Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mes

Results 3451 - 3475 of 3606Sort Results By: Published Date | Title | Company Name
Published By: MessageLabs     Published Date: Sep 25, 2008
In the underground digital economy, thousands of criminals conduct business in excess of $100 billion. In this whitepaper you’ll learn more about this highly specialized marketplace, and how it generates powerful tools to steal victims’ identities. You’ll also see why MessageLabs unique proprietary technology helps to disrupt this activity.
Tags : 
messagelabs, malware, trojans, spyware, viruses, dot.com, fraud, botnet, spammers, security
    
MessageLabs
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist
    
MessageLabs
Published By: SAS     Published Date: Sep 25, 2008
This white paper provides a blueprint for action for senior marketers and decision makers across the enterprise. It provides straightforward advice on how to build a more durable and profitable customer base by building a more competitive business model, enabling customer-centric business strategies in a product-centric organization, turning expanding volumes of customer data into actionable insight for smarter decision making, and providing a roadmap for integrating technology to achieve competitive advantage.
Tags : 
competitive advantage, customer data, data collection, business intelligence, customer intelligence, sas
    
SAS
Published By: IBM     Published Date: Sep 23, 2008
See why IBM BladeCenter S chassis is the right choice for independent businesses that need a powerful, yet simple IT. The white papers inside this informative eKit will show you how this system is easy to deploy, easy to use, and easy to manage; and how its modular technology helps avoid a cable mess in your office space.
Tags : 
ibm, ibm mmdg, bladecenter, small office, soho, ekit, networking, infrastructure, small business networks
    
IBM
Published By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : 
botnet, bot, messagelabs, email security, malware, virus, security, network security
    
MessageLabs
Published By: IBM     Published Date: Sep 18, 2008
Large corporations can weather sudden changes in today's volatile markets, but change is a greater challenge for mid-sized companies. However, you can grow even in disruptive and emerging markets if your business systems and data storage can adapt. This IBM white paper includes case studies that show you how systems can spur growth in times of change.
Tags : 
ibm, ibm mmdg, storage, systems, network management
    
IBM
Published By: Quocirca     Published Date: Sep 18, 2008
Even when facing challenging economic times, businesses still need to communicate and rely on technology to connect with customers, partners, suppliers and their own employees. Cutting back on communications spending will have a negative effect in a long downturn.  It will leave any business that does so with fewer options when conditions improve and at a disadvantage compared to competitors that continue to invest.  However, there are 10 steps that can be taken to grow the value and use of communications, while controlling costs.
Tags : 
telecom, telecoms, quocirca, networking, ip telephony
    
Quocirca
Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, security, network security
    
MessageLabs
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increasing infrastructure complexity has led to unprecedented growth in enterprise systems management data on all systems, including the mainframe and it is becoming more complex to manage SMF data.  Download this Technology Brief to learn how to address the complexity of managing SMF data.
Tags : 
smf, service management, data management, infrastructure, systems management, ca mainframe, mainframe
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : 
ca mainframe, mainframe, compliance, network performance, servers
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
This white paper describes the trends that are not only keeping the mainframe market alive but are supporting its growth. The growing complexity of IT makes consolidation and simplification of IT asset management essential. At the same time, increases in energy costs and concern about the environment are also impacting markets. Mainframes are uniquely positioned to provide the automation and virtualization today's complex infrastructures require while using less energy.
Tags : 
ca mainframe, mainframe, network management, server hardware, servers
    
CA Mainframe
Published By: HP Service Management     Published Date: Sep 04, 2008
Today, 84% of IT organizations view automation as a top investment priority for delivering on business outcomes.  Explore key priorities and trends based on IDC’s global survey of 164 IT professionals, including the role of automation across “IT silos” and virtualization, cost efficiencies and process standardization, and market maturity.  Read this new IDC survey to learn more.
Tags : 
communications, network and service management, software, infrastructure software, system management software, hp sm, hpsm, service management, hp service management, enterprise applications, infrastructure, network management
    
HP Service Management
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations, it operations, cmdb, automation, service, service management, service desk, lifecycle, life cycle, hpsm, hp sm, hp service management
    
HP Service Management
Published By: Tidal Software     Published Date: Sep 03, 2008
IT groups must support many applications and servers across multiple platforms that frequently operate independently of each other. However, coordinating job scheduling across all these applications and networks is often required to optimize resource utilization. The traditional approach of applying more staff, toolkits, and rudimentary scheduling software to cobble together automated batch processing solutions becomes cost-prohibitive, inefficient, and error-prone, as the number of moving parts increases and the environment becomes more heterogeneous.
Tags : 
job scheduling, job scheduler, batch scheduling, batch processing, cron, workload automation, application scheduling, enterprise scheduling, tidal, tidal software, network management
    
Tidal Software
Published By: MessageLabs     Published Date: Aug 29, 2008
Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.
Tags : 
messagelabs, compliance, email policies, policy, enforce policy
    
MessageLabs
Published By: NewField IT     Published Date: Aug 19, 2008
As offices review their office printing costs, one significant area almost entirely overlooked is the cost of having A3 devices. The perception is that the A3 document is as necessary to our office printing needs as power-steering is to our cars. The reality, as evidenced by NewField IT's review of more than 70,000 devices supporting over 200,000 users, is that A3 output in the office is remarkably low – less than 2.5% of total page volumes on average.
Tags : 
    
NewField IT
Published By: Utimaco     Published Date: Aug 18, 2008
Despite the advances in encryption techniques and vastly improved computer capabilities, however, many of the fallacies and outdated understanding about encryption persist. Sometimes these myths are even being perpetuated in popular technology publications where some authors and editorial staff fail to do their research thoroughly.
Tags : 
data protection, data security, database security, protecting data, utimaco, security
    
Utimaco
Published By: CA WA     Published Date: Aug 15, 2008
Despite increasingly complex data center environments, IT is expected to provide business owners with faster service, higher reliability, and greater agility than ever before – all within a tight budget. It is impossible to meet these goals with manual IT processes. However, EMA research shows that IT Process Automation (ITPA) helps achieve these goals, delivering annual savings of $500,000 on staff costs alone, and 64 hours of additional uptime per year – plus improved resource utilization, security and compliance, problem response times, and agility.
Tags : 
workload automation, ca wa, computer associates, automation, bpm, bpa, it management
    
CA WA
Published By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services, outsourcing, outsourced it, managed services, managed systems, tech support, it solutions, security, compliance, disaster recovery, it management, infrastructure, small business networks
    
Managed Systems, Inc.
Published By: Sunbelt Software     Published Date: Aug 04, 2008
Security is the most single critical task for any email administrator. Starting with a foundation of anti-spam and anti-virus capabilities, organizations should focus on other capabilities, as well, including policy management and a variety of other tasks designed to protect the network and the company from external and internal threats.
Tags : 
email security, secure messaging, secure im, exchange, exchange server, microsoft exchange, ms exchange, sunbelt, sunbelt software, security
    
Sunbelt Software
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, small business networks
    
KEMP Technologies
Published By: Dell Software     Published Date: Jul 14, 2008
Learn best practices for an accurate, efficient and ZeroIMPACT Exchange migration across all major platforms by watching this on-demand webcast.
Tags : 
quest, exchange, migration, zeroimpact, messaging, network management
    
Dell Software
Published By: Dell Software     Published Date: Jul 14, 2008
Migrating to Exchange Server 2007 isn't easy. Quest Software's white paper, "Best Practices for Exchange 2007," explains the importance of proper planning and execution and the best practices you need to successfully migrate to Exchange Server 2007.
Tags : 
quest, exchange, migration, messaging, network management
    
Dell Software
Published By: Mailtrust     Published Date: Jul 07, 2008
Email is absolutely critical in making users productive: for example, a February 2008 survey conducted by Osterman Research found that 93% of email users consider email to be important or critical in helping them to get their work done. However, most decision makers are not aware of the true cost of providing email functionality to their users.
Tags : 
messaging, email, e-mail, email costs, cost of email, cost of e-mail, mailtrust, it management
    
Mailtrust
Start   Previous    131 132 133 134 135 136 137 138 139 140 141 142 143 144 145    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.