IT Services  >   IT Management Services  >  

Managed Security Services

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Security Services, Security Outsourcing, Intelligence Services, Security Consulting Services, Network Security Services, MSS, Security Management Services, Security Services, Security Assessment Services, Security Consulting, IT Security Services
DEFINITION: An MSSP (managed security service provider) is an Internet service provider (ISP) that provides an organization with some amount of network security management, which may include virus blocking, spam blocking, intrusion detection, firewalls, and virtual private network (VPN) management. An MSSP can also handle system changes, modifications, and upgrades. MSSPs have evolved in various ways. Some traditional  … 
Definition continues below.
Managed Security ServicesWhite Papers (View All Report Types)
1 - 25 of 71 Matches Previous Page  | Next Page
Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks UK

Accelerating Incident Response and Reducing Security Risks
sponsored by Dell SecureWorks UK
WHITE PAPER: This essential whitepaper outlines the advantages of managed security services providers and how your incident response strategy is essential to your overall security plan.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Dell SecureWorks UK

Sophisticated Attacks - The Four Things you Can do now to Help Keep Your Organization Safe
sponsored by IBM
WHITE PAPER: This guide takes a look at IT staff shortages and how managed security services providers (MSSPs) can help minimize issues with the technical skills dilemma.
Posted: 10 Mar 2014 | Published: 31 May 2013

IBM

Utilizing Next Generation MSP Automation to Gain a Competitive Advantage in the Managed Services Marketplace
sponsored by N-able Technologies
WHITE PAPER: This guide takes a look at market forces which are converging and affecting the way MSP must utilize their technology.
Posted: 28 Feb 2014 | Published: 31 Dec 2012

N-able Technologies

Security Intelligence – Is Security a Battle You Can Win
sponsored by IBM
WHITE PAPER: This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
Posted: 14 Oct 2013 | Published: 30 Jun 2011

IBM

How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

5 Ways to Capitalize on Cloud Opportunities
sponsored by ConnectWise
WHITE PAPER: Many technology providers are nervous about the Cloud and what it means for their business.  Rather than look at the Cloud with fear, embrace it and take advantage of the opportunities it brings for new revenue. In this eBook, you'll learn 5 ways to capitalize on the future of the Cloud in today's modern office.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

ConnectWise

7 Steps to Next-Gen IT Managed Services
sponsored by LabTech Software
WHITE PAPER: Discover 7 top techniques for expanding your service offerings beyond the traditional MSP model to include next-gen services such as managed security, cloud services, mobile device management and more.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

LabTech Software

Evolving Your IT Services Offering in a Modern Mobile World
sponsored by LabTech Software
WHITE PAPER: This resource breaks down the BYOD risk and outlines the benefits of implementing mobile device management services in your provider business. Gain advice for selling these offerings to your clients to support their mobile demands.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

LabTech Software

Managed Services: Why It's Good for Business
sponsored by LabTech Software
WHITE PAPER: This resource reveals the top 5 reasons service providers should offer managed services and the benefits they can provide to the business and their clients.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

LabTech Software

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Global Business Gets Continuous Worldwide Network Protection
sponsored by Dell SecureWorks UK
WHITE PAPER: In this case study, find out how one organization's investments in an intrusion detection system (IDS) and continuous firewall are providing them with comprehensive protection that doesn't negatively impact network performance – read on to learn more.
Posted: 04 Dec 2012 | Published: 31 May 2012

Dell SecureWorks UK

Securing Virtual Desktop Infrastructure
sponsored by Citrix Systems, Inc.
WHITE PAPER: Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Citrix Systems, Inc.

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

The Financial Benefit of Cisco’s Elastic Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Cisco Systems, Inc.

PassMark Success: Endpoint Protection
sponsored by Symantec Corporation
WHITE PAPER: Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Symantec Corporation

The Urgent Need to rethink Security Using the Cloud
sponsored by Qualys
WHITE PAPER: This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Posted: 18 Jan 2013 | Published: 28 Feb 2012

Qualys

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

Webroot

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett-Packard Company

Cisco Cloud Security Accelerates Cloud Adoption
sponsored by Cisco Systems, Inc.
WHITE PAPER: Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Cisco Systems, Inc.

How Midsize Banks Can Overcome Escalating Security Threats
sponsored by IBM
WHITE PAPER: Like any business, midsize banks face increasing security challenges ranging from threats, compliance, changing business models and more. But what’s even more challenging is that they must address them with limited resources and expertise. In this paper, explore how to tackle security issues with a holistic, integrated approach.
Posted: 26 Apr 2012 | Published: 01 Jul 2011

IBM

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

Leveraging Cloud Security to Weather Threatening Storms: How to Defend Your Perimeter from Today's Outsized Threats
sponsored by Akamai Technologies
WHITE PAPER: With rapid growth and complexity of today’s threats, traditional perimeter defenses are no longer enough to keep pace. This resource explores the current threat environment and how leveraging cloud-based security services can be a proactive and effective means to protecting against ever-evolving, modern day threats.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies
1 - 25 of 71 Matches Previous Page    1 2 3    Next Page
 
MANAGED SECURITY SERVICES DEFINITION (continued): … An MSSP (managed security service provider) is an Internet service provider (ISP) that provides an organization with some amount of network security management, which may include virus blocking, spam blocking, intrusion detection, firewalls, and virtual private network (VPN) management. An MSSP can also handle system changes, modifications, and upgrades. MSSPs have evolved in various ways. Some traditional ISPs, noting the increasing demand for Internet security that has occurred in recent years, have added managed security to their repertoires. A few security vendors have added Internet access, thus becoming MSSPs. Still other MSSPs have come into existence as brand new entities.An MSSP offers cost savings by allowing an organization to outsource its security functions. But some organizations are reluctant to give up complete control over the security of their systems. In addition, there may be considerable variability in competence among MSSPs.
Managed Security Services definition sponsored by SearchITChannel.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement