Virus ReservationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Virus Reservation returned the following results.
RSS What is RSS?
Related Categories

 •   Anti-Virus Solutions
 •   Network Security
 •   Anti-Spyware
 •   Security Monitoring
 •   Data Security
 •   Endpoint Security
 •   Application Security
 •   Intrusion Prevention Solutions
 •   Enterprise Data Protection and Privacy
 •   Anti-Spam

Related Searches
 •   Capacities Virus
 •   Files Virus
 •   Unix Virus
 •   Virus Documentation
 •   Virus India
 •   Virus Measures
 •   Virus Reservation Computing
 •   Virus Reservation White Paper
 •   Web-Based Virus Reservation
 •   Webcast Virus
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Hilton Reservations Worldwide by Aspect

March 2008 - (Free Research)
Since implementing the workforce management capabilities, HRW has seen data accuracy go from within ten percent of actual to within three percent of actual due to Aspect eWorkforce Management. 
(CASE STUDY) READ ABSTRACT |

The Age of Electronic Ticketing by Hexaware Technologies

May 2008 - (Free Research)
Electronic ticketing or e-ticketing is a recent development in the transport industry designed to eliminate the need for paper based ticketing and to facilitate the check-in procedures at airports and train stations. 
(WHITE PAPER) READ ABSTRACT |

The business benefits of switching to mobile TV by ComputerWeekly.com

November 2010 - (Free Research)
Over the past two years, the mobile TV landscape has changed dramatically. 
(WHITE PAPER) READ ABSTRACT |

Europe's Largest Regional Airline Protects Reservations System and Company Data with Veeam by Veeam Software

December 2013 - (Free Research)
Check out this resource to find out how a leading vendor's backup solution helped Europe's largest regional airline eliminate downtime. 
(WHITE PAPER) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

The Top Five Myths of IP Communications by Cisco Systems, Inc.

February 2008 - (Free Research)
This white paper addresses the top concerns of IT professionals who resist the deployment of pervasive, enterprise-wide wireless networks. It identifies these reservations based on the experience of Cisco Systems and Intel. 
(WHITE PAPER) READ ABSTRACT |

Virtualize Enterprise Applications with Less Peril, More Payoff by SearchServerVirtualization

January 2014 - (Free Research)
Before you virtualize the applications that keep your business running, learn how to avoid performance and availability issues. 
(EGUIDE) READ ABSTRACT |

Virtualizing Business-Critical Applications on vSphere by VMware, Inc.

October 2012 - (Free Research)
This in-depth whitepaper explains the benefits of virtualization for business-critical applications in your VMware environment as well as addresses the potential hurdles in the process. Uncover details about virtualizing Exchange, Oracle, SQL, SAP and more. 
(WHITE PAPER) READ ABSTRACT |

The Truth About Mobile Business Intelligence by Information Builders

August 2012 - (Free Research)
Mobile business intelligence (BI) is not a new concept, but the rumors that it's too complex, cumbersome, expensive, and limited have prevented most organizations from making the investment. Access this exclusive paper to uncover the 5 most common mobile BI myths debunked and how mobile BI can help you gain a competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

The 10 Best Practices for Performance Management by Gomez

August 2009 - (Free Research)
Read this paper to learn the 10 best practices in performance management and how to apply them to your company and your online store to increase the overall customer experience, which is important now more than ever. 
(WHITE PAPER) READ ABSTRACT |

5 Myths about Leading Virtual Teams by Citrix Online Go To Meeting

February 2014 - (Free Research)
Consult the following white paper to learn about the 5 most common myths that negatively affect the performance and usefulness of a virtual team. Also uncover what managers and leaders can do to overcome these issues, ultimately giving rise to the collaborative ability needed in today's market. 
(WHITE PAPER) READ ABSTRACT |

Extra Space Storage Dials Up Sales with inContact & Salesforce CRM by inContact

October 2010 - (Free Research)
This paper describes the benefits Extra Space Storage experienced by combining inContact’s on-demand platform and integrated with customer CRM software from salesforce.com. Read on to learn more about these benefits and learn how your company can experience the same results. 
(CASE STUDY) READ ABSTRACT |

Sophos Virus Removal Tool: Free virus detection and removal by Sophos, Inc.

May 2013 - (Free Research)
Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily. 
(TRIAL SOFTWARE) READ ABSTRACT |

VIPRE Takes A Bite Out Of Bloatware by Sunbelt Software

July 2009 - (Free Research)
Sunbelt Software's new VIPRE Enterprise package is ideally suited to combating legacy and new blended malware threats from traditional viruses to the newest spam and Trojans. 
(WHITE PAPER) READ ABSTRACT |

The Extraordinary Failure of Anti-Virus Technology by Lumension

February 2008 - (Free Research)
Anti-virus technology fails to prevent computers from virus infections. And because it fails, it inadvertently assists many security woes that plague the computer population. 
(WHITE PAPER) READ ABSTRACT |

Heuristic Analysis- Detecting Unknown Viruses by ESET

February 2010 - (Free Research)
The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis. 
(WHITE PAPER) READ ABSTRACT |

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses by Cisco Systems, Inc.

February 2009 - (Free Research)
Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software. 
(CASE STUDY) READ ABSTRACT |

Think Your Anti-Virus Software Is Working? Think Again by Lumension

March 2011 - (Free Research)
Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection. 
(WHITE PAPER) READ ABSTRACT |

Messaging Security: Understanding the Threat of eMail and IM Attacks by Symantec Corporation

November 2006 - (Free Research)
Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products. 
(PODCAST) READ ABSTRACT |

Think Your Anti-Virus Software Is Working? Think Again by Lumension

April 2011 - (Free Research)
This paper examines how anti-virus software hasn’t been keeping up. Studies show that even though most organizations use anti-virus software, more and more are succumbing to attacks. Lumension Intelligent Whitelisting integrates the most effective third party security tools and techniques. The result is more effective endpoint security. 
(WHITE PAPER) READ ABSTRACT |

Why One Virus Engine Is Not Enough by GFI Software

March 2008 - (Free Research)
This white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against the New Wave of Malware by GFI Software

March 2011 - (Free Research)
Managing threats to the endpoint infrastructure is becoming increasingly difficult for most organizations. At the same time, many anti-malware defenses are not keeping up with the growing threats posed by malware. This white paper addresses the variety of issues facing organizations today in the context of their system manaagement challenges. 
(WHITE PAPER) READ ABSTRACT |

Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition by AVG Technologies USA, Inc.

March 2010 - (Free Research)
The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs. 
(CASE STUDY) READ ABSTRACT |

Trend Micro Deep Security 7.5 vs. McAfee and Symantec by Trend Micro, Inc.

February 2011 - (Free Research)
Server and desktop virtualization are essential elements of any IT strategy that seeks to decrease capital and operational expenditures. In the rush to implement virtualization technologies, many organizations simply deploy the same anti-virus solution that is in use on their physical server and desktop systems. 
(TEST RESULTS) READ ABSTRACT |

Proofpoint Messaging Security Gateway Virtual Edition by Proofpoint, Inc.

November 2006 - (Free Research)
VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products. 
(TRIAL SOFTWARE) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts