D Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
D Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
 

Datacenter Transformation: New Directions for IT from IDC by  Hitachi Data Systems


September 30, 2011 - To meet dynamic business services needs, IT must change the model of its datacenters by incorporating flexible and agile infrastructure and processes that support the cost effective and timely delivery of services. Read this expert Q & A to learn more.

 

Datacenter with energy, temperature and density under control by  Dell, Inc. and Intel®


May 22, 2013 - Check out this white paper to learn about a key case study of an organization that was able to optimize server management and energy consumption by deploying server platforms through innovative embedded capabilities.

 

DatAdvantage: Comprehensive Data Governance by  Varonis


August 31, 2007 - This paper presents the issues IT staff face managing file server contents & user repositories. Moreover, how important data is at risk & how data access management gets costly & ineffective. Find out more about an option that offers co...

 

DataFlux Delivers Improved Data Quality, Address Verification for the Miami Herald Media Company by  DataFlux Corporation


February 28, 2011 - The Miami Herald Media Company used the DataFlux data quality and data integration platform to improve and enhance the data that drives its Database Marketing division.

 

DataFlux Positioned in Leaders Quadrant of the 2010 Magic Quadrant for Data Quality Tools by  DataFlux Corporation


July 29, 2010 - DataFlux was recently positioned by Gartner, Inc. in the Leaders Quadrant of its 2010 “Magic Quadrant for Data Quality Tools” report. Gartner’s Magic Quadrants evaluate vendors within a particular technology market based on their completeness of vision and ability to execute. Use this Magic Quadrant to understand the data quality tools market.

 

DataFlux Version 8: Accelerate to Compliance, Data Governance and MDM by  DataFlux Corporation


March 01, 2008 - Learn how a data integration and data quality provider can help speed your efforts to achieve data governance, master data management (MDM) and compliance.

 

Datalink's White Paper Library by  Datalink Corp


May 06, 2010 - Welcome to Datalink’s White Paper library. Inside you will find valuable data expertise - from an objective perspective. Here, you can find the information about the latest storage trends, relevant data topics, and new strategies to store, manage, and protect your data.

 

DataNAS XP by  Excel Meridian Data, Inc.


The DataNAS XP is designed with performance in mind integrating Pentium Technology, Gigabit connectivity and low cost IDE resources to produce a reliable and economical NAS Filer. The DataNAS XP is scalable from 240GB to 2TB of storage capacity and provides unified file data access for your mixed environment clients without expensive licenses.

 

DataPower SOA Appliance Service Planning, Implementation, and Best Practices by  IBM


June 30, 2011 - This e-book will help you to better understand the effective use of the WebSphere DataPower family of appliances. It provides guidance on the best methods identified to date for building the various components that implement solutions as well as a checklist of items to consider when planning a solution.

 

DataPrivilege: Entitlement Management Where It Belongs - With Business Owners by  Varonis


August 31, 2007 - In most enterprise business environments the IT personnel controls the permission settings on data; however, they are not as familiar with the information as the original data creator. Find out how you can keep data permission control in the right ...

 

Dataquest Insight: Oracle and SAP Approach the Small and Midsize Business Application Market via Different Product and Channel Approaches by  Oracle Corporation


December 18, 2008 - In this report, Gartner analyzes Oracle's and SAP's recent moves with respect to small and midsize business application products and channels and what they mean for company ecosystems.

 

DataShare by  Excel Meridian Data, Inc.


DataShare is a dual-function server that performs both CD/DVD File Sharing tasks as well as NAS File Data Archiving. It is the first CD/DVD server available in the market that combines these unique features in one easy-to-use solution.

 

Datasheet: FalconStor File-interface Deduplication System (FDS) by  FalconStor Software


April 01, 2010 - FalconStor® File-interface Deduplication System (FDS) is the industry’s first high availability NAS deduplication solution offering high performance, Symantec NetBackup OpenStorage (OST) integration, enterprise-level functionality, disk-to-disk (D2D) data protection, integrated replication, and global block-level data deduplication.

 

DataSheet: Rational Quality Manager by  IBM


December 14, 2010 - IBM Rational Quality Manager offers two views on the individual user’s dashboard: A work-item list that shows a tester what work has been assigned to him or her, and a team event log that updates automatically as activities occur/progress. Together these views help ensure that everyone is on the same page.

 

Day in the Life of a Storage Administrator: which scenario best describes your duties? by  APTARE


August 31, 2013 - Check out this white paper to explore a day in the life of a storage administrator with and without a solid backup solution. Find out which scenario best describes your duties.

 

DB2 10 for z/OS: The Smarter Faster Way to Upgrade by  IBM


October 31, 2011 - With support for IBM DB2 for z/OS Version 8 retiring in April 2012, customers will have the option to skip a level and upgrade straight to DB2 10. This e-book is designed to help customers decide whether they are a good candidate to make this leap and provides best practices for planning an effective migration strategy.

 

DB2 10: What's new in DB2 10 for Linux, UNIX, and Windows by  IBM


April 03, 2012 - <p>Organizations are buzzing about the upcoming release of the latest version of IBM's DB2. The added features and functionalities offered in the new platform offer cost-savings, improved application performance and better productivity. Read this white paper to learn more about the exciting enhancements and how they can benefit your enterprise.</p>

 

DB2 9.7: Online schema change-- Minimize planned outages when making changes to your database objects by  IBM


September 01, 2010 - Learn about the new enhancements to DB2 9.7 that enable you to make online changes to the database schema while objects remain fully accessible during modification.

 

DB2 Autonomics Demo by  IBM


March 18, 2011 - DB2 automates many routine database administration tasks like database configuration, storage allocation, and memory management. Self-optimizing features automatically react to changes in workloads to adjust memory and optimize system performance. Watch this flash demo to learn why some are referring to DB2 as smarter database software.

 

DB2 E-Book: Proven strategies for uncovering cost savings with IBM DB2 by  IBM


March 17, 2011 - This informative e-book describes proven strategies for lowering the costs associated with database administration, database development, database systems, and data storage. This e-book also discusses the new breakthrough features that make it easier than ever for you to move to DB2.

 

DB2 for Linux, Unix, and Windows by  IBM


April 27, 2012 - <p>Many organizations are leveraging IBM’s DB2 for its cost and security benefits, as well as its ease of use. This resource introduces its new enhancements that further reduce storage costs and can lead to significant performance improvements. See firsthand what it can offer your organization by downloading this trial.</p>

 

DB2 optimizer makes DB2 the best option for database performance by  IBM


June 27, 2011 - This blog entry explains how database performance impacts the user community and their ability to meet critical deadlines. Explore the current market for database management solutions and find out why DB2 is recommended.

 

DB2 pureScale Demo by  IBM


March 18, 2011 - An overview of DB2 pureScale and its benefits.

 

DB2 SQL Compatbility demo by  IBM


March 31, 2011 - This will demonstrate how the DB2 9.7 SQL Compatibility feature makes it easy to migrate from Oracle to DB2. 

 

DC Hosting, Outsourcing And Colocation Strategies by  Hewlett-Packard Company


February 01, 2013 - This expert e-guide presents selection criteria and opportunities in order to successfully evaluate and leverage data center outsourcing providers to ensure you're getting the highest level of service and benefits from your investment.

 

DCIG Analyst Report: esXpress™ and DXi-Series Make Quantum A One-Stop Shop for VMware ESX Data Protection by  Quantum Corporation


February 25, 2010 - As organizations begin implementing server virtualization, it is critical that they consider the fact that backup and data protection processes will need to be done differently and may become more complicated. This DCIG analyst report discusses methods of effectively protecting data in virtual environments and the different solutions available.

 

DCIG Buyer's Guide: Deduplicating Backup Appliance Under $100K by  ExaGrid Systems, Inc.


September 10, 2013 - This exclusive buyer's guide evaluates midrange deduplicating backup appliances under $100K.

 

DCIG Buyer's Guide: Deduplicating Backup Appliance Under $50K by  ExaGrid Systems, Inc.


September 16, 2013 - This resource presents its 2013 midrange deduplicating backup appliance buyer's guide for systems $50K and below. It puts at the fingertips of organizations a comprehensive list of deduplicating backup solutions and the features they offer in the form of detailed, standardized data sheets that can assist them in the important buying decision.

 

DCIG Disk Backup Report by  ExaGrid Systems, Inc.


September 13, 2013 - This buyer's guide identifies, weighs and scores product features to help organizations select products that deliver on competing requirements. Find out why a series of dedupe appliances is the best set of solutions for midsize enterprises to select from in order to meet next-gen IT infrastructure priorities.

 

DCIG Midrange Unified Storage Array Buyer's Guide by  NetApp


July 09, 2013 - This buyer's guide equips you in two key ways – helping you evaluate midrange unified storage arrays – and providing a set of scores and rankings across the multiple features on each product as well as data sheet for each midrange unified storage array.

 

DCM and analytics: Guidelines for linking the two for maximum impact by  IBM


November 07, 2011 - Many organizations are taking their dynamic case management (DCM) efforts to the next level by applying analytics technology. In this Tip Guide, readers will learn where the combination is likely to work best, where business process management (BPM) fits into the picture, and how to avoid pitfalls and problems in implementation.

 

DCM serves as a useful tool for a business approach to process management by  IBM


November 21, 2011 - Check out this tip guide today to learn how dynamic case management (DCM) serves as a useful tool for a business approach to process management.

 

DDoS Attack Trends Highlight Increasing Sophistication, Larger Size by  F5 Networks


January 29, 2014 - In this expert e-guide, uncover the truth behind distributed denial of service (DDoS) attacks and whether they're the reason behind organizations' bandwidth troubles. Click now to see how DDoS mitigation service providers are responding.

 

DDOS Mitigation a Key Component in Network Security by  Ixia


March 27, 2014 - This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.

 

DDoS Prevention: Time for "Defense in Depth" by  Fortinet, Inc.


April 24, 2014 - This informative guide provides you with key strategies to prevent DDoS attacks and outlines what you can expect in the coming years.

 

De-dupe: It’s not a question of if, rather where and when! ”What to Look for and What to Avoid“ by  Quantum Corporation


September 21, 2010 - This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.

 

De-Duplicated Disk Backup: Addressing Backup Challenges Across the Enterprise by  Quantum Corporation


October 01, 2008 - With the DXi7500, Quantum adds an enterprise-class backup-to-disk target with de-duplication to its arsenal, making it a true provider of scalable, end-to-end de-duplicated secondary storage.

 

De-Mystifying VMware Storage Consumption by  Dell Software


January 16, 2009 - Quest's technical brief discusses how Quest's Storage Horizon® makes storage in VMware environments more efficient and cost effective. Read it today.

 

De-risking IT Lifecycle Management by  ComputerWeekly.com


November 23, 2012 - Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.

 

Dealing with Chaos: 4 Steps to Manufacturing Success by  Infor


September 04, 2008 - Manufacturers must be prepared to recognize impending change as early as possible, assess the potential impact, determine the optimum strategy for dealing with the change, and implement that strategy in the most effective way possible. In this white paper you'll learn 4 steps toward developing chaos-tolerant business processes.

 

Dealing with Governance, Risk & Compliance in an Info-Centric World by  CommVault Systems, Inc.


October 31, 2013 - View this comprehensive report from Quocirca Research on how to manage multiple aspects of governance, risk, and compliance (GRC), and learn why a comprehensive GRC platform -- as opposed to a combination of different tools -- can help you effectively manage your organization's information assets.

 

Dealing with More and More Data: Challenges for the Utility CIO by  IBM


March 31, 2012 - This document provides utilities with an understanding of specific challenges faced by CIOs and provides information technology (IT) decision makers with a view to the use of time series databases in getting to scale.

 

Death and Taxes...and Hackers by  Imperva


April 01, 2011 - View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.

 

Debenhams Significantly Frees Up Staff by Simplifying IT Project Management with CA Clarity PPM by  CA Technologies.


December 03, 2008 - Read this case study to learn how Debenhams' Project Management Office has reduced report creation time by more than 90% using CA Clarity™ Project & Portfolio Manager. The CA solution also helps Debenhams to identify ineffective IT projects earlier on in the lifecycle to save resources and money.

 

Debunking 10 Gigabit Ethernet Myths by  Dell, Inc. and Intel®


December 20, 2011 - 10 Gigabit Ethernet (10GbE) has been around for years, but is still new to many network engineers. Access this E-Guide to read about some of the most common myths surrounding the technology. Also learn the truth about price, requirements, what’s in store for the future, and more.

 

Debunking APT myths: What it really means and what you can do about it by  SearchSecurity.com


July 29, 2011 - This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.

 

Debunking Security Concerns with Hosted Call Centers by  inContact


January 10, 2011 - This paper discusses the different layers requiring security, how security should be addressed in each layer, and how to select a qualified hosted call center provider. Read this white paper to learn more.

 

Debunking the Myth of the Single-Vendor Network by  Dell, Inc.


October 04, 2011 - This white paper discusses key findings derived from research showing that most organizations should consider a dual-vendor or multi-vendor solution as a viable approach to building their network.

 

Debunking the Myth of the Single-Vendor Network by  Juniper Networks, Inc.


December 06, 2010 - Read this analyst report to see why most organizations should consider a dual-vendor or multivendor solution as a viable approach to building their network.  Not only are significant cost savings achievable with no increase in network complexity, but there is also an improvement in focus on meeting business requirements.

 

Debunking the Myths: Cloud HA and DR by  SIOS Technology Corp


April 18, 2014 - Take a look at this resource to uncover 5 DR and HA in cloud deployment myths, so you can reduce the risk of downtime and data loss, and save big bucks.

 

Debunking the Top 5 Misconceptions about Data Protection by  Lumension


May 01, 2008 - Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.

 

Debunking the Top Eight Myths Surrounding Small-Business Warehouse Management Systems (WMS) by  HighJump Software


May 01, 2008 - Learn why companies of all sizes are turning to best-of-breed warehouse management systems (WMS) in an effort to reduce costs and boost productivity in the face of increased globalization, regulation and competition.

 

December Storage Mag 2013 by  SearchStorage.com


December 06, 2013 - In the December 2013 issue of Storage magazine, we make our predictions for 2014 storage trends, reveal the winners of our latest Quality Awards survey for tape libraries and much more!

 

Deciding Where to Deploy Solid-State Storage Devices by  TechTarget


March 18, 2014 - Thinking about jumping on the SSD bandwagon? Participate in our members-only SSD/Flash Technologies Research Program to share your thoughts, and get instant access to two exclusive reports, including our e-handbook on tips for deploying solid-state storage devices!

 

Deciphering the Different Forms of Data Deduplication by  Veeam Software


April 17, 2014 - This paper examines a handful of forms of data deduplication, from inline to chunk-based,  and focuses on the certain technology embedded in Windows Server 2012 R2, plus the benefits it can bring to your environment.

 

Deciphering the truth about Big Data hype and security intelligence by  Hewlett-Packard Limited


April 08, 2014 - In this whitepaper, Randy Franklin Smith of UltimateWindowsSecurity.com discusses the key tenets of the realationship between Big Data and security information and event management.

 

Decision Management Smarter Insurance Processes by  IBM


July 07, 2011 - With varying compliance demands, change is the mainstay of the insurance industry. There are constant alterations to underwriting, rating, claims processing, fraud detection and billing. Read this case study of the Traveler's implementation of a business rules management system to effectively improve all of their processes.

 

Decision Matrix: Selecting an Enterprise Content Management Vendor (Competitor Focus) by  EMC Corporation


May 01, 2008 - Due to demand from enterprises which want to invest in the most appropriate Content Management solution, Datamonitor has developed the ECM Decision Matrix and selection tool.

 

Decision Services: The Next SOA Challenge by  ILOG, an IBM Company


April 01, 2008 - This white paper discusses the issues associated with decision services in an SOA strategy, highlighting how business rule management systems can be used to overcome these challenges.

 

Decreasing Storage Costs in VMware Environments by  Dell, Inc.


November 06, 2012 - In this interview transcript, George Schultz, an independent IT analyst, answers the most common questions about VDI technology. He explores virtualizing servers, consolidating servers, taking complexity out of virtualization, optimizing hardware, backup and protection challenges, and how to do more with your existing software licenses.

 

Dedicated Transportation: Extra Care for Your Critical Data by  Iron Mountain


May 12, 2011 - Watch this brief demo to learn about Iron Mountain's new Dedicated Transportation service, which ensures the safe delivery of your data to its destination.

 

Dedupe for Virtual Setups by  Dell, Inc.


March 20, 2013 - This one-page transcript of a presentation by deduplication expert Howard Marks gives an overview of the pros and cons of different dedupe processes, and delves into the type that Microsoft's Hyper-V 3.0 employs and why.

 

Dedupe Selling Points, Strategies, and Solutions by  SearchStorage.com


June 18, 2013 - This E-Guide provides insight into the new ways that organizations are dealing with data proliferation and the technology advancements that have prompted interest in them.

 

Dedupe Simply – Presentation transcript by  EMC Backup and Recovery Solutions


September 28, 2009 - Please read this presentation transcript in which Brian Biles, VP of Product Management and the Co-founder of Data Domain, discusses data deduplication. And, why is it important? What exactly is it? What are the things that make different implementations different? Learn the questions you should be asking.

 

Dedupe: From Niche Tech to Storage Ace by  NetApp


June 27, 2012 - Everybody talks about dedupe today, but 10 years from now, everybody’s just going to expect it to be in storage devices. This expert E-Guide outlines the benefits of different dedupe methods and offers some insight on how these methods apply to specific environments.

 

Dedupe: Out of the 9 methods, which is best for you? by  Quantum Corporation


February 02, 2012 - This SearchStorage.com E-Guide is here to help you through the deduplication decision-making process. In this paper, you'll receive an overview of various deduplication strategies and explore the pros and cons associated with deduping. You'll also learn where deduplication can benefit your organization most. Read on to learn more.

 

Deduping Explained: Data Deduplication in Backup Storage by  Quantum Corporation


May 24, 2010 - This tutorial will provide you with a high level overview of the basics of deduplication for both primary storage and backup.

 

Deduplication -- Sorting through the Hype by  LEGACY - DO NOT USE - Datalink.


August 01, 2008 - Attend this webcast, led by seasoned Datalink storage experts, to learn exactly what deduplication can do for you-what's real and what's hype.

 

Deduplication and VMware Backup Sprawl by  Veeam Software


August 16, 2010 - The purpose of this white paper is to demonstrate that by using the deduplication and compression engine within the Veeam Backup and Replication product, it is possible to make a positive impact in the storage environment of any organisation.

 

Deduplication Backup Basics for Small Businesses by  Symantec Corporation


December 01, 2011 - Data deduplication is one of the hottest and must-have technologies in the storage world today. For companies that haven't yet implemented dedupe into their backup systems, the interest is growing. Read this expert E-Guide to learn the dedupe backup basics for small businesses.

 

Deduplication in Data Protection: Assessing the Benefits by  Overland Storage


February 14, 2008 - Data deduplication offers the potential for taming the growth of data and delivering increased management efficiency. This white paper by IDC offers a balanced assessment of the benefits and potential disadvantages of deduplication solutions.

 

Deduplication School 2010 Presentation Download by  EMC Backup and Recovery Solutions


April 05, 2010 - This presentation download will explain how to leverage data deduplication technology to benefit your organization.

 

Deduplication: Advantages & Disadvantages by  HP and Intel


June 21, 2011 - This E-Guide from SearchStorage.com is designed to help you determine what you’re trying to solve with deduplication technology. It then outlines the advantages and disadvantages of dedupe backup, dedupe misconceptions, and how dedupe and compression on primary storage can reduce your data footprint.

 

Deduplication: Effectively Reducing the Cost of Backup and Storage by  AppAssure Software, Inc.


August 18, 2009 - Organizations have to backup and store data. Compliance requirements demand that data be stored for periods of time. Reducing the cost of backup and storage starts with reducing the amount of data that is backed up and stored. Learn how deduplication, along with server-based backup processes can reduce your storage management costs.

 

Deduplication: Trends, Predictions, and Usage Best Practices by  EMC Corporation


June 30, 2012 - Through deduplication delivered from Data Domain appliances and an entire ecosystem of backup technologies, EMC is improving efficiency, enabling customers to spend less time and money on backup and recovery. EMC continues to invest in the extensibility of its Data Domain platform and DD Boost software.

 

Deep Defender Blogs by  Intel


October 03, 2012 - Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.

 

Deep Defender Demo Video by  Intel


October 03, 2012 - Cyber criminials have begun to design malware that can infiltrate security. View this informative webcast to learn more about what you can do to eliminate vulnerabilities and prepare for potential attacks. Stay ahead of criminals by viewing this resource now

 

Deep Dive Into Solid State Storage Technology by  Storage Decisions


June 01, 2009 - This presentation is an in-depth look at the architectures and technologies of solid state storage devices. The presentation will describe solid state in detail, and compare solid state with traditional magnetic media.

 

Deep Security 7.5 by  Trend Micro, Inc.


September 15, 2010 - Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.

 

Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers by  Trend Micro


December 18, 2013 - In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption.

 

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS) by  Trend Micro


December 16, 2013 - Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.

 

Deepening Customer Experience: Analyzing, Optimizing, and Integrating CEM by  OpenText


September 17, 2013 - In this E-Guide, learn how to plan and allocate resources for CEM, compare the latest types of customer experience analytics applications, and find out how companies can use CEM technology to craft a single view of the customer.

 

Defeating Advanced Persistent Threat Malware by  Infoblox


January 31, 2013 - How can you protect your organization from APT Malware?  Read this whitepaper to learn why a DNS Firewall implementation is a MUST for your organization and how the Infoblox DNS Firewall may be the industry's first true DNS security solution.

 

Defend Against Injection-based Attacks by  Klocwork


December 27, 2013 - This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.

 

Defender 5 by  Dell Software


Defender offers the essential security you need to conduct your e-business with confidence, safe in the knowledge that your critical digital assets, customers and employees are protected by reliable, future-proof software.

 

Defender 5: The Right Way to Prove, Identify and Establish Trust by  Dell Software


February 11, 2011 - The Quest Software technical brief -- “The Right Way to Prove Identity and Establish Trust” -- explains how to verify an employee’s identity at log in. You'll also learn how Quest Defender gives your organization more control than ever over who has access to systems, applications and data - going well beyond a simple log-in name and password.

 

Defender 5: The Right Way to Prove, Identify and Establish Trust by  Dell Software


November 03, 2010 - Are you certain each person accessing your network resources is who they say they are? In this Quest technical brief, learn how Defender 5 gives you more control over who has access to resources, applications and data – well beyond a simple login name and password. Defender 5.

 

Defending Against APTs: Do You Have the Complete Picture? by  Hexis Cyber Solutions Inc


July 17, 2013 - Uncover the ins and outs of APTs and learn why current defenses lack the ability to protect your organization. In addition, learn about a pioneering security management approach that provides the features you need to combat these troublesome threats.

 

Defending Against Denial of Service Attacks by  F5 Networks


October 31, 2012 - Access this white paper for key information about how denial of service (DoS) attacks have taken advantage of the lack of security and compliance measures around network availability. Read on to learn how you can leverage networks and applications to defend against these threats.

 

Defending Against Insider Threats in the “Snowden Era” by  CA Technologies.


December 31, 2013 - Security breaches are a significant threat for organizations in the age of big data: broken privacy laws, reputational damage, and loss of classified information are very real possibilities. What's worse is one of the most commonplace and damaging causes of security breaches can come from the inside of your business.

 

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks by  IBM


January 31, 2014 - This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.

 

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks by  IBM


January 31, 2014 - This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.

 

Defending Systems on a Wide-open Network with Symantec Endpoint Protection by  Symantec Corporation


July 02, 2012 - Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.

 

Defense Against the Dark Arts: Finding and Stopping Advanced Threats by  Proofpoint, Inc.


October 29, 2013 - Learn critical information about today’s advanced threat landscape and what you need to do to stay secure.

 

Defense in Depth: Improve Your Threat and Vulnerability Management Programs by  Tenable Network Security


October 07, 2013 - SearchSecurity.com experts, Diana Kelley and Matthew Pascucci bring to you in this e-guide, five simple tips to improve your enterprise's threat and vulnerability programs and layered security, explaining how to apply defense-in-depth principles toward ultra-redundant networks.

 

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by  KnowledgeStorm Webinars


September 27, 2005 - The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying.

 

Defining and Enforcing a Clear Mobile Device Security Policy by  SearchSecurity.com


February 18, 2013 - If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more.

 

Defining and maximizing the Scope of a Document Management System by  Iron Mountain


March 26, 2013 - Read this expert resource to explore more about the key issues of establishing an effective approach to information governance. It explains how you can develop a content management program that fits in with the scope and needs of your organization.

 

Defining Identity Management by  Hitachi ID Systems, Inc.


June 02, 2010 - This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.

 

Defining the Business Change Agenda by  ComputerWeekly.com


May 14, 2013 - Is business transformation really the key to success ? This research from analyst group Freeform Dynamics offers some answers.

 

Defining Today's Enterprise Class by  IBM


March 14, 2013 - Access this expert podcast to discover what an enterprise class system is how enterprise systems technologies are evolving to deliver availability, compliance, energy savings and improved user experience to organizations of all sizes.

 

Defining VDI users: Who should really be using virtual desktops? by  VMware, Inc.


April 25, 2013 - This expert guide from SearchVirtualDesktop.com helps you define the types of desktop users in your organization and determine who would get the most value from using virtual desktops.

 

Defining Your Corporate Mobile Policies by  SearchSecurity.com


September 18, 2008 - It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization

 

Definitive Guide to Exchange Server 2010 Migration Chapter 5: Exchange 2010: Keeping up Appearances by  Mimecast


January 31, 2012 - Keeping Exchange Server 2010 running at full torque requires diligent management and administration. This e-guide examines some of the most common performance issues and explains how to mitigate them. Exchange MVP Andy Grogan also details best practices you should follow to prevent any performance setbacks.

 

Definitive Guide to Exchange Server 2010 Migration: Chapter 1: Under the Hood of Exchange Server 2010 by  Dell, Inc. and Intel®


May 20, 2011 - Migrating to Exchange Server 2010 from the 2007 edition is becoming a must, as the 2010 edition offers improved email archiving, high-availability, and optimal storage features. But as you begin to explore the possibilities of upgrading to Exchange 2010, do you have a proper plan in place?

 

Definitive Guide to Exchange Server 2010 Migration: Chapter 1: Under the Hood of Exchange Server 2010 by  SearchDataCenter.com


May 20, 2011 - Migrating to Exchange Server 2010 from the 2007 edition is becoming a must, as the 2010 edition offers improved email archiving, high-availability, and optimal storage features. But as you begin to explore the possibilities of upgrading to Exchange 2010, do you have a proper plan in place?

 

Definitive Guide to Exchange Server 2010 Migration: Chapter 3: Exchange 2003 to Exchange 2010: Making the Transition by  Dell, Inc. and Intel®


August 16, 2011 - In this chapter, our Exchange Server expert explains the prerequisites and imperative steps to help you smoothly transition to Exchange 2010.

 

Definitive Guide to Next Generation Network Access Control by  ForeScout Technologies, Inc.


April 28, 2014 - This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance.

 

Definitive Guide to Next Generation Threat Protection eBook by  FireEye


December 31, 2013 - In today's evolving threat landscape, businesses of various sectors and sizes have fallen victim to sophisticated cyber-attacks. This in-depth eBook explores the next generation of threat protection and delves deep into various topics, such as advanced persistent threats.

 

Deliver a Superior Cross-Channel Commerce Experience by  Oracle Corporation


March 01, 2012 - With the right intelligence and personal information, there are plenty of new opportunities for you to provide superior experience and maximize the opportunity of every customer touch point. This paper shares actionable strategies needed to deliver personalized and relevant content, based on a variety of factors.

 

Deliver Application Integration Projects in Days by  Cast Iron Systems


February 23, 2009 - This white paper details the Cast Iron Integration Solution, which dramatically simplifies application integration today. As a purpose-built solution designed exclusively for application integration, it eliminates complexity from an integration problem and enables companies to implement projects in days, rather than weeks or months.

 

Deliver Application-level Security at Data Center Performance Levels by  Check Point Software Technologies Ltd.


September 08, 2008 - The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security.

 

Deliver Better Results Across the Data Management Lifecycle: HP AppSystem for Microsoft SQL Server 2012 Parallel Data Warehouse by  HP


October 18, 2013 - The following whitepaper outlines the important steps to consider when implementing a diversified data management strategy.

 

Deliver Business Insight Faster: The IBM Smart Analytics System on IBM System x Servers Running Intel Xeon Processors by  IBM and Intel


December 23, 2010 - This paper explains how The IBM® Smart Analytics System family combines hardware, software and services into systems that are integrated and optimized, can be installed in days instead of months, and can be quickly scaled out to support changing business needs. Read on to learn how to deliver business insights faster.

 

Deliver Cost-Effective, Quality Care by Outsourcing Transcription by  Nuance


December 31, 2012 - Learn about a full-service, outsourced transcription option for healthcare enterprises that combines speech recognition with transcription services, enabling you to produce and deliver cost-effective, timely, and high-quality clinical documentation.

 

Deliver Dynamic Business Continuity for the Enterprise with Dell Compellent Live Volume by  Dell Compellent


October 17, 2011 - Access this white paper to learn about an innovative platform that can help your business minimize downtime, balance workloads, and easily shift resources across the cloud.

 

Deliver Dynamic Business Continuity for the Enterprise with Dell Compellent Live Volume by  Dell, Inc.


November 13, 2011 - This whitepaper provides solutions to help avoid downtime from planned outages, balance workloads on demand, and easily shift resources across the cloud.

 

Deliver Effective Governance for Identity and Access Management by  IBM


June 11, 2009 - Organizations should consider a thorough approach to IAM governance that meets the requirements of discovering, documenting and analyzing user access; establishing a process for user access governance; ensuring that constraints help manage business conflict; enforcing policies; and continuous monitoring.

 

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler by  Citrix


April 30, 2013 - Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.

 

Deliver Extraordinary Customer Experience by  Oracle Corporation


February 01, 2010 - Organizations need to differentiate themselves by providing personalized and rewarding service that leverages the unique value of all customer touch points. If done well, a company can transform customer service into a competitive advantage, and use it to turn a buyer into a customer for life. Read on to learn more.

 

Deliver Fabric-Based Infrastructure for Virtualization and Cloud Computing by  Cisco Systems, Inc.


October 18, 2012 - This resource details a unified data center platform that integrates computing, networking, management and storage in a fabric-based infrastructure to improve IT efficiency and business agility. Discover how this infrastructure solution can help you leverage cloud technology in your data center.

 

Deliver Robust Products at Reduced Cost by Linking Model-Driven Software Testing to Quality Management by  IBM


September 01, 2009 - Your customers expect the highest quality in the products you deliver. Discover how a comprehensive, integrated, automated requirements centric model and code based test environment managed with an extensible quality management system can increase market acceptance, ensure customer loyalty and deliver superior outcomes.

 

Deliver Secure, New Business Services and Improve the Customer Experience by  CA Technologies.


December 12, 2013 - Organizations today are looking for faster delivery of content to users, but with that goal comes great security risk. This guide breaks down the struggle between security and business growth, as well as what you can do to protect your – and your customers' – vital information.

 

Deliver the Web Access Your Users Want With the Control You Need by  BlueCoat


November 04, 2011 - URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.

 

Deliver the Web Access Your Users Want With the Control You Need by  DataDirect Networks


November 04, 2011 - URL filtering is the linchpin of effective web access control, although URL-filtering databases are now largely commoditized. Blue Coat WebFilter, with its cloud-connected architecture and inputs from a worldwide community of users, is best-in-class for web threat protection.

 

Deliver Trusted Data and Deeper Insights by  SAP America, Inc.


September 13, 2012 - The health of your business depends on your data management strategy. Read this paper to learn about one platform designed to manage your increasing volumes of data and applications, as well as quickly provide critical analytics. Benefits include integration of structured and unstructured data, reduced cost, scalability and more.

 

Deliver Virtual Apps and Desktops as Mobile Services by  Citrix


October 24, 2013 - This video details a solution to BYOD that will give users the personalized experience they crave while keeping your data secure.

 

Deliver What Every CEO Wants with Cloud Collaboration by  Cisco Systems, Inc.


February 05, 2014 - Take a look at this informative webcast to discover how cloud technologies can transform and expand your organization.

 

Deliver Your Customers the Right Answer at the Right Time by  Oracle Corporation


August 02, 2013 - Watch this brief video to learn how you can provide consistent and relevant answers fast on channels from self-service website queries to social media- increasing customer loyalty and reducing costs in the process.

 

Delivering "Competitive-Advantage-Critical' Data Services by  IBM


December 31, 2012 - Transactional systems have become more important than ever, and the ability to scale is at the heart of a transactional system's value. This resource examines why transactional scalability is a must in the age of big data, and introduces a system that delivers the capabilities you need to drive success.

 

Delivering a Competitive Advantage by  IBM


November 07, 2011 - Read this expert e-guide to learn how to leverage application lifecycle management (ALM) to facilitate faster time-to-market, manage risk in software development, meet the demand for quality and predictability in software that drives your business, and address the challenge of dynamic and globally distributed customers.

 

Delivering a seamless experience across every channel by  IBM


May 31, 2013 - This white paper reveals the results of a survey of over 500 e-commerce and e-business professionals, and provides key insights and best practices for improving customer experiences across all channels.

 

Delivering a Superior Customer Experience by  Avaya


April 30, 2012 - Research shows that 90% of customer service decision-makers believe delivering quality service is paramount to success. But with tight budgets, businesses today need cost-effective ways of achieving higher service levels. Read on to learn how collaboration in your contact center can keep costs low while increasing service levels.

 

Delivering an Integrated Infrastructure for the Cloud by  HP & Intel®


May 31, 2012 - Read this white paper to learn how your organization can move beyond the traditional product-centric approach to a service-centric private/hybrid cloud model that can significantly simplify your IT infrastructure, reducing operating costs and management burden, as well as improving your ability to respond to evolving organizational demands.

 

Delivering an Integrated Infrastructure for the Cloud by  HP & Intel®


July 31, 2013 - This IDC report outlines the drivers and limitations of the modern IT landscape. Read on to realize the new opportunities and challenges the cloud is creating and gain advice to help you better understand the infrastructure implications of this emerging technology.

 

Delivering applications anywhere, anytime with maximum security and control over data by  Citrix


November 16, 2010 - Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp

 

Delivering Better Care with Embedded Analytics by  IBM


March 31, 2014 - Access this e-guide from SearchHealthIT.com for expert insight on how including analytics at the point of care can help care across your health care organization (HCO). Click through to learn why analytics backup is also a must.

 

Delivering Breakthrough Performance with 802.11ac by  Ixia


March 06, 2014 - Gain an understanding of how 802.11ac can help provide higher performance by boosting bandwidth, and dive into the technical challenges associated with this new technology.

 

Delivering Business Intelligence with Open Source Software by  Ingres


March 01, 2008 - The high cost and complexity of the business intelligence technical infrastructure has inhibited adoption for many companies. This paper considers how fully functional, usable and industrial strength Open Source solutions have made BI more accessible.

 

Delivering Competitive Advantage through IT by  Intel


June 13, 2011 - Successful IT organizations must be able to respond rapidly along with varying business units to ensure maximum return on every invested dollar. Access this exclusive resource to learn the best practices for increasing IT's value proposition.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts