IT Services  >   IT Management Services  >  

Managed Security Services

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Security Services, Security Outsourcing, Intelligence Services, Security Consulting Services, Network Security Services, MSS, Security Management Services, Security Services, Security Assessment Services, Security Consulting, IT Security Services
DEFINITION: An MSSP (managed security service provider) is an Internet service provider (ISP) that provides an organization with some amount of network security management, which may include virus blocking, spam blocking, intrusion detection, firewalls, and virtual private network (VPN) management. An MSSP can also handle system changes, modifications, and upgrades. MSSPs have evolved in various ways. Some traditional  … 
Definition continues below.
Managed Security ServicesReports
26 - 50 of 134 Matches Previous Page  | Next Page
Targeted attacks and how to defend against them
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

5 Ways That MSPs Can Capitalize on Cloud Opportunities
sponsored by ConnectWise
WHITE PAPER: This insightful white paper details how MSPs can ensure the continued success of their businesses as the popularity of cloud computing continues to grow by offering the kind of indispensible personalized support to their clients that cloud giants can't provide.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

ConnectWise

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Protecting Critical Business Information Beyond the Data Center
sponsored by HP Autonomy
WHITE PAPER: Discover why data protection for distributed environments differs from traditional server backup and recovery strategies and view a list of considerations you should use to evaluate potential service providers to ensure you find one that best aligns with your business needs.
Posted: 12 Jun 2013 | Published: 12 Mar 2013

HP Autonomy

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Choosing and Managing Mobile Devices Chapter 2: Evaluating Mobile Device Management Products
sponsored by SearchConsumerization.com
EBOOK: This expert resource will help readers examine the capabilities of contemporary MDM products and their desirable features. Find out how these tools can help boost workplace performance as well as the limitations you should watch out for.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Security as a Service: Benefits and Risks of Cloud-Based Security
sponsored by SearchSecurity.com
EGUIDE: Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

SearchSecurity.com

Five Services to Grow Your Business
sponsored by ConnectWise
WHITE PAPER: What's your growth and client retention strategy? Technology providers need to be on the breaking edge of technology trends and consumer demands.  The last thing you want is to lose a client because you don't offer a certain service.  So what services are clients asking for in 2013?  Download this eBook to keep you ahead of the curve.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

ConnectWise

Global Business Gets Continuous Worldwide Network Protection
sponsored by Dell SecureWorks
WHITE PAPER: In this case study, find out how one organization's investments in an intrusion detection system (IDS) and continuous firewall are providing them with comprehensive protection that doesn't negatively impact network performance – read on to learn more.
Posted: 04 Dec 2012 | Published: 31 May 2012

Dell SecureWorks

VMworld Europe Case Study:  Colt Technology
sponsored by ComputerWeekly.com
CASE STUDY: Managed service provider Colt designed and rolled out a scalable, cloud-hosted desktop virtualisation project that is reaping benefits for local councils.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

Webroot

How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

The Financial Benefit of Cisco’s Elastic Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Cisco Systems, Inc.

IT Services: A Management model for CIOs
sponsored by CenterBeam
EGUIDE: This expert e-guide explains how IT services and managed service providers (MSPs) deliver strategic value to the organizations that use them, and offers tips for choosing the right MSP. Also inside, learn why savvy CIOs are flocking to cloud computing.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

CenterBeam

FAQ Guide on Endpoint Management
sponsored by CenterBeam
EGUIDE: This e-guide from SearchSecurity.com features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

CenterBeam

Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 15 May 2013 | Published: 15 May 2013

Webroot

PassMark Success: Endpoint Protection
sponsored by Symantec Corporation
WHITE PAPER: Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Symantec Corporation

Information Security Magazine - March 2013
sponsored by SearchSecurity.com
EZINE: This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013

SearchSecurity.com

Cloud Endpoint Security: Considerations for Cloud Security Services
sponsored by Symantec Corporation
EGUIDE: This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Symantec Corporation

The Urgent Need to rethink Security Using the Cloud
sponsored by Qualys
WHITE PAPER: This informative resource describes the many benefits that accompany the shift to a cloud-based security strategy. Discover how you can simplify, centralize, and enhance everything from endpoint security to compliance. Reduce web app vulnerabilities and manage threats with ease -- read on to learn more.
Posted: 18 Jan 2013 | Published: 28 Feb 2012

Qualys

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

Webroot

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett-Packard Company
26 - 50 of 134 Matches Previous Page    1 2 3 4 5    Next Page
 
MANAGED SECURITY SERVICES DEFINITION (continued): … An MSSP (managed security service provider) is an Internet service provider (ISP) that provides an organization with some amount of network security management, which may include virus blocking, spam blocking, intrusion detection, firewalls, and virtual private network (VPN) management. An MSSP can also handle system changes, modifications, and upgrades. MSSPs have evolved in various ways. Some traditional ISPs, noting the increasing demand for Internet security that has occurred in recent years, have added managed security to their repertoires. A few security vendors have added Internet access, thus becoming MSSPs. Still other MSSPs have come into existence as brand new entities.An MSSP offers cost savings by allowing an organization to outsource its security functions. But some organizations are reluctant to give up complete control over the security of their systems. In addition, there may be considerable variability in competence among MSSPs.
Managed Security Services definition sponsored by SearchITChannel.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement