socialtext hosted service for wikis.


E-mail Recovery, Restoration, Search & Analysis by  Ontrack® PowerControls™ by Kroll Ontrack

August 01, 2008 - Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server backups and Information Store files and even from your live Exchange server.


SoftwarePlanner QA Planner beta by  SmartBear Software

December 02, 2010 - IT Problem: Manage your manual test library, track your progress and analyze test results.


Solution Brief – Virtualizing Lotus Domino on Vmware by  VMware, Inc.

May 04, 2011 - In this white paper, explore the primary use cases and benefits that customers can expect when they virtualize Domino on VMware and review information on support, licensing and additional resources for customers who are looking for more information.


Solution Brief: Data Protection for Midsize Organizations by  McAfee, Inc.

August 19, 2009 - Data is the lifeblood of any organisation, and one of the five greatest threat vectors faced by a midsise organisation. Whether you want to address all five areas or concentrate on data protection, McAfee has proven products and a dedicated focus to meet the requirements of your organisation.


Solution Brief: The Top Four Business Risks of Social Media by  BlueCoat

September 19, 2011 - Social networks are changing the way people interact, communicate, form opinions, and purchase. And businesses must support social media to drive their business. However, this medium can also pose new security risks. View now to explore the top four risks of social networking and discover various ways to protect against and mitigate these risks.


Solution Brief: Top 10 Ways Shavlik Simplifies Patch Management by  Shavlik Technologies

November 11, 2010 - Security vulnerabilities are uncovered on a daily basis, and managing the security patches that address them can be an endless and often complicated task for every network administrator. Without the right automated solutions, patch management can be a tedious and herculean task. Read this white paper from Shavlik to learn more.


Solution Brief: Total Protection for Secure Business by  McAfee, Inc.

September 01, 2009 - Total Protection for Secure Business. Secure your business across systems, email, web, and data—all with one affordable solution created for the midsize organization.


Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications by

December 14, 2012 - Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.


Solve Exchange Storage Problems Once and for All: A New Approach without Stubs or Links by  Mimosa Systems

May 01, 2008 - This white paper discusses how Mimosa NearPoint can reduce Exchange storage and keep email accessible to end users, without requiring stub files in Exchange.


Solving Four Primary Security Challenges of Microsoft SharePoint by  Sophos UK

November 01, 2009 - This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.


SonicWALL SuperMassive E10000 Series video by  SonicWALL

March 18, 2011 - This video talks about the various security threats that are threatening businesses today. With the increasing amount of worms, botnets, and malware the need to an advanced security solution that can scan for all of these things and eliminate potential harmful programs is essential for every business.


SonicWALL TZ Series by  SonicWALL

February 24, 2011 - Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls.


Sophos Computer Security Scan by  Sophos, Inc.

April 07, 2010 - Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.


Sophos EndUser Protection Overview by  Sophos, Inc.

January 10, 2013 - This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.


Sophos Security Threat Report 2011 by  Sophos, Inc.

February 07, 2011 - Let our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.


Sophos Security Threat Report Mid-Year 2011 by  Sophos, Inc.

August 23, 2011 - Malware is complex, seemingly everywhere and is often difficult to stop. Targeting high-profile organizations, damaging data loss incidents and web threats continue to make headlines for malware attacks this year. Read the latest report to understand how the latest threats work and how to keep your business safe.


Sophos Virus Removal Tool: Free virus detection and removal by  Sophos, Inc.

May 09, 2013 - Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.


Spam 2011: Protection Against Evolving Threats by  Proofpoint, Inc.

March 09, 2011 - The very best anti-spam solutions today de­liver 95% effectiveness. Unfortunately, that’s not good enough. Check out this white paper to see how enterprises can defend themselves with a comprehensive and adaptive anti-spam solution such as the Proofpoint Protection Suite.


Spam Is Annoying. Targeted Attacks Are Deadly by  Tripwire, Inc.

March 29, 2013 - Join renowned security author Mike Cobb in this podcast as he shares valuable information regarding targeted attacks, including how they work, who's vulnerable, and how to defend yourself properly.


Spam, Spammers, and Spam Control by  Trend Micro GmbH

March 06, 2009 - This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.


Sportif USA Transparently Automates the Archiving and Protection of Large Outlook Mailboxes with Metalogix by  Metalogix

January 24, 2012 - In this case study, explore how Sportif, a leading outdoors clothing innovator, reduced email management costs and increased data protection for their users with Metalogix Archive Manager for Exchange.


Spyware in the Enterprise: The Problem and the Solution by  Sunbelt Software

January 10, 2007 - Spyware is a serious threat to the enterprise network, and the threat is growing. Download this informative white paper to learn more about the costs, problems and solutions associated with counting spyware.


State of Internet Security, Q3 - Q4 2009 by  Websense, Inc.

February 16, 2010 - Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009.


State of Security Operations by  Hewlett-Packard Company

January 31, 2014 - With businesses recognizing the need for further investment in cyber-defense, it is essential to figure out which tools and strategies are best for your organization. Read now and find out more about the current state of security operations in 2014.


Stay on Top of Threats: Use Next Generation Security for Protection by  IBM

October 31, 2012 - This informative whitepaper covers the constant threat of hackers to the security of your organization and offers a solution to help keep your data safe.


Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities by  IBM

September 01, 2008 - Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal. Read on to learn more.


Stealthy Threats: Driving a New Approach to Security Video by  Intel

October 01, 2012 - View this Webcast and uncover the steps to a new approach to security. Today, the threat landscape is more dangerous than ever before, so make sure you have the right security to mitigate the risks.


Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010 by

June 30, 2011 - While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at for a top-to-bottom, expert analysis of the Exchange migration process.


Stepping Up the Battle Against Advanced Threats by  Trusteer

August 30, 2013 - This essential white paper breaks down how application control can keep your endpoints secure in today's changing IT threat landscape.


Still Using Proxies for URL Filtering? There's a Better Way by  Palo Alto Networks

March 18, 2014 - This informative resource discusses a next-generation security solution that combines firewall and threat prevention technologies to provide the network visibility and control that proxy-based devices just can't offer.


Stopping Crimeware In Its Tracks by  FireEye

September 01, 2008 - This paper describes the damaging cybercrime threat posed by botnets, explains why traditional security solutions cannot stop them, and proposes a new approach that can eradicate cybercrime from corporate networks.


Stopping data leakage: Exploiting your existing security investment by  Sophos, Inc.

June 01, 2008 - This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.


Stopping data leakage: Making the most of your security budget by  Sophos UK

March 16, 2009 - This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.


Stopping Data Leakage: Making the Most of Your Security Budget by  Sophos, Inc.

February 20, 2009 - This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit...


Storage magazine June 2013: Archive It! by

June 07, 2013 - In the June 2013 issue of Storage magazine, our experts highlight the latest in data archiving best practices, reveal the winners of our latest Quality Awards survey for backup and recovery software, explore the challenges of mobile device backup and much more!


Storage Magazine October 2009: Guide to Snapshot Technologies by

October 13, 2009 - The October 2009 edition of Storage Magazine Online focuses on snapshot technologies. Snapshots offer backup managers the ability to reduce RTOs and RPOs, but one size doesn’t fit all. Storage expert Marc Staimer explains how to evaluate and choose the best approach for your environment.


StorageConsole: Capacity Manager by  APTARE

October 01, 2007 - APTARE StorageConsole is a Web 2.0 platform that delivers comprehensive reporting and management tools for storage environments - from backup to capacity management.


Strategies for Controlling Email Risks with Declining Budgets by  Proofpoint, Inc.

September 16, 2009 - Proofpoint CEO Gary Steele discusses today's email security landscape, including trends related to inbound spam and virus, data loss prevention, email encryption, email archiving and how SaaS email security solutions can greatly reduce costs while improving security.


Strategies For Securing Virtualized Environments by  Sourcefire

December 31, 2013 - This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.


Strategy for Securing Mobile Content - 5 Key Guidelines by  Accellion, Inc.

June 28, 2013 - Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.


Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by  Security Weaver

September 01, 2008 - For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions.


Streamlining Sales Processes to Boost Performance: Five best practices for optimizing the sales pipeline by  SugarCRM Inc.

June 02, 2009 - When chosen wisely and used appropriately, technology can have a positive impact on both the sales process management and the results of managing the sales effort more efficiently. SugarCRM can remedy the gap in four crucial areas. And it does so very economically, avoiding a fifth mistake, spending more money than you have to in order to improve.


Study commissioned by Webroot: Web Threats Expose Businesses to Data Loss by  Webroot

May 06, 2013 - Eight in 10 companies experienced web-borne attacks in 2012. Don't be part of the statistic! Read this research paper to learn about the current state of web layer security in organizations today and learn what you should do to stay protected.


Study Results: Total Economic Impact of an SaaS Enterprise Based Email Management Solution by  Mimecast

June 10, 2013 - This Forrester research report examines and analyzes the total economic impact and ROI of a cloud-based unified email management platform. Learn more about the features and benefits of this SaaS-based email approach based on the 3 key aspects of email archiving, security and continuity.


Study Reveals Cloud Expectations, Concerns and Experiences by  Cisco Systems, Inc.

October 03, 2013 - There is no doubt that cloud computing is changing the IT landscape, but it may also be changing IT's position within business dynamics and objectives. This comprehensive whitepaper presents the findings of a recent survey of IT decision makers on the impact of cloud computing business-wide.


Stuxnet 0.5: The Missing Link by  Symantec Corporation

October 28, 2013 - In this white paper, gain new insight on Stuxnet, and uncover recent key findings on where and how it may have originated in the hopes is improving a defense tactic to prevent and defend against it.


Stuxnet Under the Microscope by  ESET

October 04, 2010 - This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet.


Success Story: Astaro Gets the Checkered Flag at F1 Boston by  Astaro

August 30, 2011 - New England’s premier high performance kart racing venue, F1 Boston, faced issues with its current firewall protection solution. View this case study to learn how switching to Astaro Security Gateway met F1 Boston’s security needs, while being easy to set up and manage at a more affordable cost.


Successfully Mitigating Corporate Risk by  AT&T Corp

April 05, 2010 - This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.


New Sugar 5.0 Platform Capabilities and Advanced CRM Functionality by  SugarCRM Inc.

December 01, 2007 - Join Chris Harrick, Senior Director of Product Marketing at SugarCRM as he gives an in-depth look at enhancements and new CRM features of this upcoming release.


Sun and Symantec Open Archive Solution for Mid-sized Companies: Solving your data management and discovery challenges by  Sun Microsystems, Inc.

June 19, 2009 - This white paper will discuss how Sun Microsystems and Symantec have teamed up to create an open archive solution for Mid-sized companies. This archive solution can lower your total storage costs while at the same time improving your ability to search and discover archived data.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts