IT Services  >   IT Management Services  >  

Security Outsourcing

RSS Feed    Add to Google    Add to My Yahoo!
Security OutsourcingWhite Papers (View All Report Types)
 
TELUS leverages HP ArcSight and TippingPoint - Managed security service provider builds intelligentanalysis on tightly integrated HP solution
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource explains the reasoning behind MSSPs and how they help prevent cybercrime.
Posted: 10 Jun 2014 | Published: 01 Sep 2013

Hewlett-Packard Limited

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

Advanced Persistent Threats: From “FUD” to Facts
sponsored by Websense, Inc.
WHITE PAPER: What is Advanced Persistent Threat (APT)? Too much marketing hype and FUD (fear, uncertainty, and doubt) have clouded the facts about a very real danger to organizations of all sizes. View this paper to gain a better understanding of APT and how to mitigate your risks. 
Posted: 21 Oct 2011 | Published: 21 Oct 2011

Websense, Inc.

Minimize your financial institution’s risk with solutions from IBM
sponsored by IBM
WHITE PAPER: Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

IBM

How Midsize Banks Can Overcome Escalating Security Threats
sponsored by IBM
WHITE PAPER: Like any business, midsize banks face increasing security challenges ranging from threats, compliance, changing business models and more. But what’s even more challenging is that they must address them with limited resources and expertise. In this paper, explore how to tackle security issues with a holistic, integrated approach.
Posted: 26 Apr 2012 | Published: 01 Jul 2011

IBM

Demonstrating HIPAA Security Rule Compliance
sponsored by Q1 Labs, an IBM Company
WHITE PAPER: View this paper to learn about the key elements of the HIPAA Security Rule including administrative, technical and, physical safeguards. In addition, explore how new advanced technology, QRadar, can help covered entities ease the burden of these rules and meet compliance.
Posted: 15 Aug 2011 | Published: 08 Aug 2011

Q1 Labs, an IBM Company

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

The MPLS Network: A Future-Proof Engine for Voice-Data Convergence - Addressing network traffic trends with new opportunities for business communications
sponsored by MegaPath Inc.
WHITE PAPER: This paper discusses the origins and future of Multi Protocol Label Switching (MPLS) technology, highlighting how new applications are demonstrating the potential of these networks and uncovering advantages you can expect to see.
Posted: 01 Jun 2011 | Published: 20 May 2011

MegaPath Inc.

Making Office 365 More Secure and Compliant
sponsored by Proofpoint, Inc.
WHITE PAPER: Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

Proofpoint, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement