IT Management  >   Systems Operations  >   Networking  >  

Peer-to-Peer File Sharing

RSS Feed   
Peer-to-Peer File Sharing White Papers (View All Report Types)
 
Filtering the Spectrum of Internet Threats: Defending against Inappropriate Content, Spyware, IM and P2P at the Perimeter
sponsored by St. Bernard Software
WHITE PAPER: This paper reviews how a perimeter network security appliance can be well suited for SMBs because it lowers total cost of ownership with rapid deployment and ease of configuration, and provides a secure and stable appliance-based solution.
Posted: 20 Feb 2006 | Published: 01 Jan 2005

St. Bernard Software

IPV6: Complete these 5 Steps to Prepare
sponsored by AT&T Corp
WHITE PAPER: This paper provides guidelines to help you take advantage of the strategic opportunities IPv6 will bring, while avoiding loss of business, marketing challenges, increased SPAM activity and other potential problems.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

White Paper: Controlling Recreational Peer-to-Peer Traffic to Improve Application Performance
sponsored by Exinda Networks
WHITE PAPER: This white paper provides a practical overview on the evolution of recreational P2P traffic, how it is impacting corporate networks and, offers specific recommendations for controlling these recreational applications.
Posted: 18 Apr 2008 | Published: 01 Apr 2008

Exinda Networks

Unauthorized Applications: Taking Back Control
sponsored by Sophos
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos

Unchain Your Network with Application Intelligence and Control
sponsored by SonicWALL
WHITE PAPER: This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

Potentially Unwanted Programs: Spyware and Adware
sponsored by Intel Security
WHITE PAPER: Potentially unwanted programs (PUPs) like adware and malware can compromise your computer network's privacy and security and the associated risks can weaken your entire network. Read this white paper to learn how to effectively protect against PUPs.
Posted: 27 Mar 2007 | Published: 01 Oct 2005

Intel Security

Monitoring and Service Assurance for Your Business
sponsored by Centerity
WHITE PAPER: Gaining the visibility and analytic capabilities to see through your complex infrastructure can deliver returns such as increased deployment speeds, proactive bottleneck resolution, and more. Learn more about a platform that provides end-to-end monitoring to your infrastructure, and the resulting performance benefits for your business.
Posted: 24 Apr 2018 | Published: 24 Apr 2018

Centerity

How the Israeli Air Force Streamlined Their IT Infrastructure
sponsored by Centerity
WHITE PAPER: When one nation's military was looking to improve its IT infrastructure, mission-critical took on an entirely new – and literal – meaning. Discover how the Israeli Air Force harnessed an all-in-one monitoring platform to streamline its IT infrastructure, and earn them extensive benefits ranging from cost savings to increased availability.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

Centerity

Increasing Visibility and Analysis Within Your Hybrid Infrastructure
sponsored by FixStream
WHITE PAPER: One problem enterprises are encountering with hybrid environments is their increasingly complex composition, as more business processes are newly enabled and consequently migrated to the cloud. Learn more about how an artificial intelligence platform can give your IT operations the tools to successfully visualize and navigate your infrastructure.
Posted: 19 Apr 2018 | Published: 19 Apr 2018

FixStream

Disaster Recovery Planning for Today's Real World Outages
sponsored by Commvault
WHITE PAPER: With physical servers, cloud platforms, and other distinct elements that compose today's hybrid environments, successfully implementing and managing a disaster strategy can be burdensome on IT. Click to learn how your organization can harness automation to transform its disaster strategy and reduce IT workloads.
Posted: 23 Apr 2018 | Published: 23 Apr 2018

Commvault
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement