It Security SMBsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: It Security SMBs returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Security Monitoring
 •   Disaster Recovery
 •   Network Security
 •   Endpoint Security
 •   Virtualization
 •   Security Policies
 •   Storage Security

Related Searches
 •   Impact It
 •   It Intranet
 •   It Scheduling
 •   It Security Costs
 •   It Security SMBs Help
 •   It Security SMBs Organizational
 •   It Vendor
 •   Multi It
 •   Paper It Security
 •   Profile It
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

15 Minutes to a Secure Business: Daily Practices for IT Security Management by McAfee, Inc.

December 02, 2008 - (Free Research)
Read this paper to learn how to enhance security management for small and medium businesses by following a few simple practices. Benefits include: Better overall security posture; spending less time to find and fix outbreaks; more efficient web and email security policies; and a more proactive and comprehensive approach to IT security overall. 
(ARTICLE) READ ABSTRACT |

IT Security. Fighting the Silent Threat by Kaspersky Lab

October 09, 2013 - (Free Research)
Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks. 
(WHITE PAPER) READ ABSTRACT |

SMB Market Landscape Report 2010 by AVG Technologies USA, Inc.

November 09, 2010 - (Free Research)
AVG recently partnered with GfK to undertake an international survey among small and medium businesses (SMB). SMBs are increasingly relying on technology to overcome the challenges of the recession and recognize the importance of protecting this technology from outside threats. Check out this report to see the results of the survey. 
(WHITE PAPER) READ ABSTRACT |

IT Security: Midsize Businesses Face Enterprise-Caliber Threats by Hewlett-Packard Company

May 22, 2014 - (Free Research)
This white paper highlights a solution that delivers a set of comprehensive, purpose-built tools that work effectively to manage and monitor security data for midsize businesses. This allows these midsize companies to leverage fast, effective and holistic data security. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

January 19, 2011 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

June 11, 2010 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

Controlling and Managing Security with Performance Tools by Ipswitch WhatsUp Gold

March 01, 2011 - (Free Research)
This article examines what management tools are needed to provide functionality to your IT security needs with no additional overhead or expenditure. These tools are often already in place to provide performance management and monitoring. 
(WHITE PAPER) READ ABSTRACT |

2010 SMB Information Protection Survey by Symantec by Symantec Corporation

June 23, 2010 - (Free Research)
This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing. 
(WHITE PAPER) READ ABSTRACT |

2009 Annual Study: UK Enterprise Encryption Trends by PGP Corporation

July 25, 2009 - (Free Research)
Read this paper to learn the results of a study that analyzes survey results from 615 UK businesses and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection. 
(ANALYST REPORT) READ ABSTRACT |

Effective print security for SMBs by ComputerWeekly.com

April 02, 2013 - (Free Research)
Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security. 
(ANALYST REPORT) READ ABSTRACT |

10 Hot Skills for 2009 by Global Knowledge

May 01, 2009 - (Free Research)
With spending on cost-saving technologies such as virtualization rising, and the maintenance of networking and enterprise Microsoft software keeping IT professionals constantly in demand, here's our top 10 hot skills that will take us from a down economy and beyond. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Exchange 2010 Roadmap Series - Backup and Recovery by Dell, Inc. and Intel®

December 21, 2009 - (Free Research)
In this presentation transcript, featuring Exchange pro, Lee Benjamin, you'll learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Exchange 2010 Roadmap Series: Backup and Recovery by Dell, Inc. and Intel®

December 09, 2009 - (Free Research)
In this expert mediacast, featuring Exchange pro, Lee Benjamin, learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls. 
(WEBCAST) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

Presentation Transcript: Discover New Revenue Streams - Add Managed Hosting to your Managed Services by Verio

February 02, 2010 - (Free Research)
In this presentation transcript, join Zeus Kerravala, of the Yankee Group, and Janine Soika, a channel marketing leader from Verio, for a quick discussion that will jumpstart your monthly revenue. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Don't Be Left Out of the Cloud: How to Sell Enterprise-Quality Cloud  Services and Data Protection to SMBs by KineticD

August 24, 2010 - (Free Research)
Read this expert transcript to learn why SMBs are adopting cloud services more rapidly than large enterprises and what challenges your clients face in protecting their business critical data in an increasingly mobile world. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Symantec 2010 SMB Information Protection Survey by Symantec Corporation

November 29, 2010 - (Free Research)
Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Symantec 2011 SMB Disaster Preparedness Survey by Symantec Corporation

November 22, 2011 - (Free Research)
This white paper features the results of Symantec's second SMB disaster preparedness survey, and provides recommendations to help your organization establish and maintain a successful disaster recovery strategy. 
(WHITE PAPER) READ ABSTRACT |

Building a Business Case by SearchSecurity.com

December 20, 2012 - (Free Research)
Small to midsize organizations that fail to adopt adequate mobile security measures may soon be out of business. This expert white paper outlines the business case for mobile security among SMBs; also inside, discover the key features your solution needs, and the benefits of a cloud-based approach to mobile security. 
(WHITE PAPER) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 31, 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Symantec SMB Threat Awareness Poll by Symantec Corporation

November 22, 2011 - (Free Research)
Symantec conducted its SMB Threat Awareness Poll in September 2011, asking 1,900 SMBs how familiar they are with threats, and what they are doing to protect themselves. This white paper features the results of this survey, and provides best practices and recommendations to help your organization's data stay secure. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

How much security does your SMB need? by IBM

February 14, 2014 - (Free Research)
This resource is an essential guide for SMBs looking to make the right investments in security to ensure optimum protection. 
(WHITE PAPER) READ ABSTRACT |

How Are DDoS Attacks Evolving? by Neustar®

May 05, 2014 - (Free Research)
This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against. 
(WHITE PAPER) READ ABSTRACT |

Closing the Back Door on Network Application Vulnerabilities by Sophos, Inc.

July 03, 2012 - (Free Research)
This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts