Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives
sponsored by TechTarget Search Windows Server
EZINE:
In this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.
Posted: 16 Apr 2009 | Published: 15 Apr 2009
|
|
|
Great Things Happen on the Road to Disaster Recovery
sponsored by AppAssure Software, Inc.
CASE STUDY:
In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup.
Posted: 14 Apr 2009 | Published: 10 Apr 2009
|
|
|
Presentation Transcript: Learn How to End Email Downtime, Forever!
sponsored by Teneros and HP
PRESENTATION TRANSCRIPT:
Email is the foundation of business communication, so outages can have a dramatic impact on productivity. This webcast transcript showcases a technique to prevent email downtime that's non-invasive, remotely managed 24x7, and eliminates the danger of database corruption.
Posted: 13 Apr 2009 | Published: 13 Apr 2009
|
|
|
e-Guide: Windows Server Disaster Recovery - Planning for the Worst
sponsored by AppAssure Software, Inc.
EDITORIAL RESOURCE GUIDE:
The impact of natural, random and man-made disasters on Windows Server applications, especially email, and their subsequent disruption can cripple an organization. This white paper offers advice for protecting your existing Windows Server infrastructure from disruptive application outages.
Posted: 09 Apr 2009 | Published: 09 Apr 2009
|
|
|
Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
sponsored by Information Security Magazine
EBOOK:
Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 08 Apr 2009 | Published: 01 Feb 2009
|
|
|
Strengthening Enterprise Security through Notebook Encryption
sponsored by Intel Corporation
WHITE PAPER:
Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.
Posted: 02 Apr 2009 | Published: 01 Dec 2008
|
|
|
New Security Solutions Using Intel vPro Technology
sponsored by Intel Corporation
WHITE PAPER:
Intel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.
Posted: 02 Apr 2009 | Published: 02 Apr 2009
|
|
|
Presentation Transcript: Managing Windows with IT Search
sponsored by Splunk
PRESENTATION TRANSCRIPT:
Read this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management.
Posted: 01 Apr 2009 | Published: 01 Apr 2009
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008
|
|
|
Why Use Cisco Network Storage Systems for Your Business
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.
Posted: 25 Mar 2009 | Published: 25 Mar 2009
|
|
|
Cisco Continuous Data Protection for Files
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
Posted: 25 Mar 2009 | Published: 25 Mar 2009
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your Control
sponsored by Sophos UK
WHITE PAPER:
The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Posted: 20 Mar 2009 | Published: 01 Dec 2008
|
|
|
Profiting from PCI Compliance
sponsored by IBM
WHITE PAPER:
This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
Posted: 13 Mar 2009 | Published: 01 Sep 2007
|
|
|
The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER:
Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Posted: 03 Mar 2009 | Published: 07 Apr 2010
|
|
|
IBM Security Event and Log Management Service
sponsored by IBM
SERVICE LISTING:
With Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER:
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
sponsored by IBM
PRESS RELEASE:
Check out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Support PCI Security Compliance with Enhanced Solutions from IBM
sponsored by IBM
WHITE PAPER:
This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses
sponsored by Cisco Systems, Inc.
CASE STUDY:
Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Managing the Entire Database Security & Compliance Lifecycle
sponsored by Guardium, an IBM Company
DATA SHEET:
Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle.
Posted: 12 Feb 2009 | Published: 12 Feb 2010
|
|
|
Presentation Transcript: Data Masking Essentials for SAP Software
sponsored by IBM
PRESENTATION TRANSCRIPT:
In this paper Sandeep S. Desai and Cynthia Babb explain about the IBM and Enterprise data management, how to protect privacy, what's at stake and data privacy in a sap environment.
Posted: 11 Feb 2009 | Published: 11 Feb 2009
|
|
|
Virtualize Servers with Microsoft Hyper-V and NetApp
sponsored by NetApp and Microsoft
WHITE PAPER:
Microsoft's Hyper-V technology provides a full-featured server virtualization environment that is well suited for Windows and non-Windows environments. This article will help you understand Hyper-V with some guidelines for getting started using the technology in NetApp environments.
Posted: 09 Feb 2009 | Published: 09 Feb 2009
|
|
|
Case Study: Transitioning to Server Virtualization with Hyper-V and NetApp
sponsored by NetApp and Microsoft
CASE STUDY:
Learn how one IT team transitioned to server virtualization with Microsoft® Hyper-V™ coupled with NetApp storage to enable a variety of flexible disaster recovery and availability scenarios.
Posted: 06 Feb 2009 | Published: 19 Dec 2008
|
|
|
IT Briefing - Desktop and Application Virtualization: Getting Started
sponsored by Citrix
PRESENTATION TRANSCRIPT:
In this document Barb Goldworm, President, Founder and Chief Analyst of Focus, explains the benefits for desktop and application virtualization.
Posted: 03 Feb 2009 | Published: 30 Jan 2009
|
|
|
New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER:
Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|