P Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
P Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10

Protecting SharePoint with Double-Take for Windows 5.0 by  Double-Take Software

April 30, 2008 - Download this whitepaper today to learn how to use Double-Take Software as a cost efficient way to protect your SharePoint data and access. When recoverability matters, depend on Double-Take Software to dynamically move, protect, and recover your critical applications.


Protecting SQL Server in Physical and Virtual Environments by  Marathon Technologies

October 01, 2008 - This paper discusses the different causes of both planned and unplanned downtime along with some important considerations for evaluating solutions to address them.


Protecting the Dynamic Datacenter by  Trend Micro

August 01, 2009 - Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more!


Protecting the Efficient Enterprise with Dell EqualLogic SANs and VMware vSphere 4.0 by  Dell, Inc.

May 20, 2010 - In this webcast, you'll learn how to both protect and enhance your storage and virtualization infrastructure with Dell EqualLogic SANs and VMware vSphere 4.0.


Protecting the Network Perimeter: Controlling what gets through—into and out of your organization by  McAfee.

February 01, 2012 - The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow.


Protecting the Virtual Environment Using Auto-Snapshot Manager/VMware Edition by  Dell, Inc.

October 01, 2008 - This Technical Report focuses on the installation, configuration and usage of Auto-Snapshot Manager/VMware™ Edition to obtain hypervisor aware snapshots and provide an additional layer of data protection for the Virtual Environment.


Protecting User from Firesheep and Sidejacking Attacks with SSL by  VeriSign EMEA

July 29, 2011 - This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  


Protecting Virtual Machines: The "Best Of VMworld" Approach by  Citrix

September 01, 2008 - This white paper explores a completely new approach to availability for virtual machines-an approach recognized with the Best of VMworld 2007 - New Technology award.


Protecting Virtual Machines: The "Best of VMworld" Approach by  Marathon Technologies

August 01, 2008 - Protecting virtual machines in this environment is essential but protecting virtual environments from unplanned downtime is a different matter. This white paper explores a completely new approach to availability for virtual machines. Download now.


Protecting Virtualization ROI through Superior Data Connectivity by  Progress DataDirect

May 17, 2011 - This paper discusses both traditional and virtualized server architectures. It details Progress DataDirect technology which gives enterprise architects the power to achieve virtualization targets, ensuring robust application performance for enterprise users.


Protecting Vital Business Data from Natural Calamities by  Iron Mountain

October 16, 2012 - In this article, explore the case for business continuity and check out some stats proving how necessary a disaster recovery/business continuity plan is in today's treacherous physical and digital climates. Read on now to learn what to consider when making a DR/BC assessment and take the best actions to protect what's yours.


Protecting Vital Business Interests with a Simplified Storage Solution by  Dell | EMC

August 01, 2008 - Effective storage systems have become a critical element of enterprise operations. This paper explains how Dell Services enables organizations to maximize business continuity and mitigate the risk of disaster or litigation.


Protecting Vital Business Interests with a Simplified Storage Solution by  Dell, Inc.

November 15, 2011 - Data growth and regulatory requirements have made backup, recovery, and archiving critical aspects of enterprise operations. Dell Services experts can assess how effectively an information infrastructure is getting the job done and deploy integrated, best-of-breed storage solutions to help ensure the safety and recoverability of critical data.


Protecting Your APIs Against Attack & Hijack by  CA Technologies.

December 31, 2012 - Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.


Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by  Veracode, Inc.

May 10, 2010 - Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities.


Protecting Your Business: Services and Time Critical Applications in and Cost-effective Way by  Alcatel-Lucent

January 01, 2008 - Ensuring that business operations continue regardless of any circumstance is big business. Whether disruptions come as a result of natural disasters; sabotage (malware); technical failures in data storage or networking components.


Protecting Your Critical Data with Integrated Security Intelligence by  IBM

April 30, 2013 - This white paper features a security intelligence platform that integrates with data monitoring and vulnerability assessment for improved threat detection.


Protecting Your Enterprise Network by  Infoblox

August 30, 2013 - This comprehensive white paper provides deeper insight into enterprise IT security threats and the implementation of modern tools that are available to build more robust domain name server (DNS) infrastructures, including DNS firewalls to close security gaps.


Protecting Your Information as if It Were Our Own by  Iron Mountain

August 24, 2012 - This resource introduces the security practices and information security services of an information management services provider intent on providing unparalleled protection of assets, comprehensive security assurance and industry-leading expertise. Read on to discover a potential information management partner now.


Protecting Your Intellectual Property: It Starts with a Single Click by  TITUS

August 07, 2013 - Download Aberdeen's latest report to discover how you can protect your intellectual property with a single click.


Protecting Your Mid-Size Business from Today's Security Threats by  Hewlett-Packard Company

March 18, 2014 - This informative resource dives deep into 3 articles revolving around the protection of mid-sized business from today's security threats.


Protecting Your Multi-Platform Network: The New Wave of Attacks by  ESET

June 20, 2011 - Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.


Protecting your Network and Data Center with Next-Gen Firewalls by  Palo Alto Networks

April 13, 2012 - Learn how your organization can take advantage of next-generation firewalls. This resource provides clarity on this popular security solution so you can determine which features are right for your needs.


Protecting Your Roaming Workforce With Cloud-Based Security by  Sophos, Inc.

December 16, 2013 - This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.


Protecting Your Website With Always On SSL by  Symantec Corporation

May 01, 2012 - This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.


Protection for Banking and Financial Services by  Neustar®

March 20, 2014 - This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.


Protection For Every Enterprise, How BlackBerry Security Works by  BlackBerry

March 17, 2014 - This exclusive paper discusses mobile management platform that's been built from the ground up to deliver a high-quality user experience while adhering to the ever-shifting demands of keeping your devices secure.


Protection for Every Enterprise: How BlackBerry Security Works by  BlackBerry

December 13, 2013 - It's clear you need an effective security strategy and mobility management platform to protect your data and your business. Access this informative resource to learn about a comprehensive mobility management platform that promises to meet the constantly changing demands of enterprise security.


Protection on demand: information security that works for you - instead of putting you to work. by  IBM

February 18, 2009 - Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings.


Protection Starts with Security Management Solutions from Novell by  Novell, Inc.

July 28, 2010 - Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.


Protection Starts with Security Management Solutions from Novell by  Novell, Inc.

March 07, 2011 - Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security - an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.


Prototyping Data Warehouses Using Visual Analytics by  Tableau Software

March 18, 2009 - The webinar will include a case study demonstrating how the City of Charlotte is administering Tableau Server to reduce IT intervention, reduce costs and increase collaboration between business units.


Prototyping Data Warehouses Using Visual Analytics: Presentation Transcript by  Tableau Software

April 09, 2009 - Read this presentation transcript of the “Prototyping Data Warehouses using Visual Analytics” webinar that includes a case study demonstrating how the City of Charlotte is administering Tableau Server to reduce IT intervention, reduce costs and increase collaboration between business units.


Proven Practices for Upgrading and Migrating to SharePoint Server 2010 by  AvePoint, Inc.

February 21, 2011 - This paper discusses the requirements necessary for deploying SharePoint Server 2010,the different methods available for migration, key considerations for each, as well as proven practices,available tools to help make the move to Microsoft’s latest platform release with minimal businessdisruption.


Proven strategies for archiving complex relational data by  IBM

December 30, 2008 - This white paper explains how the IBM Optim Data Growth Solution provides proven technology and comprehensive capabilities that make archiving complex relational data both practical and desirable.


Proven strategies for archiving complex relational data by  IBM

February 24, 2009 - Maintaining only current active data in production environments improves service levels, increases availability and improves disaster recovery initiatives. Read this paper to learn how archiving allows organizations to reclaim valuable capacity, reduce risk and lower costs.


Proven Techniques and Best Practices for Managing Infrastructure Changes by  Fluke Networks

February 01, 2007 - During a period of expansion, it’s vital to ensure network readiness and validate infrastructure changes to optimize network performance, minimize user downtime and reduce problems after implementation. This white paper explains how to manage network changes and meet the need for speed of implementation without sacrificing accuracy.


Proven Value with the Oracle Database Appliance by  Oracle Corporation

February 29, 2012 - This executive brief highlights the data management challenges a California-based organization faced and illustrates how their chosen solution, Oracle Database Appliance, resulted in cost savings and in better overall use of IT resources - and exceeded all expectations.


Proven, defensible eDiscovery for the Enterprise: Reduce Cost and Risk by  StoredIQ

March 16, 2009 - This data sheet provides several real world examples on how companies have reduced costs and risks by implementing proven, defensible eDiscovery for their Enterprises.


Proven, Trusted and HIPAA-Compliant Media Management by  Iron Mountain

October 23, 2013 - This resource features a media management partner that offers security and compliance tools for your tape backup and archive to ensure you consistently are up to par with the latest HIPAA updates.


Provergent Suite - Telecom Order & Inventory Software by  Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory.


Provide Access Control With Innovative Solutions From IBM by  IBM

January 10, 2011 - Unauthorized access to information assets is a critical, complex and constant security threat for any federal agency. Read this IBM white paper and discover powerful, cost-effective, easy-to-use solutions to your authentication and authorization concerns—from single sign-on to complex security infrastructure deployments.


Provide an Unparalleled Customer Experience with Infor CRM Epiphany Outbound Marketing by  Infor CRM

January 20, 2012 - This brief video demo details an analytics dashboard that seamlessly pulls together analytics for campaign marketing lists. Watch this now to see how easy it is to use this dashboard for improving your marketing campaigns.


Provide Better Visibility and Manageability across Network Security Tools by  WatchGuard Technologies, Inc.

September 30, 2013 - Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment.


Providing effective endpoint management at the lowest total cost by  IBM

April 01, 2011 - Endpoint management technologies ensure that servers, workstations, laptops, mobile devices, and virtually any other network-connected device are kept up-to-date and correctly configured. Read on to investigate the total cost of ownership, or TCO, of an endpoint management investment.


Providing Security for Software Systems in the Cloud by  Hewlett-Packard Company

December 31, 2012 - Read this whitepaper to learn about the risks to software deployed in the cloud and what steps you can take to mitigate that risk.


Proving value in an age of austerity: A new normal for US government programmes by  Oracle Corporation

March 31, 2013 - This article will explore what agencies must do to make a compelling case for relevancy and how best‐practice organizations are managing programs under budgetary pressure.


Provision Infrastructure in minutes -- The Business Case for HP CloudSystem Matrix by  HP & Intel®

August 02, 2013 - This white paper outlines the potential capital and operational cost benefits of deploying IaaS for your private and hybrid clouds. Realize how this strategy simplifies optimization and provisioning enabling you to better meet today's dynamic business demands.


Provisioning Should Be Simple Why Traditional Provisioning Systems Are No Longer Relevant by  Aveksa

July 23, 2012 - Do you want to improve your provisioning system? In the past provisioning has been expensive and ineffective, but that can all improve with a few changes. Deciding who has access to your business enterprise is one of the first steps to take towards improvement.


PS Series Best Practices Deploying Microsoft Exchange Server in an iSCSI SAN by  EqualLogic, Inc.

May 01, 2007 - This Technical Report describes how to use EqualLogic PS Series storage in a Microsoft Windows Server 2003 environment.


Public Cloud Security Tips and Best Practices by  MuleSoft

February 20, 2013 - This expert E-Guide counts down 10 ways that that you can keep your applications safe in the public cloud. Also inside, uncover essential best practices for protecting your data and applications – read on to learn more.


Public complaints case study by  SAS

March 21, 2013 - With large volumes of data pouring into the Hong Kong Efficiency Unit's call center, they needed a way to manage this information and provide excellent customer service. Read this brief case study to see how they leveraged a visual analytics platform to take more effective action and make better decisions.


Public or Private Cloud: The Choice is Yours by  Aerohive Networks

April 12, 2013 - This resource provides an overview of public, private and hybrid clouds, their key advantages and disadvantages, and tips that will help you select the best option for your organization.


Public or private? Picking your hybrid cloud strategy's starting point by  VMware, Inc.

November 24, 2013 - Read this e-guide from SearchCloudComputing.com today to learn how to pick your hybrid cloud strategy's starting point, including how to assess your existing environment for hybrid clouds.


Public Sector Business Analytics: The Path to Better Decision Making and Agility by  SAP America, Inc.

July 19, 2011 - This white paper evaluates the use of analytics and business intelligence for improving decision making in public sector organizations, as well as the benefits which prebuilt analytic applications can achieving across multiple organizational functions.


Public, Hybrid and Private Virtualized Multi-Tenant Cloud Data Center by  Extreme Networks

February 21, 2014 - This guide explores network architecture solutions that can handle a more virtualized and cloud-based data center.


Public, Private and Hybrid Cloud Storage: Expert Definitions and Configuration Steps by  Oracle Corporation

November 28, 2012 - This expert E-Guide is a great intro to cloud storage. Learn four key definitions of private cloud storage, five advantages of cloud storage and a Q&A with a Gartner research VP on hybrid cloud storage.


Public, Private or Hybrid? Pick the Right Cloud Model for Your Organization by  Dell and VMware

March 05, 2014 - This expert e-guide will help you select the right cloud computing model to meet your organization's needs.


Pueblo School District Case Study: Eliminating the Digital Divide by  Dell, Inc.

December 01, 2008 - In this case study you'll learn how Colorado's second largest school district, Pueblo 70, enhanced the learning experience with innovative solutions from Dell.


Pugging Into the Data Backup Appliance by  TechTarget

March 18, 2014 - IT pros continue to move toward disk-based backup as disk based appliances continue to include a vast array of backup appliances. This essential guide provides deeper insight into how to compare data backup appliance options.


Pulling the Plug on Legacy Log Management by  Tripwire, Inc.

April 09, 2010 - When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh.


Pulse E-Zine: The Stage is Set for Stage 2 by  SearchHealthIT.com

March 24, 2014 - This E-Zine explores the preparation to implement stage 2 criteria with EHRs that are upgraded to new standards and more.


Pund-IT (Charles King): Workload-Optimized Systems – IBM Shows the Way, Again by  IBM

April 15, 2010 - Charles King at Pund-IT defines the phrase “workload-optimized systems” citing IBM Smart Analytics System as a true example. Oracle’s misleading Exadata TPC-C benchmark claims against old DB2 results are cited by Charles as an example of confusion elsewhere in the market today. Read this report to learn more.


Purchase Intentions – Summer 2013 Europe by  TechTarget

March 18, 2014 - Making the right purchasing decisions is a daunting task, especially when it concerns the well-being of your organizations network. By taking this brief survey you will gain access to this exclusive guide based off a survey completed by over 600 respondents on purchase intentions. Learn what drives purchases, what is being purchased, and much more!


Purchase Intentions – Summer 2013 Europe by  TechTarget

March 18, 2014 - Making the right purchasing decisions is a daunting task, especially when it concerns the well-being of your organizations network. By taking this brief survey you will gain access to this exclusive guide based off a survey completed by over 600 respondents on purchase intentions. Learn what drives purchases, what is being purchased, and much more!


Purdue Pharma L.P. Deploys DocAve® to Protect and Manage its SharePoint Infrastructure by  AvePoint, Inc.

February 04, 2010 - Purdue Pharma L.P. have an expansive, diverse, and geographically distributed network of employees, partners, and associated firms who must collaborate extensively. See how they turned to DocAve to dramatically reduce time and resources required for granular restores and improve end-user confidence and accelerated Sharepoint adoption.


Pursue fraud with IBM Intelligent Investigation Manager by  IBM

October 02, 2013 - Analyst teams frequently do not have enough time to sift through the mountains of information to discover patterns that may lead to investigative breakthroughs. View this resource to learn more about optimizing investigation effectiveness with a flexible collaborative case investigation.


Pushing from Mobile to the Cloud: Enterprise Applications Everywhere by  Kony

March 26, 2013 - Access this exclusive, expert E-Book to explore how mobile development teams finish projects on time and within budget despite today's reduced development cycles and financial resources. Read on to access three articles discussing how cloud-based techs are helping mobile applications development teams.


Pushing From Mobile to the Cloud: Enterprise Applications Everywhere by  TechTarget

February 19, 2014 - Mobile development teams are not only completing projects with limited resources but shorter development cycles as well, and all while on budget. But how are mobile development teams accomplishing these tasks? Complete this survey and gain access to an expert guide providing you with a solution that plays an integral part in mobile app efficiency.


Put an end to mainframe scripting with policy-driven IBM automation by  IBM

April 30, 2013 - Automating single-mainframe environments often requires time-consuming and cumbersome script-writing. This resource describes a strategy designed to quickly and easily replace manual methods of mainframe automation.


Put Compliance Management Back into Server Virtualization by  HP & Intel®

December 12, 2012 - This e-guide from searchCompliance.com offers expert insight that will help ensure your business remains compliant before, during and after any server virtualization implementation. Read now to learn how you can put compliance management back into server virtualization.


Put Data Growth in Its Place by  Symantec Corporation

November 15, 2010 - It’s a fact: Information–both its availability and accessibility–is critical for the success of any business in a 21st Century economy. Yet most IT organizations are not organized around information, but around infrastructure of servers, storage, and applications. We are entering perilous times for data. Read this white paper to learn more.


Put your Analytics Applications into Overdrive by  IBM

December 31, 2012 - With IBM Informix Warehouse and the Intel Xeon processor E7 family, IBM and Intel are partnering to deliver superior performance for in-memory analytics processing – helping you turn massive amounts of data into business opportunities.


Put your business in motion. Become a mobile enterprise. by  IBM

April 30, 2013 - Forward-thinking companies realize that in order to improve customer experience and business performance, they need to make their services, products, and strategies available to the mobile consumer at all times. In this helpful resource, learn how to overcome some of the most common challenges surrounding mobile engagement.


Putting Content to Work - ECM UserNet 2011 by  IBM

May 20, 2011 - ECM UserNet 2011 is the premier Enterprise Content Management event for generating better business decisions. Backed by 25 years of user group history, this event promises to be the biggest IBM ECM knowledge exchange yet and one you won't want to miss.


Putting Data Governance and Stewardship Into Play by  SearchDataManagement

August 29, 2013 - For a data governance plan to be truly effective, organizations must examine key success factors for data stewardship and data governance programs. In this expert three-part handbook, learn how to ensure that data governance and stewardship plans stick in your organization.


Putting Data Governance and Stewardship Into Play by  TechTarget

March 18, 2014 - With technology continuing to evolve, data governance and data stewardship needs to evolve with it in order for it to stick long-term. Take this survey to gain access to an exclusive guide that provides a fresh approach to data governance and data stewardship.


Putting mobile first: best practices of mobile technology leaders by  IBM

August 30, 2013 - This exclusive paper investigates the approaches that businesses are using to support the transformational shift to mobile. Discover best practices and characteristics of successful mobile infrastructures that you can apply to your own initiative.


Putting Security First in the Newly Virtualized World by  Lumension

July 07, 2008 - At Lumension Security are experts are in tune with the latest security problems posed by virtualization. In a new and largely untested IT world it is necessary to apply security at every stage of the process, keeping it safe from hackers and data breaches


Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk by  Lumension

August 01, 2008 - This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.


Putting the contact center at the center of the customer experience by  Aspect

March 31, 2013 - Today's customers have more control of the conversation than ever before -- and your contact center must be equipped to deliver seamless interactions across a variety of channels, lest your customers take their business somewhere else. To do this, you need a comprehensive platform that enables anywhere, anytime service.


Putting Web Threat Protection and Content Filtering in the Cloud by  Webroot

December 31, 2012 - In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.


Putting Windows 7 Migration on the Fast Track by  BDNA

June 07, 2011 - The Windows 7 migration will soon be a reality for nearly every organization. And while the migration process can present many challenges, BDNA technologies can provide a fully transparent view into the entire infrastructure, reducing the risks and costs of migration. Read now to ensure your migration is efficient and cost-effective.


Putting Your Big Data Management Strategy on the Right Track by  SearchDataManagement

July 15, 2013 - In this chapter of our expert e-book, explore the steps you can take to harness the power of big data technology and get your big data project on the path to success. Inside, you'll learn how to devise, implement and maintain a big data management strategy as well as evaluate the latest technology options.


Puzzling: Finding the Missing Pieces of your Customer Picture by  IBM

September 03, 2013 - In this on-demand video, learn about the need for a complete customer view, and discover how the right big data and analytics tools can help you get there by giving you the power to predict customer behaviors, improve customer engagement, and more.

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts