IT Services  >   IT Management Services  >  

IT Security Services

RSS Feed    Add to Google    Add to My Yahoo!
IT Security ServicesReports
 
CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Building Recurring Revenue as a Service Provider in 2014
sponsored by N-able Technologies
WHITE PAPER: This white paper is an excellent resource for both IT service providers and MSPs, discussing the process and advantages of moving to a model with consistent monthly fees, as well as providing an overview of the current MSP market.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

N-able Technologies

Security Operations Center (SOC) Essentials for the SME
sponsored by AlienVault
WEBCAST: Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014

AlienVault

7 Steps to Next-Gen IT Managed Services
sponsored by LabTech Software
EBOOK: Discover 7 top techniques for expanding your service offerings beyond the traditional MSP model to include next-gen services such as managed security, cloud services, mobile device management and more.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

LabTech Software

How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

E-Guide: Striving for Better Information Security Intelligence
sponsored by Tripwire, Inc.
EGUIDE: The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.

Hosted, Outsourced, and Cloud Data Centers - Strategies and Considerations for Co-Location Tenants
sponsored by Siemon Company
WHITE PAPER: As more companies look towards collocation, hosted, and managed services for their primary data center, there are crucial considerations every IT pros should know when selecting a provider. This resource explores hosted, outsourced, and cloud data centers, and providers strategies and considerations for co-location tenants.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Siemon Company

Making Office 365 More Secure and Compliant
sponsored by Proofpoint, Inc.
WHITE PAPER: Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

Proofpoint, Inc.

The Kaseya IT Automation Framework  
sponsored by Kaseya International Limited
WHITE PAPER: Access this exclusive resource to discover a powerful, web-based, systems management platform that can reduce complexity and increase the productivity of IT pros and MSPs (Managed Service Providers). Read on to learn more about the many features and benefits of this integrated Web-based platform.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

Kaseya International Limited

Avocent Accelerates Critical Applications over WAN While Ensuring Distributed Web Security at Branch Offices
sponsored by BlueCoat
CASE STUDY: IT infrastructure management solutions provider, Avocent Corporation, needed to accomplish two critical tasks: Improve performance of key business applications and provide decentralized Web security and control for their branch offices. View this case study to learn how they were able to meet both needs with just one solution.
Posted: 19 Sep 2011 | Published: 19 Sep 2011

BlueCoat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement