November 16, 2011 - This white paper provides an introduction to LTFS (Linear Tape File System) - you'll learn exactly how it works, and what unique advantages it has over traditional tape systems. You'll also receive key tips on how to maximize the benefits of LTFS, and learn what factors today are defining the future of tape. Read this white paper to learn more.
May 14, 2010 - Read this FAQ featuring W. Curtis Preston, which outlines how Linear Tape-Open (LTO) tape differs from other tape media, the various generations of LTO and the pros and cons of this backup technology. Also learn about the newest model, LTO-5, being released this year.
June 01, 2011 - Download this case study to discover how a company transitioned to a service-oriented organization in a timely and cost-effective manner by implementing HP education, software tools and ITSM services.
February 22, 2008 - In this case study, Mountain Lumber Company streamlined their customer and employee communications with a Cisco Unified Communications system. They have also eliminated the need for a separate intercom system. Read this study to learn more.
September 13, 2010 - A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
September 01, 2008 - Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
September 13, 2010 - The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
September 14, 2012 - This white paper provides a practical guide to assist you with the deployment of a device control module as part of your endpoint security management. Learn how you can prevent malware, ensure data protection and more.
January 12, 2012 - This white paper explores a centralized, comprehensive approach to application patching, allowing security pros to automatically detect risks, deploy patches and protect business information across a complex, highly distributed physical and virtual environment.
January 01, 2008 - Protecting networks from malware can seem like an insurmountable challenge. In this 30-day free trial download, see how Lumension's Sanctuary Device and Application Control enable only authorized applications to run and only authorized devices to connect to a laptop or desktop, removing the risk of data leakage and malware.
February 13, 2009 - Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints.
November 01, 2008 - Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting.
March 11, 2009 - This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.
January 21, 2010 - Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.
April 29, 2013 - In this white paper, discover a parallel file system that is being implemented across the high performance computing (HPC) industry – enhancing new applications and providing high levels of scalability to meet a wide range of workloads in standard IT environments.
March 24, 2011 - Check out this case study to learn how Luxembourg Stock Exchange implemented two full IBM XIV units at their main and backup data centers, with synchronous mirroring for disaster protection. Continue reading to see how they were able to achieve their storage environment goals.
June 15, 2011 - This Microsoft Lync Server 2010 solution architecture manual contains possible configurations that can be used to architect your Lync 2010 infrastructure. Samples can serve as a blueprint for organizations with similar requirements. Each organization’s requirements can differ greatly and include items not accounted for in these configurations.
November 25, 2013 - Watch this brief video which introduces collaboration technology that allows for the communication between any context, any device and across geographies. Discover the importance of life-like video, voice, instant messaging and meetings available from any advice- across your organizations, with your customer and partners.
February 16, 2011 - L’Oréal implemented a manufacturing systems overhaul to streamline processes, create a new technology framework and enable disparate locations to share information and best practices more effectively. Jacques Playe, CIO, Operations, explains how the restructuring significantly increased processing capacity, reduced costs and improved quality.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.