IT Services  >   IT Management Services  >  

Security Assessment Services

RSS Feed    Add to Google    Add to My Yahoo!
Security Assessment ServicesWhite Papers (View All Report Types)
 
Deliver Secure New Business Services
sponsored by CA Technologies.
WHITE PAPER: This informative guide explores how you can deliver secure business services and improve customer experience.
Posted: 23 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Strategies for Secure Virtual Desktop Infrastructure
sponsored by Citrix Systems, Inc.
WHITE PAPER: Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Citrix Systems, Inc.

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Are You Securely Delivering Enterprise Data and Services?
sponsored by Webroot
WHITE PAPER: Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot

An Introduction to Network Vulnerability Testing
sponsored by VeriSign, Inc
WHITE PAPER: SecureTEST, a security scanning service of VeriSign Consulting, uses proven methodologies and tools to detect vulnerabilities in the enterprise's network, and to then recommend repairs or corrections if necessary.
Posted: 14 May 2003 | Published: 01 Jan 2001

VeriSign, Inc

The State of Cloud-Based Security: Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by Webroot Software Pty Ltd
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 12 Mar 2012 | Published: 12 Mar 2012

Webroot Software Pty Ltd

PassMark Success: Endpoint Protection
sponsored by Symantec Corporation
WHITE PAPER: Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Symantec Corporation

Security Intelligence – Is Security a Battle You Can Win
sponsored by IBM
WHITE PAPER: This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
Posted: 14 Oct 2013 | Published: 30 Jun 2011

IBM

HP ArcSight Express 3.0
sponsored by HP Enterprise Security.
WHITE PAPER: View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement