Updates: The next evolution of operating systems
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
Posted: 08 Feb 2021 | Published: 16 Jan 2018
|
|
|
SharePoint E-Zine Volume 11: Managing Documents By Content Type
sponsored by TechTarget Search Windows Server
EZINE:
SharePoint has made some parts of content management much easier, but it falls short on document classification. In this month's issue, learn different approaches to categorize documents. The best time to apply security to SharePoint is right from the start. Zero in on access control, application security and content security as part of your...
Posted: 19 Jun 2009 | Published: 19 Jun 2009
|
|
|
A Guide to Utilizing Virtualization in a Disaster Recovery Strategy
sponsored by Dell EMC and Microsoft
EGUIDE:
In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
Posted: 20 Apr 2009 | Published: 20 Apr 2009
|
|
|
Presentation Transcript: Managing Windows with IT Search
sponsored by Splunk
PRESENTATION TRANSCRIPT:
Read this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management.
Posted: 01 Apr 2009 | Published: 01 Apr 2009
|
|
|
The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST:
SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008
|
|
|
Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges
sponsored by Lumension
WHITE PAPER:
Read this white paper to get up-to-date technology alternatives to help better manage your patch management environment.
Posted: 10 Jun 2008 | Published: 01 Jun 2008
|
|
|
Best Practices for Windows Vista Planning, Migration, and Ongoing Management
sponsored by Symantec Corporation
WHITE PAPER:
It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.
Posted: 02 Jul 2007 | Published: 01 Jun 2007
|
|
|
5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk
sponsored by Lumeta Corporation
PODCAST:
Join IT expert David Arbeitel and listen to the Podcast, "5 Steps to a Successful Vista Migration: How Network Assurance Minimizes Business Risk" and discover how to make the most of your Vista migration.
Posted: 27 Apr 2007 | Premiered: Apr 27, 2007, 09:00 EDT (13:00 GMT)
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007
|
|
|
Mail Security for Microsoft Exchange Server
sponsored by Symantec Corporation
PODCAST:
This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
Posted: 19 Feb 2007 | Premiered: Feb 1, 2007
|
|
|
BareTail
sponsored by Bare Metal Software
TRIAL SOFTWARE:
Free real-time log file monitoring tool for Windows.
Posted: 05 Dec 2006 | Premiered: 19 Jun 2007
|
All resources sponsored by Bare Metal Software
|
|
Justifying an Active Directory Disaster Recovery Plan
sponsored by Dell Software
WHITE PAPER:
Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.
Posted: 12 Oct 2006 | Published: 09 Apr 2007
|
|
|
PrimalScript Professional 4.0
sponsored by SAPIEN Technologies, Inc.
TRIAL SOFTWARE:
PrimalScript Professional 4.0 now with a host of advanced features targeted at reducing script development time and effort and introducing PrimalScope, PrimalScript's truly built-in debugger for Windows scripting.
Posted: 01 Oct 2006 | Premiered: 01 Oct 2006
|
All resources sponsored by SAPIEN Technologies, Inc.
|
|
Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE:
ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006
|
|
|
Microsoft Forefront Security for Exchange Server Beta
sponsored by Microsoft
TRIAL SOFTWARE:
Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
Posted: 26 Sep 2006 | Premiered: 26 Sep 2006
|
|
|
Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE:
Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007
|
|
|
GFI LANguard Security Event Log Monitor - Downloads
sponsored by GFI Software
TRIAL SOFTWARE:
GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
Posted: 02 May 2006 | Premiered: 01 May 2006
|
|
|
How to Perform Network-wide Security Event Log Monitoring
sponsored by GFI Software
PRODUCT LITERATURE:
This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LANguard S.E.L.M.
Posted: 02 May 2006 | Published: 01 May 2006
|
|