ComputerWeekly.com Research Library

Powered by Bitpipe.com

SMB Research

  • E-Guide: Selecting a SIM for midmarket business

    Sponsored by: TechTarget Security

    This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.

  • E-Guide: How to Identify Which Applications are Right for Public Cloud Computing

    Sponsored by: TechTarget Data Center

    In this e-guide from SearchCloudComputing.com, gain expert insight into how public cloud computing benefits businesses of all sizes. Discover how to identify which applications are good candidates for cloud computing and which are not. And find out about alternatives to adopting a full public or private cloud computing strategy.

  • HP X5000 G2 Network Storage System Evaluation

    Sponsored by: HPE and Intel®

    Read this Tolly Test Report and how the HP X5000 G2 Network Storage System powered by Intel® Xeon® processors not only integrates with existing Microsoft, Unix, and Linux applications using CIFS and/or NFS, but also enables high-speed connectivity to a host of virtualization platforms, database applications, backup applications and more.

  • Understanding WMI Malware

    Sponsored by: Trend Micro, Inc.

    This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.

  • Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market

    Sponsored by: ArcSight, an HP Company

    This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

  • Email archiving FAQ

    Sponsored by: Symantec Corporation

    This exclusive FAQ guide has expert answers to 6 email archiving questions and addresses topics like the pros and cons of managed email archiving services, bandwidth requirements and more.

  • E-Guide: Virtualization Options for SMBS in 2011

    Sponsored by: Dell, Inc. and Intel®

    Storage virtualization products are not just for large businesses. There are a variety of data storage virtualization solutions that are easy to set up and are priced right for small- and medium-sized businesses. In this SearchSMBstorage.com e-guide you will learn all about the virtualization options that are on the marketing for SMBs in 2011.

  • Better Backup for Budgets

    Sponsored by: arcserve

    Check out this expert E-Gudie to explore cutting edge backup methods to combat data growth, and how to significantly reduce your backup window without spending a dime.

  • Designing and Implementing a Medium Server Farm with SharePoint 2010

    Sponsored by: DellEMC and Intel®

    This paper discusses key criteria and decision points for determining what server and storage hardware are appropriate for a medium-sized SharePoint Server 2010 farm. It offers guidelines and rules of thumb for determining how much storage space should be allocated, and when separate storage volumes are desirable.

  • Presentation Transcript: Revelations and Realities of Endpoint Security

    Sponsored by: GFI Software

    Companies face numerous complexities when securing endpoints. In this presentation transcript, learn how to evaluate your business needs and come up with a comprehensive strategy to address endpoint security. Experts discuss both challenges with endpoint security as well as solutions available today.

Browse by Report Type: SMB White Papers | SMB Multimedia | SMB IT Downloads

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.