September 28, 2010 - Microsoft Exchange Server is a powerful enterprise messaging tool that has proven to be very successful over the years. This white paper, sponsored by Sherpa Software, outlines the various archiving and eDiscovery features in Exchange 2010, examines how they work, and discusses various limitations in their deployment.
February 09, 2011 - This whitepaper provides key insight for IT professionals interested in accelerating user performance by two to three hundred times, reducing bandwidth for files, storage and email by 50 to 95 percent, and making consolidation and centralization possible.
September 12, 2012 - Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
October 30, 2009 - Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation.
May 27, 2010 - The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.
July 29, 2011 - In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
November 19, 2008 - Read this whitepaper to learn ways to implement industry-leading URL filtering with extensive security capabilities that continuously watch the organization's assets for malicious activity and prevent them from being used in fraudulent attacks.
November 17, 2010 - In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.
January 12, 2009 - Read this white paper to better understand Web threats and their
impacts, as well as why conventional methods fail to protect against
these threats and the characteristics of a new approach required to
ensure security, regulatory compliance, and business continuity.
May 09, 2014 - Download and tune in to this exclusive webcast to get the Internet Security Threat Report for 2014. Get the intel you need to strengthen and defend your systems against breaches, malware, and targeted attack campaigns.
March 04, 2011 - This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
April 22, 2013 - This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
October 07, 2013 - In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.
November 04, 2011 - Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.
November 04, 2011 - The Blue Coat WebPulse™ is a cloud-based infrastructure specifically designed to harness the power of user-driven behavior and to translate user input into global web and web threat intelligence. Learn how WebPulse employs multiple technologies to analyze and deliver the fastest and most accurate web ratings service available.
October 16, 2006 - Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
August 06, 2012 - Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.
July 25, 2012 - Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
April 17, 2014 - In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
April 16, 2012 - When it comes to mobile security, the biggest concern isn’t the mobile device itself – it’s the data; so it’s important to implement the most effective measures to fend off mobile threats. In this brief resource, explore how Triton Mobile Security combines four (4) key elements to enable highly effective unified mobile security.
April 20, 2010 - Melissa Data’s WebSmart Services can handle your data quality needs. Ensure that your contact data, including addresses, names, phone numbers, and emails are valid, and use existing data to append additional information to enhance initiatives. The WebSmart services can be integrated into the business chain to ensure the integrity of your database.
November 03, 2011 - Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter.
March 23, 2011 - This white paper discusses what drives organizations in heavily regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands. Also provided with this paper is an overview of EMC.
October 29, 2010 - This paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands.
January 31, 2014 - This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
June 07, 2010 - Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
May 24, 2010 - FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.
December 15, 2011 - View this webcast to explore the projected security threats in 2012, how you should prepare your data, email, and web security of your organization going into the New Year, how security is being impacted in a highly mobile, socially networked, and cloud based environment, and more.
December 10, 2012 - This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality.
January 20, 2012 - There’s a lot to consider when establishing a proper endpoint security plan for your organization. And with so many tools available today, it is easy to forget the very basics of security. View this e-guide to help you refocus on the priorities and discover how to choose, keep or upgrade your endpoint security systems.
March 01, 2008 - View this webcast to learn about the new wireless capabilities as well as enhanced administrative features that were introduced with the latest release of BlackBerry Enterprise Server for Microsoft Exchange.
March 06, 2009 - This presentation transcript explains the new features and functionality in the Office Communications Server 2007 R2, the application that continues to deliver on the Microsoft promise to streamline communications for users, give IT organizations the flexibility and control they need, and provide an extensible communications platform.
December 20, 2012 - Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.
August 19, 2009 - Did you know that legitimate sites like BusinessWeek.com and MLB.com have been victimized by drive-by malware? This security brief discusses specific measures you can take to protect your business and defend against these attacks.
July 30, 2009 - Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
May 17, 2013 - This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.
September 30, 2013 - When a network management team is dealing with the aftermath of an attack, it limits their ability to do their jobs and the amount of resources and time they have. Fortunately, this white paper explains 6 ways your network management team can make positive contributions to your company's defense against various attacks.
August 19, 2009 - Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.
August 01, 2008 - The Windows Mobile smartphone is easily deployed with a wide array of productivity tools allowing the mobile user to quickly respond to customer requests, stay up-to-date on the latest company information or access remote desktops.
October 01, 2008 - This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
February 17, 2014 - This exclusive paper assesses one of the top cloud business email solutions on the market today, outlining its features and discussing what benefits it can bring to your organization.
February 01, 2008 - This Aberdeen report aims to further the market's understanding of NAC - its function and capabilities - as seen through the eyes of those organizations that are getting the best results in protecting their network access.
December 17, 2013 - This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
June 03, 2010 - Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both.
August 30, 2010 - The vanguard of current spam management systems has been the content filter. These spam filters use various techniques applied to the words and content of email in order to determine whether the email should be allowed to the recipient or not. Read this white paper to learn more.
March 11, 2011 - This paper examines that selecting and anti-virus solution for your organization is an important decision. VIPRE Business offers an easy-to-use management console that gets you up and running fast.
December 31, 2013 - This guide explores the importance of protecting your Macs with endpoint security software and outlines how malware and advanced persistent threats look to infiltrate your operating systems.
January 05, 2011 - Mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
August 01, 2008 - This guide explains the challenges of user response monitoring and how to overcome these challenges. It also teaches you how to get a real handle on infrastructure performance and shows you how it will impact user experience.
March 18, 2008 - Email has become an integral part of the business workflow. This paper explains why email archiving must be an integral part of every organization and examines the different methods for deploying and managing email archive solutions in an organization.
November 13, 2013 - The following IDC research paper discusses the strategic benefits of migrating to a cloud-based collaboration effort as well as insight to challenges and solutions faced by CIOs when considering the move.
November 17, 2009 - Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.
February 19, 2009 - In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more.
July 15, 2010 - Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
September 01, 2008 - This paper addresses the variety of issues organizations face in context of their security challenges, and discusses the capabilities of VIPRE Enterprise, an integrated platform that provides high-performance, integrated endpoint protection capabilities.
October 26, 2010 - This paper discusses how efficient, secure and cost-effective distribution of this business information can have a significant impact on overall business performance by extending process efficiencies. That’s where fax server software can provide a business edge. Read on to learn if your company can benefit from automating document delivery.
February 27, 2009 - This whitepaper explores the requirements and use of mobile extensions to email and PIM systems in companies that have selected the popular Microsoft Exchange environment as their email solution.
September 01, 2008 - The Bloxx Web filtering appliance with Tru-View Technology combines the best of traditional methods with its patented language analysis and intelligent identification techniques, providing three levels of protection.
March 19, 2009 - This comprehensive offering provides an immediate and long-term solution that helps companies apply cost-saving best practices, reduce risk and improve the management of their eDiscovery efforts.
October 22, 2009 - The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.