Collaboration without Boundaries
sponsored by Red Hat and JBoss
PRODUCT OVERVIEW:
IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness. It is much more than a Microsoft Exchange/desktop alternative.
Posted: 20 Apr 2008 | Published: 01 Apr 2008
|
|
|
Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE:
With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008
|
|
|
Collaboration Without Boundaries: IBM Lotus Domino 8 and Open Collaboration Client Solution Powered by Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER:
The cost of downtime can be enormous, even catastrophic. IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and
effectiveness.
Posted: 18 May 2009 | Published: 15 May 2009
|
|
|
Special Reports on Modernizing Messaging Infrastructure
sponsored by Sendmail, Inc.
NEWSLETTER:
In this research note, Gartner outlines the top indicators of a potential IT train wreck in regards to messaging solutions.
Posted: 07 Nov 2008 | Published: 07 Nov 2008
|
|
|
Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER:
The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005
|
|
|
e-Book: Chapter 5 - Understanding the Data Collection Process
sponsored by Symantec Corporation
WHITE PAPER:
Improper data collection can jeopardize the admissibility or reliability of data and can result in substantial costs and potential sanctions. After reading this whitepaper you will fully understand the proper data collection process.
Posted: 06 Aug 2008 | Published: 01 Aug 2008
|
|
|
The Impact of Messaging and Web Threats
sponsored by Trend Micro, Inc.
WHITE PAPER:
This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
Posted: 09 May 2008 | Published: 01 Apr 2008
|
|
|
Email Recovery: Doing More with Less- How to save Time and Money When Recovering Email
sponsored by Kroll Ontrack, Inc.
WHITE PAPER:
This paper shows how the costs associated with recovering email messages from Microsoft® Exchange Server backups can be significant and also provides us with the practical information on how to minimize those costs.
Posted: 10 Feb 2009 | Published: 10 Feb 2009
|
|
|
Getting Started With E-mail Archiving for Exchange
sponsored by Sherpa Software
WHITE PAPER:
This document discusses the reasons e-mail archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company.
Posted: 19 May 2009 | Published: 01 May 2008
|
|
|
Exchange Insider E-Zine - Volume 2: Best and Worst Practices for Email Archiving
sponsored by TechTarget Search Windows Server
EZINE:
Meeting regulatory requirements means that administrators must carve out a sound email-archiving policy; making the wrong move can be costly. In this issue, you'll learn what to do and what not to do when planning your email-archiving strategy.
Posted: 14 Jul 2009 | Published: 14 Jul 2009
|
|