IT Services  >   IT Management Services  >  

MSS

RSS Feed    Add to Google    Add to My Yahoo!
MSS Reports
 
Why European Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks
WHITE PAPER: This white paper debunks common misconceptions about European data protection law, considers the characteristics of an excellent Managed Security Services Provider for data protection law purposes, and more.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks

Building Recurring Revenue as a Service Provider in 2014
sponsored by Solarwinds N-able
WHITE PAPER: This white paper is an excellent resource for both IT service providers and MSPs, discussing the process and advantages of moving to a model with consistent monthly fees, as well as providing an overview of the current MSP market.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

Solarwinds N-able

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Information Security Magazine - March 2013
sponsored by SearchSecurity.com
EZINE: This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013

SearchSecurity.com

Choosing and Managing Mobile Devices Chapter 2: Evaluating Mobile Device Management Products
sponsored by SearchConsumerization.com
EBOOK: This expert resource will help readers examine the capabilities of contemporary MDM products and their desirable features. Find out how these tools can help boost workplace performance as well as the limitations you should watch out for.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Endpoint Protection Performance Benchmarks
sponsored by GFI Software
WHITE PAPER: View this endpoint protection performance benchmark report to explore the impact of GFI Software on system performance for its end users based on a set of objective metrics including: installation time, boot time, average CPU usage, memory usage and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

IBM X-Force 2010 Trend and Risk Report
sponsored by IBM
ANALYST REPORT: This IBM X-Force offers latest security trends to help you better understand how to protect your systems and networks and offers ways to improve your security strategy. Read this report for an overview of latest security threats and how to detect them, operate a secure infrastructure, develop secure software, and more.
Posted: 23 May 2011 | Published: 23 May 2011

IBM

The MPLS Network: A Future-Proof Engine for Voice-Data Convergence - Addressing network traffic trends with new opportunities for business communications
sponsored by MegaPath Inc.
WHITE PAPER: This paper discusses the origins and future of Multi Protocol Label Switching (MPLS) technology, highlighting how new applications are demonstrating the potential of these networks and uncovering advantages you can expect to see.
Posted: 01 Jun 2011 | Published: 20 May 2011

MegaPath Inc.

Strategies for Secure Virtual Desktop Infrastructure
sponsored by Citrix Systems, Inc.
WHITE PAPER: Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Citrix Systems, Inc.

The Business Case for Managed DDos Protection
sponsored by Neustar®
WHITE PAPER: This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.
Posted: 18 Nov 2011 | Published: 17 Nov 2011

Neustar®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
MSS White Papers | MSS Multimedia | MSS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement