Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mes

Results 3501 - 3525 of 3664Sort Results By: Published Date | Title | Company Name
Published By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : 
certifiedmail technology, email security, message security, encryption, security
    
DataMotion
Published By: VMware Dell     Published Date: Sep 29, 2008
This technical report will discuss the installation and configuration of Site Recovery Manager with the Dell EqualLogic PS Series storage arrays. It will cover setup, testing, failover, failback and troubleshooting. This document is designed to be used in conjunction with the Administrator Guide for Site Recovery Manager and assumes a prior knowledge of VMware Virtual Infrastructure.
Tags : 
vmware, dell, equallogic, site recovery, disaster recovery, iscsi, windows server, microsoft, data protection, network management
    
VMware Dell
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory
    
LogRhythm
Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Selecting an email system to fulfill the needs of a small-to-medium business (SMB) with 5-500 employees can be easy to do by following some practical and straightforward guidelines. Choosing a productive system involves finding the best combination of security, mobility, collaboration and ease-of-use, in addition to the basic functions of sending and receiving electronic messages.
Tags : 
alt-n technologies, email server, email, security, mobility, collaboration, administration
    
Alt-N Technologies
Published By: MessageLabs     Published Date: Sep 25, 2008
According to recent surveys, employee social networking is growing rapidly. Learn the pros and cons of employee social networking, from creating business development opportunities to just goofing off. Also, learn how social networking is raising new challenges for enterprise security, and the distinct advantages of implementing MessageLabs Web Services.
Tags : 
messagelabs, social networking, facebook, myspace, bebo, orkut, perfspot, friendster, neighborhood, networking, enterprise applications
    
MessageLabs
Published By: MessageLabs     Published Date: Sep 25, 2008
A close look at the data provides a clear picture of how spammers vary their tactics to overwhelm traditional corporate email defenses, through changes in duration, frequency and intensity among others. This whitepaper will help you understand these threats to your business, and how MessageLabs provides a unique solution.
Tags : 
messagelabs, spam, data analyst, traffic, trends, anti-spam, security
    
MessageLabs
Published By: MessageLabs     Published Date: Sep 25, 2008
In order to better understand where spyware is going, or more importantly, where it’s evolved from, we actually need to wind the clock back a lot further than may be first imagined; in fact, over fifteen years. If we look at the embryonic stages of the anti-virus industry, around sixteen years ago there were the first boot-sector viruses. It has taken this time for viruses as we’ve traditionally known them to evolve towards the more commercially viable, or intellectual-property-theft status that we now associate with contemporary viruses, a fact not realized by many. This whitepaper goes in-depth to discuss the history of spyware and its evolving future.
Tags : 
messagelabs, spyware, viruses, botnets, microsof, browser helper object, web threats, malware, windows, security
    
MessageLabs
Published By: MessageLabs     Published Date: Sep 25, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The "pump 'n' dump" stock scam has been around a long time. Learn how Internet criminals are perfecting it, and how MessageLabs offers superior protection.
Tags : 
messagelabs, stock, spam, pump ā€˜nā€™ dump, fraud, dul blocklist protection, security
    
MessageLabs
Published By: MessageLabs     Published Date: Sep 25, 2008
In the underground digital economy, thousands of criminals conduct business in excess of $100 billion. In this whitepaper you’ll learn more about this highly specialized marketplace, and how it generates powerful tools to steal victims’ identities. You’ll also see why MessageLabs unique proprietary technology helps to disrupt this activity.
Tags : 
messagelabs, malware, trojans, spyware, viruses, dot.com, fraud, botnet, spammers, security
    
MessageLabs
Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist
    
MessageLabs
Published By: SAS     Published Date: Sep 25, 2008
This white paper provides a blueprint for action for senior marketers and decision makers across the enterprise. It provides straightforward advice on how to build a more durable and profitable customer base by building a more competitive business model, enabling customer-centric business strategies in a product-centric organization, turning expanding volumes of customer data into actionable insight for smarter decision making, and providing a roadmap for integrating technology to achieve competitive advantage.
Tags : 
competitive advantage, customer data, data collection, business intelligence, customer intelligence, sas
    
SAS
Published By: IBM     Published Date: Sep 23, 2008
See why IBM BladeCenter S chassis is the right choice for independent businesses that need a powerful, yet simple IT. The white papers inside this informative eKit will show you how this system is easy to deploy, easy to use, and easy to manage; and how its modular technology helps avoid a cable mess in your office space.
Tags : 
ibm, ibm mmdg, bladecenter, small office, soho, ekit, networking, infrastructure, small business networks
    
IBM
Published By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : 
botnet, bot, messagelabs, email security, malware, virus, security, network security
    
MessageLabs
Published By: IBM     Published Date: Sep 18, 2008
Large corporations can weather sudden changes in today's volatile markets, but change is a greater challenge for mid-sized companies. However, you can grow even in disruptive and emerging markets if your business systems and data storage can adapt. This IBM white paper includes case studies that show you how systems can spur growth in times of change.
Tags : 
ibm, ibm mmdg, storage, systems, network management
    
IBM
Published By: Quocirca     Published Date: Sep 18, 2008
Even when facing challenging economic times, businesses still need to communicate and rely on technology to connect with customers, partners, suppliers and their own employees. Cutting back on communications spending will have a negative effect in a long downturn.  It will leave any business that does so with fewer options when conditions improve and at a disadvantage compared to competitors that continue to invest.  However, there are 10 steps that can be taken to grow the value and use of communications, while controlling costs.
Tags : 
telecom, telecoms, quocirca, networking, ip telephony
    
Quocirca
Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, security, network security
    
MessageLabs
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increasing infrastructure complexity has led to unprecedented growth in enterprise systems management data on all systems, including the mainframe and it is becoming more complex to manage SMF data.  Download this Technology Brief to learn how to address the complexity of managing SMF data.
Tags : 
smf, service management, data management, infrastructure, systems management, ca mainframe, mainframe
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : 
ca mainframe, mainframe, compliance, network performance, servers
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
This white paper describes the trends that are not only keeping the mainframe market alive but are supporting its growth. The growing complexity of IT makes consolidation and simplification of IT asset management essential. At the same time, increases in energy costs and concern about the environment are also impacting markets. Mainframes are uniquely positioned to provide the automation and virtualization today's complex infrastructures require while using less energy.
Tags : 
ca mainframe, mainframe, network management, server hardware, servers
    
CA Mainframe
Published By: HP Service Management     Published Date: Sep 04, 2008
Today, 84% of IT organizations view automation as a top investment priority for delivering on business outcomes.  Explore key priorities and trends based on IDC’s global survey of 164 IT professionals, including the role of automation across “IT silos” and virtualization, cost efficiencies and process standardization, and market maturity.  Read this new IDC survey to learn more.
Tags : 
communications, network and service management, software, infrastructure software, system management software, hp sm, hpsm, service management, hp service management, enterprise applications, infrastructure, network management
    
HP Service Management
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations, it operations, cmdb, automation, service, service management, service desk, lifecycle, life cycle, hpsm, hp sm, hp service management
    
HP Service Management
Published By: Tidal Software     Published Date: Sep 03, 2008
IT groups must support many applications and servers across multiple platforms that frequently operate independently of each other. However, coordinating job scheduling across all these applications and networks is often required to optimize resource utilization. The traditional approach of applying more staff, toolkits, and rudimentary scheduling software to cobble together automated batch processing solutions becomes cost-prohibitive, inefficient, and error-prone, as the number of moving parts increases and the environment becomes more heterogeneous.
Tags : 
job scheduling, job scheduler, batch scheduling, batch processing, cron, workload automation, application scheduling, enterprise scheduling, tidal, tidal software, network management
    
Tidal Software
Published By: MessageLabs     Published Date: Aug 29, 2008
Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.
Tags : 
messagelabs, compliance, email policies, policy, enforce policy
    
MessageLabs
Published By: NewField IT     Published Date: Aug 19, 2008
As offices review their office printing costs, one significant area almost entirely overlooked is the cost of having A3 devices. The perception is that the A3 document is as necessary to our office printing needs as power-steering is to our cars. The reality, as evidenced by NewField IT's review of more than 70,000 devices supporting over 200,000 users, is that A3 output in the office is remarkably low – less than 2.5% of total page volumes on average.
Tags : 
    
NewField IT
Start   Previous    133 134 135 136 137 138 139 140 141 142 143 144 145 146 147    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.