IT Services  >   IT Management Services  >  

IT Security Services

RSS Feed    Add to Google    Add to My Yahoo!
IT Security ServicesReports
 
MicroScope August 2014: An issue covering changes in the unified communications market
sponsored by MicroScope
EZINE: An issue highlighting the opportunities in the UC market as well as the ways resellers are adapting to the growth in cloud computing.
Posted: 20 Aug 2014 | Published: 14 Aug 2014

MicroScope

The Future of Managed Services in EMEA
sponsored by Webroot
WHITE PAPER: This report features a survey of firms to see what the future of managed services will hold in EMEA from a channel perspective.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Webroot

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security
sponsored by Dell SecureWorks
CASE STUDY: In this case study explore how implementing Dell SecureWorks enabled Pharmaceutical firm, ProStrakan, to enhance its security and compliance posture by providing 24/7 monitoring, instant alerts and in-depth threat analysis.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Dell SecureWorks

FAQ Guide on Endpoint Management
sponsored by CenterBeam
EGUIDE: This e-guide from SearchSecurity.com features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

CenterBeam

Software Security Delivered in the Cloud
sponsored by Hewlett-Packard Company
PRODUCT OVERVIEW: HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

Hewlett-Packard Company

How Midsize Banks Can Overcome Escalating Security Threats
sponsored by IBM
WHITE PAPER: Like any business, midsize banks face increasing security challenges ranging from threats, compliance, changing business models and more. But what’s even more challenging is that they must address them with limited resources and expertise. In this paper, explore how to tackle security issues with a holistic, integrated approach.
Posted: 26 Apr 2012 | Published: 01 Jul 2011

IBM

The Kaseya IT Automation Framework  
sponsored by Kaseya International Limited
WHITE PAPER: Access this exclusive resource to discover a powerful, web-based, systems management platform that can reduce complexity and increase the productivity of IT pros and MSPs (Managed Service Providers). Read on to learn more about the many features and benefits of this integrated Web-based platform.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

Kaseya International Limited

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Tripwire, Inc.

Choosing and Managing Mobile Devices Chapter 2: Evaluating Mobile Device Management Products
sponsored by SearchConsumerization.com
EBOOK: This expert resource will help readers examine the capabilities of contemporary MDM products and their desirable features. Find out how these tools can help boost workplace performance as well as the limitations you should watch out for.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Are You Securely Delivering Enterprise Data and Services?
sponsored by Webroot
WHITE PAPER: Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement