Case Study On Security Basics For Small BusinessWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Case Study On Security Basics For Small Business returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Data Center Management
 •   Network Security
 •   Virtualization
 •   Wireless Technologies and Mobile Computing
 •   Business Intelligence Solutions
 •   Storage Management
 •   Storage Security
 •   Mobile Device Management
 •   Endpoint Security

Related Searches
 •   Calendar Case Study
 •   Case Services
 •   Case Study Definition
 •   Case Study North Carolina
 •   Case Study On Control
 •   Case Study On List
 •   Case Study On Open
 •   Case Study On Testing
 •   Package Case Study
 •   Schedule Case Study
Advertisement

ALL RESULTS
1 - 25 of 444 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Global lessons in eHealth implementation by ComputerWeekly.com

April 02, 2012 - (Free Research)
This report from KPMG, packed with case studies, looks at the drivers for innovation in e-health. 
(JOURNAL ARTICLE) READ ABSTRACT |

Deduplication Backup Basics for Small Businesses by Symantec Corporation

December 01, 2011 - (Free Research)
Data deduplication is one of the hottest and must-have technologies in the storage world today. For companies that haven't yet implemented dedupe into their backup systems, the interest is growing. Read this expert E-Guide to learn the dedupe backup basics for small businesses. 
(EGUIDE) READ ABSTRACT |

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses by Cisco Systems, Inc.

February 13, 2009 - (Free Research)
Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software. 
(CASE STUDY) READ ABSTRACT |

Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions by Sunbelt Software

August 18, 2009 - (Free Research)
In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Small Business VoIP: The Basics by Cisco Systems, Inc.

September 2008 - (Free Research)
Small business VoIP combines voice and data together on a single, secure network allowing your employees to stay connected with the people and data they need. The following is a guide to why you might want to consider a small business VoIP system. 
(WHITE PAPER) READ ABSTRACT |

ArcSight Case Study: Experian by ArcSight, an HP Company

May 2010 - (Free Research)
Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study. 
(CASE STUDY) READ ABSTRACT |

Treehouse in the Glen: Green Toy Store Grows with Symantec Endpoint Protection by Symantec Corporation

July 2012 - (Free Research)
The owner of Treehouse in the Glen had found himself spread too thin trying to manage his toy business and the mix of security products they had implemented. In this case study, uncover how he was able to reduce the time spent on managing information security, defend against virus outbreaks and enable faster system performance. 
(CASE STUDY) READ ABSTRACT |

Channel Success Stories: The SMB Market Case Study: KIS by Dell PartnerDirect and Intel

December 2008 - (Free Research)
This Channel Success Story will give you insight into how KIS is addressing Data Consolidation and Management; Green IT; Virtualization; Security; Unified Communications and "earning its stripes" in the SMB market. 
(PODCAST) READ ABSTRACT |

Small Business Networking: The Basics by Cisco Systems, Inc.

February 2009 - (Free Research)
Small business networking begins with a secure, reliable, fast data network foundation. This paper fleshes out 7 ways small business networking can transform your company. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 6 November 2012: The business benefits of 4G by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now. 
(EZINE) READ ABSTRACT |

IT in the UK SMB (Small and Medium sized Business) Sector by ComputerWeekly.com

January 2012 - (Free Research)
This report from Knowledge Peers and Pierre Audoin Consultants (PAC), reveals what leaders of Small and Medium-Sized Businesses (SMBs) think of IT – its strategic value, its potential, and the changing way in which it is being used in their organisations. 
(IT BRIEFING) READ ABSTRACT |

Case Study: WebEx - Securing Web Collaboration by Qualys

May 2010 - (Free Research)
Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly – 5 March 2013: Planning for a 4G future by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, now the 4G spectrum auction is over, we look at what happens next for the future of mobile networking. Cloud computing promises to save costs – we examine how to ensure a return on investment. And we report from the RSA conference on how big data is helping tackle cyber security threats. Read the issue now. 
(EZINE) READ ABSTRACT |

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection by Trend Micro, Inc.

August 2010 - (Free Research)
Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.   
(WHITE PAPER) READ ABSTRACT |

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

Case Study: Connecting Consultants and Customers Securely at Arthur D. Little by GlobalScape

May 2014 - (Free Research)
This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Understanding the business case for in-memory technology by Hewlett-Packard Company

April 2013 - (Free Research)
In-memory analytics technology is impressive, but is it really necessary right now for small to midsize businesses (SMBs)? Would an investment provide a true competitive advantage? And what are some ways it be leveraged? Read this e-guide to find expert insight on these questions and get the inside scoop on the rise of in-memory technology. 
(EGUIDE) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers? by Guardium, an IBM Company

March 2010 - (Free Research)
This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Combating Spam: Building a Business Case for Anti-Spam Technology by KnowledgeStorm Webinars (E-mail this company)

September 2004 - (Free Research)
The following KnowledgeStorm Webinar focuses on Enterprise Spam filtering and how to combat spam. Featuring expert commentary from Nucleus Research analyst Shruti Yadav, the Webinar offers advice to organizations grappling with the growing problem of spam. Duration- 60 minutes. 
(WEBCAST) READ ABSTRACT |

Boston Medical Center cuts data center power bill by 50% and saves up to $3.2 million with virtualized storage, server and desktop solutions by Dell, Inc.

June 2010 - (Free Research)
Read this case study to gain more detail into Boston Medical center's quest to lower its operational costs, why it settled on data center virtualization and the benefits it reaped, including $3.2 million in savings in equipment avoidance costs, improved security with desktop virtualization and so much more. 
(CASE STUDY) READ ABSTRACT |

Case Study: Level 3 Communications - Going Agile at Scale by Rally Software

June 2013 - (Free Research)
You might think agile development is only for small organizations - but that isn't necessarily true. In this case study, discover how Level 3 was able to overcome the difficulties of a segmented office space and multiple development projects to successfully implement Agile throughout the entire organization. 
(CASE STUDY) READ ABSTRACT |

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions by Symantec Corporation

August 2010 - (Free Research)
This paper discusses common security shortfalls found through a survey of U.S. small businesses, and provides five important tips for a security-aware business. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 444 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts