Filtering Reports

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.

Success Story: Associates in Rehabilitation Medicine Heals their Network Ills with Astaro
sponsored by Astaro
CASE STUDY: Medical facility, Associates in Rehabilitation Medicine, was concerned about its current network security solution's ability in protecting confidential and private patient data from possible hackers, as well as VPN performance. View this case study to learn how they were able to tackle these challenges by switching to Astaro Security Gateway.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Astaro

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

TITUS Meets SharePoint Security Needs of Document Management System of Turkish Prime Minister's Office
sponsored by TITUS
WHITE PAPER: Read this white paper to discover how the Turkish Prime Minister's office implemented a secure SharePoint system to protect-- yet keep their content accessible to those authorized to use it.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Cisco Systems, Inc.

Best Practices for Preventing Malware
sponsored by TechTarget Security
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

TechTarget Security

Mobile Presence and Instant Messaging:  Key Strategies for Mid-Sized Companies
sponsored by Cisco Systems, Inc.
EGUIDE: This e-guide discusses steps to develop a UC strategy for presence in the anywhere office. Additionally, uncover the dangers of instant messaging, how to tackle potential security challenges, what role mobility plays within presence and more.
Posted: 27 Jun 2011 | Published: 23 Jun 2011

Cisco Systems, Inc.

Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
sponsored by Microsoft
PODCAST: Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 03 Nov 2006 | Premiered: Oct 27, 2006, 09:00 EDT (13:00 GMT)

Microsoft

Effective Ways to Search Log Files
sponsored by TechTarget Security
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

TechTarget Security

Project Success Plan: Rethinking Enterprise Content Management
sponsored by OpenText
EGUIDE: Traditional ECM can't keep up with how businesses operate today. But before tackling ECM disruptors, you need to understand its evolution and key steps to modernizing your suite. This 7-part guide collection provides the insights you need to push your ECM strategy forward. Learn ECM basics, trends, security considerations, and more.
Posted: 08 Sep 2016 | Published: 31 Aug 2016

OpenText