Anti Spam
Project Tools
About Us
For Vendors
Search by:   
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
U Listings:  Result Page 1

UC and Collaboration: Benefits and Market Drivers by

January 30, 2013 - This expert E-Guide from explores the benefits collaboration can bring your enterprise and provides an in-depth look at the drivers forcing organizations to find a newer, better UCC solution for their employees to leverage.


UC Collaboration Tools: Greater simplicity needed for IT, end users by

May 21, 2012 - Uncover why many organizations require greater simplicity in their unified communications (UC) collaboration tools – for both end-users and IT – in order for their UC strategy to be a success. Learn best practices to integrate UC tools, potential challenges you may face, and more!


UC Messaging by  CDW Corporation

March 11, 2011 - Watch this videocast to learn how visual voice mail, speech recognition and voice-to-text can improve information sharing.


UC Strategies and the Evolving Cloud by

October 01, 2012 - This E-Guide from explores the concept of cloud unified communications, the strategies and plans it offers, and how your organization can benefit.


UK Network Carrier Gains Network Visibility For Quick Troubleshooting by  Gigamon

December 31, 2012 - This case study focuses on a UK telecommunications organization that found a way to gain network visibility for quick troubleshooting and customer satisfaction, without affecting existing production network.


UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by  RSA, The Security Division of EMC

March 27, 2012 - Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more.


Unauthorized Applications: Taking Back Control by  Sophos, Inc.

July 01, 2008 - This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.


Unchain Your Network with Application Intelligence and Control by  SonicWALL

February 24, 2011 - This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.


Understanding Advanced Persistent Threats and Complex Malware by  Dell SecureWorks UK

October 10, 2012 - Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.


Understanding and Detecting Malware Threats Based on File Size by  Fortinet, Inc.

December 01, 2006 - Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.


Understanding and Selecting a Data Loss Prevention Solution by  Websense, Inc.

July 07, 1967 - Data Loss Prevention is a confusing market, but by understanding the capabilities of DLP tools you can choose an appropriate tool. This report will provide the necessary background in DLP to help you find the best match for your organization.


Understanding Avaya IP Office Short Codes by  Global Knowledge

May 01, 2013 - This white paper provides a road map to understanding the programming and use of short codes in an Avaya IP Office system. It is based primarily on the codes used with the IPO 8.1 U-Law system with the Essential, Preferred, or Advanced Edition system licenses.


Understanding BlackBerry Balance by  BlackBerry

July 10, 2013 - This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.


Understanding High Availability for the BlackBerry Enterprise Server by  BlackBerry

August 06, 2009 - Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades.


Understanding High Availability for the BlackBerry Enterprise Server by  BlackBerry

August 06, 2009 - Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades.


Understanding Hosted Exchange Options by

May 09, 2013 - This expert handbook examines the pros and cons of on-premise vs. off-premise Exchange environments. Learn more about how to weigh hosted Exchange options, the key security considerations and why new Office 365 versions are emphasizing subscriptions.


Understanding Log Shipping and Its Advantages for Compliance Archiving with Microsoft Exchange Server by  Mimosa Systems

October 01, 2008 - This white paper describes how log shipping compares with journaling for Exchange compliance archiving.


Understanding the Advanced Persistent Threat by  LogRhythm, Inc.

December 31, 2013 - This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.


Understanding the Reasons Behind Data Loss Disasters by  Websense, Inc.

February 02, 2012 - While the importance of establishing the right IT systems and security policies have been expressed time and time again, a quick glance at the news headlines on data disasters reveal that not all organizations have a grasp on data leak protection. View this paper to explore some data loss incidents and the key leassons learned.


Understanding the risks of mobile apps by  Veracode, Inc.

May 11, 2012 - Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.


Understanding the Total Cost of Ownership for Endpoint Security Solutions by  Sophos, Inc.

March 24, 2009 - When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.


Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data by  Imperva

June 17, 2013 - In this e-guide, brought to you by, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.


Understanding WMI Malware by  Trend Micro, Inc.

October 26, 2010 - This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.


Unified Communication Manager - Class of Service by  Global Knowledge

February 14, 2013 - This whitepaper unveils how Class of Service within Cisco's Unified Communication Manager can help you control which phone numbers can be called by particular devices. View now to learn how this simple, flexible solution can be effective in numerous situations.


Unified Communications by  CDW Corporation

July 27, 2010 - Integrate multiple communication networks into a single, unified system to enable more effective communication and collaboration with staff, partners, and customers.


Unified Communications Pocket Guide by  ShoreTel

May 19, 2009 - This guide is intended for both IT staff, voice system managers, as well as CIOs. It describes the issues decision makers need to understand as they set out to build a winning unified communication strategy.


Unified Content Security in Practice by  Websense, Inc.

May 03, 2011 - Unified Content Security is a new sescurity solution, but it is an effective one. With this solutions your business is able to combine web security, email security, and data loss prevention.


Unified Physical Infrastructure℠ Solutions for the Data Center A Service Management Approach to IT Physical Infrastructure Management by  Panduit

September 01, 2010 - This white paper discusses how a DCIM solution based on the Unified Physical InfrastructureSM (UPI) approach brings visibility to the physical infrastructure components that support mission critical services. Armed with this solution, data center stakeholders have a more powerful service management toolset and so much more


Unified Threat Management Guide by  Sophos, Inc.

December 31, 2013 - This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.


Unified Threat Management Market Review: WatchGuard vs. Juniper, Cisco, Fortinet, and SonicWall by  WatchGuard Technologies, Inc.

April 01, 2010 - Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.


Unified Threat Management: The Best Defense against Blended Threats by  SonicWALL

January 01, 2005 - The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.


Unified Threat Management: The security you need, the simplicity you want by  Check Point Software Technologies Ltd.

September 01, 2008 - This paper explores the security issues driving the emergence of UTM products. It then examines a new solution from Check Point, UTM-1 Total Security appliances, and shows how it tackles many of the security challenges other UTM products cannot.


Unifying Avaya Aura Messaging by  Global Knowledge

March 13, 2013 - Explore an advanced tool for streamlining message management by integrating voice and email access and storage. Discover how this platform integrates your voice messages directly into your Exchange environment on a single interface reducing IT and end user frustrations alike.


University of Georgia Gets Lesson: NetVault™ Makes the Grade in Power, Ease of Use by  BakBone

April 01, 2008 - UGA evaluated several companies backup/restore software, before choosing BakBone Software NetVault. This case study examines why UGA opted for BakBone software.


University Uses Hosted Collaboration Solution to Enhance Learning and Strengthen Community by  Microsoft

October 01, 2008 - St. John's University wanted to implement a communication and collaboration system capable of meeting the needs of its students' digital lifestyles. The University replaced its Unix-based e-mail solution for students with Microsoft® Live@edu.


Unraveling Web Malware by  FireEye

September 01, 2008 - There's no denying the rapid rise in the use of Web-based blended threats to compromise client browsers and operating systems. Increasing use of Web 2.0 technologies, syndicated, iframes, third-party widgets - all of these proliferate malicious software.


Unraveling Web Malware by  FireEye

September 29, 2008 - There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft.


User Access Controls: Authorizations Insight for PeopleSoft by  Approva Corporation

January 01, 2007 - Approva's Authorizations Insight for PeopleSoft monitors user authorizations across all your PeopleSoft ERP environments to detect, remediate and prevent segregation of duties (SoD) conflicts and inappropriate access to sensitive pages.


Using application control to reduce risk with endpoint security by  Sophos, Inc.

July 19, 2011 - Unauthorized applications should be a prime consideration for applying application control, as it increases the risk of malware infections and data loss. View this paper to explore how integrating application control with endpoint solutions can provide the most efficient and comprehensive defense against unwanted applications.


Using Classification to Manage Email Policy for the Enterprise by  TITUS

May 01, 2008 - Email has historically been a weak link in organizational security. Classification and policy based strategies enable email to be managed more securely and effectively. Email classification is a technique for adding metadata and visual labels to email.


Using Deduplication to Meet Recovery Time Objectives, Reduce Storage Costs, Simplify Data Management, and Meet Compliance and eDiscovery SLA's by  CommVault Systems, Inc.

January 16, 2009 - CommVault Simpana is the only product that delivers files and email-attachments deduplication across backup and archive as part of a proven and unified data management solution.


Using electronic contact details for marketing by  Experian QAS

December 01, 2009 - What does an e-Marketer do when he or she gets to work? What tasks do they perform that are impacted upon by legislation and regulation? Let's take a look at a simplified view where we acquire, hold and use electronic contact information e.g. email addresses and see how legislation and regulation has an impact.


Using SaaS to Reduce the Costs of Email Security by  Proofpoint, Inc.

February 01, 2009 - This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach.


Using Server-Based Networks to Meet your Small Business Challenges by  Dell, Inc. and Microsoft

July 09, 2007 - Today's server technology is surprisingly affordable and user-friendly and well worth your attention. Read this paper to learn about key benefits a server-based network can bring to your business.


Using SharePoint to Unify Records Management with Iron Mountain Solutions by  Iron Mountain

December 10, 2012 - As the amount of unstructured business data continues to grow, IT is under pressure to craft effective records management programs – and fast. Only 37% of companies with formal policies are able to consistently apply them company-wide. Read on to learn about a next-gen platform that integrates with SharePoint to provide highly-effective policies.


Using Windows File Classification Infrastructure to Classify and Protect Documents by  TITUS

November 11, 2010 - This white paper describes how organizations can leverage the File Classification Infrastructure and partner solutions to identify the business value of data, raise security awareness, and protect information assets.

The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts