RSS feed Get our RSS feed

News by Topic

scribe

Results 526 - 550 of 861Sort Results By: Published Date | Title | Company Name
By: Arbor Networks     Published Date: Jan 31, 2013
This paper will look at DDoS attacks in detail. It will illustrate the attack vectors being used and describe why the threat to organizations is greater than ever before
Tags : anti-ddos, products, services, critical, business environment, ips devices, firewall, arbor network
     Arbor Networks
By: Citrix Systems     Published Date: Jan 29, 2013
This white paper describes options for a mobile services-focused computing architecture that empowers productivity through work-shifting, consumerization and collaboration.
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : ipad, android, tablet, mobility, byo, smartphone, citrix
     Citrix Systems
By: Return Path     Published Date: Jan 29, 2013
Measuring your data can be difficult, but knowing what to do next is even harder. Identify issues quickly with the “Email Metrics Troubleshooter” checklist, so you can focus less time on identifying problems and more time on reaching your goals.
Tags : email failure, high unsubscribe rate, low click-through rate, drop in open rate, low response rate, rise in traffic but not in conversion, email trends, email marketing trends
     Return Path
By: WatchGuard     Published Date: Jan 28, 2013
This white paper describes the market drivers behind the BYOD phenomenon, the challenges presented to an organization, a strategic outline to manage BYOD, and how WatchGuard helps to create a secure BYOD ecosystem.
Tags : byod, bring your own device, it security
     WatchGuard
By: IBM     Published Date: Dec 12, 2012
This paper describes the way a number of organizations have used IBM’s high-end server and software technology to build private cloud environments that have helped them save money, improve agility and more. Read more!
Tags : private cloud, ibm, low cost, cost efficient, foundation, high performance
     IBM
By: HP     Published Date: Dec 06, 2012
This white paper describes the characteristics and HP's vision of Software-Defined Networks. It describes how cloud computing and enterprise IT environments can benefit from Software-Defined Networks.
Tags : network, cloud, enterprise, virtualization
     HP
By: HP and Intel® Xeon® processors     Published Date: Nov 19, 2012
This white paper reviews the impact of server virtualization on the data center and describes a simpler way to build more secure and automated networks that fully meet the stringent performance, availability, and agility demands of data centers.
Tags : virtualization, optimization, data centers, it infrastructure, it management
     HP and Intel® Xeon® processors
By: Qualys     Published Date: Nov 16, 2012
This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats
     Qualys
By: Qualys     Published Date: Nov 16, 2012
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization's overall vulnerability management program.
Tags : web applications, web application security, security and compliance, security
     Qualys
By: Sponsored by HP and Intel®     Published Date: Nov 15, 2012
This white paper describes the major requirements for network management solutions to help the organizations become more profitable, efficient and reliable.
Tags : integrated network management, network management, networking
     Sponsored by HP and Intel®
By: IBM     Published Date: Nov 09, 2012
This paper describes what operational analytics is and what it offers to the business. We explore its relationship to business intelligence (BI) and see how traditional data warehouse architectures struggle to support it.
Tags : ibm, db2 analytics acclerator, analytics integration, business intelligence
     IBM
By: Webroot     Published Date: Nov 07, 2012
This case study describes how a technical services firm benefited from deploying Webroot for layered Web and endpoint security.
Tags : endpoint security, web security, it security, security solutions, case study, mobile security, mobility, security
     Webroot
By: Webroot     Published Date: Nov 07, 2012
This case study describes how one of the UK's leading charities used the Webroot® Web Security Service to resolve problems with its existing Web security solution, which revolved mainly around administration and reporting.
Tags : web security service, case study, deployment, it security, case study, security
     Webroot
By: Webroot     Published Date: Nov 07, 2012
This case study describes how globally dispersed technology company, Cascade Microtech addressed concerns about Web Security.
Tags : case study, web security, cloud, mobility, mobile security, web security solutions, security
     Webroot
By: IBM     Published Date: Nov 06, 2012
In this Research Report, Clabby Analytics describes why we believe that firms need to focus first and foremost on organization data - while, at the same time, designing a support infrastructure that can address user QoS needs to scale to meet needs.
Tags : ibm, integrated infrastructure, business analytics, qos, infrastructure, analytic workload
     IBM
By: Sponsored by HP and Intel®     Published Date: Nov 05, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery.
Tags : dedupe, storeonce, deduplication, backup, data recovery
     Sponsored by HP and Intel®
By: Schneider Electric     Published Date: Oct 04, 2012
A growing number of consolidation efforts have found success consolidating into an existing data center using the effective approach described in this paper.
Tags : schneider electric, data center, racks, power, power and cooling, energy savings, data center consolidation, network infrastructure
     Schneider Electric
By: Oracle Corp - Storage     Published Date: Sep 25, 2012
This paper describes how these trends have affected storage technologies and how Oracle's storage solutions enable organizations to reduce IT costs, accelerate provisioning of private cloud services, and achieve higher service levels.
Tags : cloud, cloud computing, storage, virtualization, oracle, data protection, backup and recovery, data backup
     Oracle Corp - Storage
By: Oracle Corp.     Published Date: Sep 20, 2012
his paper describes how these trends have affected storage technologies and how Oracle's storage solutions enable organizations to reduce IT costs, accelerate provisioning of private cloud services, and achieve higher service levels.
Tags : cloud, cloud computing, storage, virtualization, oracle, data protection, backup and recovery, data backup
     Oracle Corp.
By: Oracle Corp.     Published Date: Sep 07, 2012
Hear why Director of Integration Architecture Rosen Atanasov of Rogers Communications describes the 5,000 transaction/second (average) deployment of Oracle Service Bus as "the favorite tool of any integration architect and developer."
Tags : oracle service bus, oracle, integration
     Oracle Corp.
By: Polycom     Published Date: Sep 04, 2012
This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Tags : firewall traversal, polycom, unified communications, security solutions, uc devices
     Polycom
By: PulseConnect     Published Date: Sep 04, 2012
Inside this collection of insightful case studies, you'll discover how companies like JetBlue, HealthConnect One, InfusionSoft, Lumension and GamersFirst significantly increased revenue and engagement by rethinking their email marketing programs.
Tags : email lists, email subscribers, email marketing, email targeting, case studies, jetblue, healthconnect one, infusionsoft
     PulseConnect
By: PulseConnect     Published Date: Sep 04, 2012
To understand the state of email marketing, we examined the sophistication of organizations internal processes for email marketing, and how effectively and efficiently do those programs deliver relevant email.
Tags : email subscribers, email lists, email list management, email marketing, email targeting, email marketing performance, email marketing services/software, list management
     PulseConnect
By: SpectorSoft     Published Date: Aug 28, 2012
This whitepaper will describe the best methodologies used to perform investigations, and why investigating proactively can help.
Tags : human resources, spectorsoft, employee investigations, file auditing, user activity monitoring
     SpectorSoft
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics