Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
T Listings:  Result Page 1 | 2

Tableau Customer Case Study by  Tableau Software

August 01, 2008 - While researching for flexible and interactive reporting tools, Ferrari and Maserati of North America's were discouraged by the complexity and cost of the BI solutions available, so to overcome with it they deployed Tableau Desktop solution.


Take Back the Endpoint by  Kaspersky Lab

February 08, 2011 - During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.


Take Control: How to Keep Traffic Moving, at a Low Cost by  Cisco Systems, Inc.

January 21, 2011 - Network performance problems bring everyone down. They drain productivity, spirits, and profits. But your IT resources and budget are limited. Really, what can you do? Read this paper to find out how to take control with a managed switch.


Taking Managed Security Services To The Next Level by  Webroot

October 31, 2013 - This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.


Taking the Botnet Threat Seriously by  FireEye

September 01, 2008 - In this paper, Enterprise Management Associates (EMA) takes a look at how the botnet threat became so serious, how botnet defense must answer the challenge, and how FireEye introduces a new approach to anti-botnet protection.


Taming Transactional Email: Tips to Gain Control and Determine If Outsourcing Makes Sense by  Silverpop Systems Inc.

January 01, 2007 - This white paper reviews the key steps necessary to implement a transactional email marketing campaign. It also recommends methods to ease the pain of implementation while improving the results.


Tap Aggregation and Filtering to Enable Deep Packet Inspection (DPI) by  Gigamon

July 01, 2009 - Read this brief paper to learn how network monitoring using DPI analyzers is a mission critical application that is tailor-made for the Data Access Network (DAN) architecture and saves substantial amounts of money for the telecom carrier.


Targeted attacks and how to defend against them by

August 16, 2013 - Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.


Targeted Cyber Attacks by  GFI Software

March 18, 2008 - Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.


Tearing Down the Fortress to Better Protect the Enterprise by  BlueCoat

October 01, 2008 - Check out this webcast and learn about the 5 key layers of malware defense that can provide multi-layered protection for your company.


TechGuide: Adopting New Threat Detection Techniques for Advanced Attacks by

August 06, 2013 - Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today.


TechGuide: Endpoint Security Management by

September 11, 2013 - This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months.


Technical Considerations for Selecting the Best Antimalware Technology by  Hexis Cyber Solutions Inc

June 02, 2014 - This informative e-guide discusses the evolution of malware and how today's antimalware products should handle detection and remediation.


Technical Guide on Emerging Threats by

February 16, 2011 - It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.


Technical Guide on Malware Trends by

October 24, 2011 - TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.


Technical guide on Web Security Gateways by

April 28, 2011 - Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.


Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007 by  FalconStor Software

October 28, 2009 - This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time.


Technology Industry Survey 2014 by

November 11, 2013 - From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.


TechTalk: Stop Malware at the Web Gateway by  BlueCoat

March 24, 2009 - Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.


Telephone Reliability for Alarm Notification: Where Have All the Landlines Gone? by  Sensaphone

June 01, 2008 - This paper discusses why timely and reliable alarm notification is part of a successful remote monitoring program and discusses the factors to consider when selecting a remote monitoring system.


Ten Ways the IT Department Enables Cybercrime by  Kaspersky Lab

February 08, 2011 - In this paper to discover 10 ways IT departments are unknowingly supporting cybercrime. View now to explore these common pitfalls and gain key guidelines on how to prevent them.


Ten Ways to Dodge CyberBullets by  ESET

April 16, 2010 - This paper comes from a series of blogs from the beginning of 2009 and based on that material, it’s been updated here with more recent material from other members of ESET’s research teams across the globe. Read more to find out.


Ten Ways to Dodge CyberBullets: Reloaded by  ESET

January 26, 2012 - In this paper, ESET research teams revisit their top ten list on what people can do to protect themselves against malicious activity, and offers key advice based on today’s changing environments, while still applying the basic principles.


Text Analytics in the BI Ecosystem by  Sybase, an SAP company

October 28, 2010 - An estimated 80% of enterprise-relevant information resides in text and unstructured forms. Text analytics transforms text into data for BI, data mining, and predictive analytics. This paper reviews business benefits and technical challenges related to taming text. It also introduces text technologies and surveys noteworthy business applications.


That Was Then This Is Now: The New Rules of Email Marketing by  Silverpop Systems Inc.

August 01, 2008 - In this new era of CAN-SPAM legislation, overflowing inboxes and ever-increasing customer expectations, many of the practices that worked for emailers in the past simply won't work anymore. This paper reviews the new rules of email marketing.


Thawte in Education by  Thawte Inc.

September 30, 2013 - Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.


The 10 Most Dangerous Risks to Microsoft Security by  Global Knowledge

May 13, 2009 - Security has always been an important part of any IT infrastructure. This white paper has tips to help improve your awareness of some of the more important risks threatening your Microsoft infrastructure.


The 2008 Hosted Exchange Server Buyers Guide by  Bsafe Information Systems

November 01, 2008 - This paper provides hosted Exchange providers to ensure that you select a provider who is reputable and will recommend a solution that will help increase your corporate profitability and success.


The Advantages of a Hosted Security Model by  Websense, Inc.

June 01, 2008 - Learn how organizations today are responding to new types of email threats. This white paper discusses how a hosted security is now a viable solution for organizations and is increasingly deployed to ensure better security and reduced costs.


The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions by  SonicWALL

April 01, 2008 - Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective.


The Advantages of Multi-Core UTM by  SonicWALL

November 18, 2008 - The newest trend in firewall protection is Unified Threat Management (UTM) that not only guards against intrusion, but performs content filtering, data leakage protection, intrusion detection and anti-malware duties.


The Anytime, Anyplace World: Choosing the Right Mobile Connectivity Strategy for Your Enterprise by  Nokia

January 11, 2008 - From the globetrotting CEO to the roving field engineer, portable devices such as mobile phones, laptop computers, and business devices have radically changed the way people work.


The Benefits of User Directed Email Archiving by  EMC Corporation

March 01, 2008 - Email archiving solutions enhance a company's ability to comply with regulatory and internal standards for data retention and the ability to find data when needed, either for internal use or for legal discovery.


The Best Best Practice Guide: Benchmarking for Service Desk Success by  GoToAssist

November 30, 2010 - Benchmarking is a critical process for any Service Desk that wants to gauge the quality of their service delivery. Too often, however, desks are overly concerned with industry benchmarks and hitting industry standards for call waiting times, resolution time and the perennial cost per email. Download the SDI best practices guide to learn more!


The Best of RSA: Mobile Security by

May 03, 2012 - To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies.


The Best Smartphones for your Business by  Webroot

November 11, 2011 - The cell phone market is nothing if not dynamic. A couple of years ago, it would have been unthinkable that Blackberry would have slipped to the third most utilized operating system for smartphones.


The Big Data Security Analytics Era is Here by  EMC Corporation

January 31, 2014 - Big data security analytics is no longer a visionary idea -- leading enterprises recognize that their immediate security requirements demand this type of solution.


The Bot Threat by  Hewlett-Packard Limited

November 30, 2012 - In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.


The Business Value of Integrated Anti-Virus Management by  IBM

January 31, 2014 - This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.


The Case for Hosted Exchange by  Intermedia.Net

October 20, 2013 - This whitepaper details the value of outsourcing your email and Exchange and guide you through picking a partner.


The Case for NSF - How Archiving in NSF Format Preserves Data Integrity by  Sherpa Software

July 28, 2010 - The need for archiving electronic records, including electronic mail [email] continues to grow. Large volumes of electronic records, including email, increased storage limitations, government regulations and legal implications have made the need to archive information a critical business issue. Is there a preferred storage format?


The Case for Server-Based Messaging Security Solutions - Webcast by  Sunbelt Software

August 08, 2008 - What are some of the latest, messaging-based security threats and risks to your organization? How is a server-based, security solution able to address those risks, in many cases better than a hosted or appliance-based solution?


The Case for Third-Party Archiving in Exchange 2010 by  Sunbelt Software

January 28, 2010 - This white paper will give you a brief overview of Sunbelt Software, while educating decision makers about the important role that email and other content archiving plays in minimizing risk and lowering the cost of doing business, the capabilities of archiving in Exchange 2020, and more.


The Changing Face of Exchange E-Mail Management by  Azaleos Corporation

September 19, 2008 - This paper outlines the 15 key areas to evaluate as part of any Exchange monitoring and management solution and provides an overall rating for efficiency, aptitude and achievement that each of the various Exchange Server management models offers.


The Children's Internet Protection Act by  NETGEAR Inc.

December 17, 2010 - Schools and libraries must certify they have complied with, or are in the process of complying with, the CIPA requirements by filing a form with the Federal government in order to receive discounts on the telecommunication charges for access or connection costs. Are you certified? Read this white paper to learn more.


The CIO's Guide to Mobile Security by  BlackBerry

October 01, 2006 - Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data.


The CIO's Guide to Fixed Mobile Convergence by  BlackBerry

April 07, 2010 - Organizations seeking solutions that provide high-performance access while addressing security needs can leverage fixed mobile convergence (FMC) systems to enhance communication. This document explores why your organization should implement an FMC solution, the benefits of FMC and considerations for methods of implementation.


The Consumerisation of IT by

April 29, 2013 - This report looks at the nature and level of activity, motivations and drivers, unintended consequences, and the practicalities of managing consumer devices and social media at work.


The Consumerization of IT 101 by

February 14, 2012 - Access this expert briefing to get answers to your most pressing questions concerning the consumerization of IT.


The Consumerization of IT: Security Challenges of the New World Order by  CA Technologies.

May 31, 2012 - Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them.


The Corporate Threat Posed by Email Trojans by  GFI Software

March 18, 2008 - Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.


The Critical Need for Encrypted Email and Secure File Transfer Solutions by  Proofpoint, Inc.

July 01, 2009 - This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.


The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by  Mimecast

November 22, 2010 - This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk.


The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by  Mimecast

August 05, 2009 - Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Learn why email Data Leak Prevention is critical to safeguard the information that is inside your network.


The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by  Mimecast

December 15, 2008 - Read this paper and learn how a successful data leak prevention system can protect your business from internal threats in this age of regulatory compliance, risk, and governance.


The Critical Role of Text Analytics in the BI Ecosystem by  Sybase, an SAP company

June 15, 2010 - Though a great amount of valuable information lies within documents, e-mails, and other media, integrating this data into modern analytics applications is challenging. Join Sybase and Kapow on Tuesday, June 15th at 1:00 PM ET to learn how enterprises are motivated to deploy text analytics capabilities for its wide range of intelligence benefits.


The Data Replication Bottleneck: Overcoming Out-of-Order and Lost Packets by  Silver Peak

November 30, 2007 - This analyst paper explores why packet loss and ordering has become such a bit problem in today's WANs and offers what can be done to overcome these packet delivery challenges.


The Definitive Guide to the Next Generation of Threat Protection by  FireEye

December 31, 2013 - In today's evolving threat landscape, organizations of allsectors and sizes are falling victim to increasingly sophisticated cyber-attacks. This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.


The Deloitte Consumer Review: A more secure customer by

March 12, 2013 - This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.


The digital mail room is dead by  IBM

September 27, 2011 - This paper explores the strategies needed to capture and transform all incoming documents, including mailroom paper, fazes, electronic forms, and electronic data interchange (EDI).


The Digital Universe Decade – Are You Ready? by  EMC Corporation

October 21, 2010 - As we enter a new decade of record-setting growth of digital information, we face unprecedented challenges in how to manage our Digital Universe. Are you ready for the Digital Decade?


The End of Antivirus as You Know It: A First Look at VIPRE Enterprise - Webcast by  Sunbelt Software

September 09, 2008 - In this webcast, take a examines at VIPRE Enterprise and learn how Sunbelt started with a blank slate to design a new, next-generation antivirus and antispyware technology to deal with today's malware in the most comprehensive, highly efficient manner.


The Essential Guide to Protecting Essential Information by  Websense, Inc.

November 19, 2008 - Read this whitepaper to learn how your organization can implement threat protection and powerful policy-based control over sensitive data and remain safe and productive while using the internet to its full potential.


The Essentials Series: Solving Network Problems Before They Occur - How to Use WMI in Network Problem Resolution by  Ipswitch WhatsUp Gold

February 13, 2012 - Access this whitepaper to learn more about Windows Management Instrumentation – a platform-specific service – and how it can be effective for network monitoring.


The Evolution of Information Security Management: 4-Phased Maturity Model by  RSA, The Security Division of EMC

March 27, 2012 - Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.


The Evolution of Threat Detection and Management by

June 19, 2013 - This e-guide from explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.


The Evolving Landscape of Desktop Security by  McAfee, Inc.

May 30, 2013 - This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.


The Executive Guide to Data Loss Prevention by  Websense, Inc.

September 02, 2009 - Rich Mogull of Securosis answers the question, What is Data Loss Prevention (DLP)? In this videocast he discusses how DLP benefits business and shows examples of DLP usage in the real world.


The Executive Guide to Data Loss Prevention by  Websense, Inc.

August 18, 2009 - Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs.


The Extraordinary Failure of Anti-Virus Technology by  Lumension

February 12, 2008 - Anti-virus technology fails to prevent computers from virus infections. And because it fails, it inadvertently assists many security woes that plague the computer population.


The Fight for Full Network Visibility in a Dangerous World by  APCON, Inc.

May 09, 2014 - This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.


The File Transfer Security Evolution by  GlobalScape

December 31, 2013 - This white paper highlights 4 key features of a managed file transfer solution that is business-ready and meets increasing user demands for convenience.


The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks by  FireEye

December 31, 2013 - The rapidly evolving threat landscape has rendered many traditional security tools obsolete and IT departments are left with questions on what to do next. This guide explores several security architectures and helps you decide which one is best for your organization.


The four rules of complete web protection by  Sophos, Inc.

December 16, 2011 - As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.


The Future of Authentication for Online Services by  SafeNet, Inc.

November 02, 2009 - In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks.


The future of email and applications is social by  IBM

April 05, 2013 - While it's difficult to imagine a workplace without email, today many businesses are coping with information overload. Email is a key factor of business collaboration tools, so businesses need to find a way to modify information management. View this white paper to learn more about what the future of email application entails.


The Future of Email and Applications is Social by  IBM

February 28, 2013 - The workplace is evolving – is your email application keeping pace? This resource details why the future of email and applications is social and details the many benefits a socially relevant email experience provides.


The future of mobile CRM by  SugarCRM Inc.

March 20, 2012 - In this expert e-guide, find out how social and mobile customer relationship management (CRM) are changing the CRM landscape.


The Future of Unified Communication: What’s in Store? by

May 24, 2012 - This expert E-Guide from takes a look at the coming decade and what you can expect from the world of communications and collaboration by the year 2020.


The Growing Importance of E-Discovery on Your Business by  Google Apps

November 14, 2008 - The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.


The Impact of Disk Fragmentation on Servers by  Diskeeper Corporation

November 16, 2010 - This paper examines the impact that disk fragmentation has on servers. Storage servers can experience high levels of disk thrashing caused from excessive file fragmentation. It also examines a series of tests that were conducted and their results to look at common server tasks that are likely to be affected by disk fragmentation.


The Impact of Messaging and Web Threats by  Sunbelt Software

August 06, 2008 - Messaging, internal and Web-based threats are increasing in number and severity. Read this Osterman Research white paper to learn how organizations must implement a layered defensive strategy to protect against all types of threats and how Sunbelt Software can help.


The Impact of Messaging and Web Threats by  Trend Micro, Inc.

May 01, 2008 - This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.


The Importance of Continuity in Office 365 Environments by  Mimecast

August 06, 2013 - Email is essential for communications, collaboration and content sharing, and it must remain available as close to 100% of the time as possible for your employees to be productive. This white paper focuses on the importance of continuity for the popular cloud-based email platform, Microsoft Office 365.


The Importance of Network Time Synchronization by  Symmetricom

October 20, 2009 - This paper explains why accurate network time -- and therefore precise network time synchronization -- is critically important for network management. Read on to learn more about the importance of network time synchronization.


The Information Governance Imperative: Expert Advice for Developing a Strategic Plan to Govern Critical Enterprise Information by  IBM

November 23, 2011 - In this e-guide, you will find an overview of key information governance issues and practical advice on building a business case for information governance, developing an information governance strategy and structuring an information governance program.


The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies by  IronKey

May 26, 2009 - Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.


The Keys To Distributed & Agile Application Development by  CollabNet

October 11, 2011 - This white paper will highlight solutions for application development in globally dispersed organizations. Insights and strategies for maximizing efficiencies in a distributed environment will be presented, along with best practices.


The Malware Report: Hotel Business Center PCs Strike Again by  ESET

August 20, 2009 - Matt Grant talks with Randy Abrams about security issues with hotel business center computers. These are public computers and they often have insufficient security features. In this podcast, Randy shares some interesting things he’s found in hotel computers and gives some advice on using them safely.


The Malware Report: Radisson Hotels Exposed by Guest Data Breach by  ESET

September 23, 2009 - Matt Grant talks with Randy Abrams about a data breach at Radison Hotels. Unfortunately, an unknown number of their guests' credit card numbers were exposed to malicious hackers. In this podcast, Randy dishes out some advice on how to prevent this sort of data breach and what to do in the event that it’s already happened.


The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape by  ESET

December 02, 2010 - In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 


The Many Paths to Exchange 2013 by

March 19, 2014 - While the benefits are appealing, an upgrade to the latest version of Exchange is a big step. The complexity of that migration will depend on your starting point and the thoroughness of your plan.


The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks by  Palo Alto Networks

March 18, 2013 - This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.


The N-able MSP Sales & Marketing Digital Binder by  N-able Technologies

October 03, 2011 - This digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects.


The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market by  Webroot

December 01, 2010 - This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs.


The New Phishing Attack: How to Avoid Taking the Bait by  Websense

June 07, 2012 - Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.


The New Reality of Stealth Crimeware by  McAfee, Inc.

May 31, 2013 - This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.


The New Reality of Stealth Crimeware by  McAfee.

November 21, 2011 - The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.


The Next Generation of Cybercrime by  SecureWorks

May 31, 2011 - This white paper will educate you about a range of different security threats, as well as, the hackers that perpetrated these viruses. You will also receive a list of best practices for protecting your organization the right way.


The Next Generation of Cybercrime: How it's evolved, where it's going by  Dell, Inc.

May 19, 2011 - Cybercrime is continuously evolving and attacks occur everyday, costing businesses significant loss and money. In order develop a strong security strategy to reduce your risk of attacks, you must understand cybercrime. Read this executive brief to explore several generations of cybercriminals and the methods and motivations of their attacks.


The next generation of firewalls for the mobile age by  Palo Alto Networks

December 23, 2013 - Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose.


The Oracle Return on Investment Calculator by  STR Software

May 08, 2009 - This Return on Investment FAX calculator helps you determine the what sending faxes manually costs your organization annually, demonstrating how an automated FAX solution from STR Software can save your company money.


The Paperless Office-Turning the Page on Paper Use by  SpringCM

August 01, 2008 - This whitepaper explains the benefits of a paperless office using SpringCM. Learn how to establish an inbound e-mail address and fax number to capture paper and digital content, and have incoming transmissions routed to SpringCM, saving time and paper.


The path to securing your mobile Enterprise by  Juniper Networks, Inc.

July 12, 2012 - This presentation transcript highlights the rise in mobile popularity, emerging security threats and how people are handling them. Discover more about IT architectures for mobile devices and how you can further develop a mobile workplace.


The Personalisation Challenge: Business Culture and Mobile Security by  Hewlett-Packard Company

September 24, 2013 - This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.


The Post-Relational Reality Sets In: 2011 Survey on Unstructured Data by  MarkLogic

July 28, 2011 - This report details a survey of IT and data managers conducted by Unisphere Research, in partnership with MarkLogic. Read it and discover how organizations who responded treat and manage a growing amount of unstructured data.


The Power of Extreme Networks OpenFlow-enabled Switches by  Extreme Networks

November 30, 2012 - Discover how the proper switches can help you maximize the investment of your monitoring applications in both physical and virtual networking environments.


The Power of Real-time Continuous Intelligence™ with ESP by  Sybase, an SAP company

July 12, 2011 - This white paper discusses the inherent challenges of dealing with "big data": overwhelming information that seems to come from everywhere and everything. Continue reading to discover strategies for overcoming these challenges by processing "big data" and providing impressive, real-time decision making.


The Power of Unified Communications and Collaboration by  IBM

November 02, 2009 - This paper highlights key drivers, benefits and characteristics of effective unified communications and collaboration solutions. It also examines end-to-end IBM UC2 solutions and the advantages organizations can realize by teaming with IBM.


The Power To Destroy: How Malware Works by  Symantec

May 14, 2014 - View this comprehensive resource to understand today's malware and how it can negatively impact your business if you don't include website vulnerability assessments.


The Problem of Enterprise Records Management by  EMC Corporation

October 01, 2006 - This white paper explains how records management solutions can be deployed flexibly and cost-effectively across the enterprise to meet the full spectrum of records management needs.


The Promise of Mobile Unified Communications by  BlackBerry

January 09, 2009 - Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand.


The Promises and Pitfalls of BYOD by  Dell Software

February 07, 2014 - Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.


The Purview™ Solution–Integration With SIEM by  Extreme Networks

May 23, 2014 - This whitepaper explores one unique network monitoring and management system that allows for easy integration with your SIEM platform.


The reality behind the hype: Government cloud computing by

November 23, 2011 - This article from Gartner offers advice to public sector organisations thinking of deploying cloud computing and assess the progress made by governments in their use of the cloud.


The Rising Threat of Corporate Cybercrime: Cybercriminal Motives and Methods by  Trusteer

December 20, 2012 - In this white paper, uncover the major cybercriminal attack methods and motives, and learn what modern cybercrime means for endpoint security. Read on to discover the growing need for effective antimalware today and more.


The Self-Defending Network by  Cisco Systems, Inc.

August 13, 2009 - Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.


The Seven Deadly Traps of IPv6 Deployment - And How to Avoid Them by  Infoblox

January 25, 2012 - The transition to IPv6 is unavoidable. How it will happen and the effects of it are the questions to ask now.


The Small Business Guide to Big Business Email by  Bsafe Information Systems

November 01, 2008 - This paper tells, business can start using a fully managed hosted version of Microsoft Exchange Server, and make quite a positive impact on small business’s ability to compete in today’s uncertain economy.


The Social Sales Revolution by

February 06, 2012 - This e-book examines how some of today’s most successful reps approach social sales. Among others, you’ll meet a wine salesman with almost a million Twitter followers, a global manufacturer who is taking orders on Facebook, and a storage saleswoman who used Twitter and other tools to exceed her quota by 200%.


The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs by  Webroot

January 30, 2012 - Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.


The State of Cloud-Based Security: Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs by  Webroot Software Pty Ltd

March 12, 2012 - Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.


The State of Email Security by  McAfee, Inc.

April 01, 2008 - Anti-spam is still plaguing CIOs in the midmarket. Controlling anti-spam and shoring up email security are two issues that CIOs have to address. In this webcast Peter Brockmann explains possible methods that can be used to address the issue.


The Strategic Advantage of Cloud-Based Email and Blackberry Services by  USA.NET, Inc.

September 04, 2009 - Hosted Exchange with Hosted BlackBerry® Services can provide significant strategic advantages to organizations that rely heavily on messaging and mobile functionality. This Osterman Research paper describes the reasons why IT organizations should seriously consider taking a strategic step forward by using these cloud-based services.


The Tangled Web: Silent Threats & Invisible Enemies by  Symantec Hosted Services

March 03, 2010 - Cyber-criminals can stage attacks on businesses with covert malware, spam, and scams that drain employee productivity. Rich media, open-source platforms and social-networking sites are vulnerable to these threats. Learn how a hosted web security and content filtering service intercepts all types of these web-borne attacks.     


The Tipping Point: Top Unified Communications Issues for 2012 by  Sprint

May 23, 2012 - This expert E-Guide from discusses the top five unified communications issues for 2012 and how these will affect the transformation and evolution of UC for the better.


The Tod Point Group: IBM Storwize V7000 in an Exchange Environment by  IBM

May 31, 2012 - The IBM Storwize V7000 Unified storage system, combined with powerful management software from IBM Tivoli, provides an ideal complement to Exchange 2010 deployments by providing a highly virtualized storage infrastructure designed to meet the specific needs of Exchange 2010 environments.


The Top Five Benefits of Video Conferencing by  Polycom, Inc.

May 16, 2011 - As more employees are working remote, teams are faced with lost, slow, or simply non-existent communication. This white paper discusses video conferencing solutions and the top five benefits they can bring to your organization, ultimately ensuring your employees are seen and heard.


The Top Six Risks of Employee Internet Use and How to Stop Them by  St. Bernard Software

May 10, 2010 - Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization.


The Total Economic Impact of Lumension Security's Sanctuary by  Lumension

September 10, 2007 - Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated


The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control by  Lumension

September 12, 2012 - Consult this study to find out more about the financial impact of moving from "voluntary" compliance solution to an IT-driven solution that automatically enforces endpoint security policies. Read in-depth interviews with John C. Lincoln hospitals to see the benefits first-hand.


The Total Economic Impact of Microsoft Exchange 2010 by  HP & Intel®

November 02, 2009 - This study illustrates the financial impact of deploying Microsoft Exchange 2010 for a retail and distribution organization of 1,500 employees and $450 million in annual revenue.


The Total Economic Impact of USA.NET SaaS Secure Messaging Solution by  Perimeter eSecurity

January 20, 2012 - The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of USA.NET's SaaS Secure Messaging solution on their organizations.


The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget by  Kaspersky Lab

November 04, 2011 - This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.


The True Costs of E-mail Encryption by  Trend Micro

August 11, 2010 - Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more.


The Truth about Agent vs. Agentless Monitoring by  uptime software inc.

September 30, 2010 - This brief paper will examine the differences between Agent and Agentless monitoring, so you can make the right decision based on your company’s needs.


The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches by  Boldon James

July 20, 2011 - In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates.


The Value of Deduplication in Enterprise Data Management by  CommVault Systems, Inc.

January 15, 2009 - CommVault's integrated deduplication solution reduces cost and complexity in your IT infrastructure while delivering improved performance, enhanced manageability and increased storage efficiency.


The Virtual Office Checklist by  Cisco Systems, Inc.

October 01, 2008 - The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.


The Web Hacking Incidents Database 2009 Bi-Annual Report by  Breach Security

August 03, 2009 - Criminals focus on exploiting web application vulnerabilities in order to plant malware and thus infect clients who visit websites. Read this report to learn more about the drivers behind web hacking, the vulnerabilities hackers exploit, and the types of organizations attacked most often.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts