Anti Spam
REGISTER| SIGN IN| HELP| HOME
Browse
Project Tools
About Us
For Vendors
Search by:   
Search
  Advanced Search >   

Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
W Listings:  Result Page 1
 

Waiting to Upgrade: Understanding Archiving and eDiscovery Limitations in Exchange 2010 by  Sherpa Software


September 28, 2010 - Microsoft Exchange Server is a powerful enterprise messaging tool that has proven to be very successful over the years. This white paper, sponsored by Sherpa Software, outlines the various archiving and eDiscovery features in Exchange 2010, examines how they work, and discusses various limitations in their deployment.

 

WAN Optimization for Today and Tomorrow by  BlueCoat


February 09, 2011 - This whitepaper provides key insight for IT professionals interested in accelerating user performance by two to three hundred times, reducing bandwidth for files, storage and email by 50 to 95 percent, and making consolidation and centralization possible.

 

WAN Security: Making the Right Choices for an Optimized WAN by  XO Communications


April 30, 2012 - This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.

 

WAN Speak Musings – Volume III by  ComputerWeekly.com


November 01, 2013 - Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.

 

Weaponized malware now threatens the private sector by  Lumension


September 12, 2012 - Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.

 

Web Based Attacks by  Symantec Corporation


February 01, 2009 - This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.

 

Web Content Control: Five Steps to a Successful Implementation by  Untangle, Inc.


October 30, 2009 - Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation.

 

Web Exploits: There’s an App for That by  M86 Security


May 27, 2010 - The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.

 

Web Filtering: An Essential Part of a Consolidated Security System by  Fortinet, Inc.


July 29, 2011 - In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.

 

Web Security Solutions by  Websense, Inc.


November 19, 2008 - Read this whitepaper to learn ways to implement industry-leading URL filtering with extensive security capabilities that continuously watch the organization's assets for malicious activity and prevent them from being used in fraudulent attacks.

 

Web Security – Virtual Appliance by  Cisco Systems, Inc.


April 22, 2014 - Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.

 

Web Security: Advanced Malware Protection by  Cisco Systems, Inc.


April 21, 2014 - This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention.

 

Web Threats 2010: The Risks Ramp Up by  CSC


November 17, 2010 - In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.

 

Web Threats: Challenges and Solutions by  Trend Micro, Inc.


January 12, 2009 - Read this white paper to better understand Web threats and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.

 

Webcast: Symantec Internet Security Threat Report 2014 by  Symantec Corporation


May 09, 2014 - Download and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.

 

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market by  ArcSight, an HP Company


March 04, 2011 - This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

 

Webmail Forensics: Investigating Issues with Email Forwarding Security by  Kaspersky Lab


April 22, 2013 - This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

 

Webmail Forensics: Investigating Issues with Email Forwarding Security by  SearchSecurity.com


October 07, 2013 - In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.

 

WebPulse Collaborative Defense by  BlueCoat


November 04, 2011 - Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.

 

WebPulse Technical Overview by  BlueCoat


November 04, 2011 - The Blue Coat WebPulse™ is a cloud-based infrastructure specifically designed to harness the power of user-driven behavior and to translate user input into global web and web threat intelligence. Learn how WebPulse employs multiple technologies to analyze and deliver the fastest and most accurate web ratings service available.

 

Webroot E-Mail Security Saas: Business Continuity by  Webroot


January 01, 2007 - ‘On Tap' Business Continuity means that the service is constantly active and available at all times, not just when disaster strikes.

 

Webroot Enterprise Spy Audit by  Webroot


October 16, 2006 - Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.

 

Webroot Secure Anywhere - Endpoint Protection by  Webroot


August 06, 2012 - Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.

 

Webroot Secure Anywhere Business - Mobile Protection by  Webroot


July 25, 2012 - Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.

 

Websense 2014 Threat Report, Websense Security Labs by  Websense, Inc.


April 17, 2014 - In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.

 

Websense TRITON Mobile Security by  Websense, Inc.


April 16, 2012 - When it comes to mobile security, the biggest concern isn’t the mobile device itself – it’s the data; so it’s important to implement the most effective measures to fend off mobile threats. In this brief resource, explore how Triton Mobile Security combines four (4) key elements to enable highly effective unified mobile security.

 

WebSmart Services by  Melissa Data Corp


April 20, 2010 - Melissa Data’s WebSmart Services can handle your data quality needs. Ensure that your contact data, including addresses, names, phone numbers, and emails are valid, and use existing data to append additional information to enhance initiatives. The WebSmart services can be integrated into the business chain to ensure the integrity of your database.

 

WebSphere Cast Iron Cloud Integration Technical Overview by  IBM


March 07, 2012 - This whitepaper covers a solution that will make the migration and integration of all functions into the cloud much simpler.

 

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner by  Perimeter eSecurity


November 03, 2011 - Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter.

 

What Are Your Obligations to Retain Email and Other Electronic Content? by  EMC Backup and Recovery Solutions


March 23, 2011 - This white paper discusses what drives organizations in heavily regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands. Also provided with this paper is an overview of EMC.

 

What Are Your Obligations to Retain Email and Other Electronic Content? by  Proofpoint, Inc.


October 29, 2010 - This paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands.

 

What can you do differently to guard against threats from rapidly evolving mobile malware? by  IBM


January 31, 2014 - This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.

 

What is FakeAV? by  Sophos UK


June 07, 2010 - Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.

 

What is FakeAV? by  Sophos, Inc.


May 24, 2010 - FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.

 

What Security Threats Can We Expect in 2012? by  Websense, Inc.


December 15, 2011 - View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more.

 

What to Look for When Evaluating Next-Generation Firewalls by  Dell Software


December 10, 2012 - This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality.

 

What to think about when utilizing endpoint securities by  SearchSecurity.com


January 20, 2012 - There’s a lot to consider when establishing a proper endpoint security plan for your organization. And with so many tools available today, it is easy to forget the very basics of security. View this e-guide to help you refocus on the priorities and discover how to choose, keep or upgrade your endpoint security systems.

 

What's New in BlackBerry® Enterprise Server v4.1 with Service Pack 5 for Microsoft® Exchange by  BlackBerry


March 01, 2008 - View this webcast to learn about the new wireless capabilities as well as enhanced administrative features that were introduced with the latest release of BlackBerry Enterprise Server for Microsoft Exchange.

 

What's New With Microsoft Office Communications Server 2007 R2 by  Microsoft


March 06, 2009 - This presentation transcript explains the new features and functionality in the Office Communications Server 2007 R2, the application that continues to deliver on the Microsoft promise to streamline communications for users, give IT organizations the flexibility and control they need, and provide an extensible communications platform.

 

What's Wrong with Traditional Firewalls? by  Dell Software


December 20, 2012 - Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.

 

When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption by  WatchGuard Technologies, Inc.


February 24, 2011 - WatchGuard XCS SecureMail Email Encryption (XCS SecureMail) technology, powered by Voltage, provides easy-to-use, business-class encryption to enable organizations to securely transmit and receive private and sensitive data.

 

When Legitimate Sites Threaten Your Network by  Kaspersky Lab


August 19, 2009 - Did you know that legitimate sites like BusinessWeek.com and MLB.com have been victimized by drive-by malware? This security brief discusses specific measures you can take to protect your business and defend against these attacks.

 

When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints by  Sunbelt Software


July 30, 2009 - Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.

 

When Malware Goes Mobile: Causes, Outcomes and Cures by  Sophos, Inc.


May 17, 2013 - This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.

 

When Network Security Becomes a Network Management Problem by  Infoblox


September 30, 2013 - When a network management team is dealing with the aftermath of an attack, it limits their ability to do their jobs and the amount of resources and time they have. Fortunately, this white paper explains 6 ways your network management team can make positive contributions to your company's defense against various attacks.

 

When Web 2.0 Becomes Security Risk 2.0 by  Kaspersky Lab


August 19, 2009 - Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.

 

The Windows Mobile Netbook for the Enterprise with Low TCO by  Celio Corp / REDFLY Mobile Companion


August 01, 2008 - The Windows Mobile smartphone is easily deployed with a wide array of productivity tools allowing the mobile user to quickly respond to customer requests, stay up-to-date on the latest company information or access remote desktops.

 

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved by  MarkMonitor


October 01, 2008 - This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.

 

Who is the top cloud business email provider? by  Google


February 17, 2014 - This exclusive paper assesses one of the top cloud business email solutions on the market today, outlining its features and discussing what benefits it can bring to your organization.

 

Who's Got the NAC? Best Practices in Protecting Network Access by  Sophos, Inc.


February 01, 2008 - This Aberdeen report aims to further the market's understanding of NAC - its function and capabilities - as seen through the eyes of those organizations that are getting the best results in protecting their network access.

 

Who’s Snooping on Your Email? by  Sophos, Inc.


December 17, 2013 - This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

 

Why an Output Management Solution Will save You Money by  ROC Software


July 01, 2007 - Output management saves the enterprise money by centralizing control of the output environment directly with IT professionals trained to efficiently resolve problems.

 

Why Bayesian Filtering Is the Most Effective Anti-spam Technology by  GFI Software


March 18, 2008 - This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.

 

Why Cloud-Based Security and Archiving Make Sense by  Google Postini


June 03, 2010 - Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both.

 

Why Content Filters Can't Eradicate Spam by  Mimecast


August 30, 2010 - The vanguard of current spam management systems has been the content filter. These spam filters use various techniques applied to the words and content of email in order to determine whether the email should be allowed to the recipient or not. Read this white paper to learn more.

 

Why Customers Love VIPRE Business by  GFI Software


March 11, 2011 - This paper examines that selecting and anti-virus solution for your organization is an important decision. VIPRE Business offers an easy-to-use management console that gets you up and running fast.

 

Why Hackers have turned to Malicious JavaScript Attacks by  Sophos, Inc.


April 13, 2011 - Learn about the threat of malicious JavaScript attacks, and how they work. Understand how cybercriminals make money with these types of attacks and why IT managers should be vigilant.

 

Why It’s Time for Enterprises to Secure Mac Computers by  Symantec Corporation


December 31, 2013 - This guide explores the importance of protecting your Macs with endpoint security software and outlines how malware and advanced persistent threats look to infiltrate your operating systems.

 

Why Managing Mobility Matters by  SAP America, Inc.


January 05, 2011 - Mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.

 

Why Most Organizations Miss User Response Monitoring - and What to Do about It by  Nimsoft, Inc.


August 01, 2008 - This guide explains the challenges of user response monitoring and how to overcome these challenges. It also teaches you how to get a real handle on infrastructure performance and shows you how it will impact user experience.

 

Why Organizations Need to Archive Email by  GFI Software


March 18, 2008 - Email has become an integral part of the business workflow. This paper explains why email archiving must be an integral part of every organization and examines the different methods for deploying and managing email archive solutions in an organization.

 

Why the Cloud for Collaboration? by  Cisco Systems, Inc.


November 13, 2013 - The following IDC research paper discusses the strategic benefits of migrating to a cloud-based collaboration effort as well as insight to challenges and solutions faced by CIOs when considering the move.

 

Why Traditional Anti-Malware Solutions Are No Longer Enough by  AVG Technologies USA, Inc.


November 17, 2009 - Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.

 

Why You Should Consider Cloud-Based Email Archiving by  Perimeter eSecurity


November 02, 2011 - This whitepaper, authored by messaging industry analyst The Radicati Group, looks at the key reasons organizations should consider moving to a cloud-based archiving solution.

 

Why You Should Consider Hosted Messaging Security by  Trend Micro GmbH


February 19, 2009 - In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more.

 

Why Your Organization Needs to Implement DLP by  Trend Micro, Inc.


July 15, 2010 - Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.

 

Protecting Against the New Wave of Malware: Osterman Research by  Sunbelt Software


September 01, 2008 - This paper addresses the variety of issues organizations face in context of their security challenges, and discusses the capabilities of VIPRE Enterprise, an integrated platform that provides high-performance, integrated endpoint protection capabilities.

 

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You by  Aladdin Knowledge Systems


August 01, 2008 - This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.

 

Will Your Company Benefit from Fax Servers and Electronic Document Delivery? by  OpenText


October 26, 2010 - This paper discusses how efficient, secure and cost-effective distribution of this business information can have a significant impact on overall business performance by extending process efficiencies. That’s where fax server software can provide a business edge. Read on to learn if your company can benefit from automating document delivery.

 

Wireless Push Email for the Smaller Business: A Comparison by  J. Gold Associates, LLC


February 27, 2009 - This whitepaper explores the requirements and use of mobile extensions to email and PIM systems in companies that have selected the popular Microsoft Exchange environment as their email solution.

 

Woods Gain Advanced Web Filtering Technology with Bloxx by  Bloxx, Inc.


September 01, 2008 - The Bloxx Web filtering appliance with Tru-View Technology combines the best of traditional methods with its patented language analysis and intelligent identification techniques, providing three levels of protection.

 

Workgroup Connections Notes eDiscovery by  Workgroup Connections, An IBM Partner


March 19, 2009 - This comprehensive offering provides an immediate and long-term solution that helps companies apply cost-saving best practices, reduce risk and improve the management of their eDiscovery efforts.

 

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks by  FireEye


December 31, 2013 - This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.

 

Worry-Free Business Security Advanced by  Trend Micro, Inc.


October 26, 2010 - Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

 

Worry-Free Business Security Services by  Trend Micro, Inc.


October 26, 2010 - Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

 

Worry-Free Business Security Standard by  Trend Micro, Inc.


October 26, 2010 - Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

 

WWW - World Wide Weaponization by  ESET


October 22, 2009 - The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.

 
The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts