IT Services  >   IT Management Services  >  

Security Management Services

RSS Feed    Add to Google    Add to My Yahoo!
Security Management ServicesWhite Papers (View All Report Types)
 
Accelerating Incident Response and Reducing Security Risks
sponsored by Dell SecureWorks
WHITE PAPER: This essential whitepaper outlines the advantages of managed security services providers and how your incident response strategy is essential to your overall security plan.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Dell SecureWorks

Global Business Gets Continuous Worldwide Network Protection
sponsored by Dell SecureWorks
WHITE PAPER: In this case study, find out how one organization's investments in an intrusion detection system (IDS) and continuous firewall are providing them with comprehensive protection that doesn't negatively impact network performance – read on to learn more.
Posted: 04 Dec 2012 | Published: 31 May 2012

Dell SecureWorks

Deliver Secure New Business Services
sponsored by CA Technologies.
WHITE PAPER: This informative guide explores how you can deliver secure business services and improve customer experience.
Posted: 23 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

The MPLS Network: A Future-Proof Engine for Voice-Data Convergence - Addressing network traffic trends with new opportunities for business communications
sponsored by MegaPath Inc.
WHITE PAPER: This paper discusses the origins and future of Multi Protocol Label Switching (MPLS) technology, highlighting how new applications are demonstrating the potential of these networks and uncovering advantages you can expect to see.
Posted: 01 Jun 2011 | Published: 20 May 2011

MegaPath Inc.

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett-Packard Company

Penetration Tests
sponsored by Internet Security Systems, Inc.
WHITE PAPER: A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.
Posted: 06 Apr 2003 | Published: 01 Jan 2001

Internet Security Systems, Inc.

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

451 Group Research Report: Intel-McAfee links up identity-in-the-cloud SSO with salesforce.com
sponsored by Intel
WHITE PAPER: Industry analyst Steve Coplan of The 451 Group takes a close look at the recent beta release of Intel Cloud SSO and places it in the context of the rapidly evolving cloud service broker market for mediating user ids and application APIs for cloud access. View now to learn more.
Posted: 02 Apr 2012 | Published: 02 Mar 2012

Intel

FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

The Tangled Web: Silent Threats & Invisible Enemies
sponsored by Symantec Hosted Services
WHITE PAPER: Cyber-criminals can stage attacks on businesses with covert malware, spam, and scams that drain employee productivity. Rich media, open-source platforms and social-networking sites are vulnerable to these threats. Learn how a hosted web security and content filtering service intercepts all types of these web-borne attacks.     
Posted: 03 Mar 2010 | Published: 03 Mar 2010

Symantec Hosted Services
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement