IT Services  >   IT Management Services  >  

Managed Security Services

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Security Services, Security Outsourcing, Intelligence Services, Security Consulting Services, Network Security Services, MSS, Security Management Services, Security Services, Security Assessment Services, Security Consulting, IT Security Services
DEFINITION: An MSSP (managed security service provider) is an Internet service provider (ISP) that provides an organization with some amount of network security management, which may include virus blocking, spam blocking, intrusion detection, firewalls, and virtual private network (VPN) management. An MSSP can also handle system changes, modifications, and upgrades. MSSPs have evolved in various ways. Some traditional  … 
Definition continues below.
Managed Security ServicesReports
51 - 75 of 140 Matches Previous Page  | Next Page
Five Services to Grow Your Business
sponsored by ConnectWise
WHITE PAPER: What's your growth and client retention strategy? Technology providers need to be on the breaking edge of technology trends and consumer demands.  The last thing you want is to lose a client because you don't offer a certain service.  So what services are clients asking for in 2013?  Download this eBook to keep you ahead of the curve.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

ConnectWise

Global Business Gets Continuous Worldwide Network Protection
sponsored by Dell SecureWorks
WHITE PAPER: In this case study, find out how one organization's investments in an intrusion detection system (IDS) and continuous firewall are providing them with comprehensive protection that doesn't negatively impact network performance – read on to learn more.
Posted: 04 Dec 2012 | Published: 31 May 2012

Dell SecureWorks

VMworld Europe Case Study:  Colt Technology
sponsored by ComputerWeekly.com
CASE STUDY: Managed service provider Colt designed and rolled out a scalable, cloud-hosted desktop virtualisation project that is reaping benefits for local councils.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

July Essentials Guide on Cloud Computing
sponsored by SearchSecurity.com
EBOOK: This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.
Posted: 11 Jul 2012 | Published: 09 Jul 2012

SearchSecurity.com

Domino’s Pizza:  Datacentre Transformation
sponsored by ComputerWeekly.com
PRESENTATION: Colin Rees, IT Director at Domino’s Pizza explains how a project to move the company data centre into the cloud has transformed its online business.
Posted: 29 May 2012 | Published: 29 May 2012

ComputerWeekly.com

Exploring cloud Security as a Service options
sponsored by SearchSecurity.com
EGUIDE: There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012

SearchSecurity.com

The Hidden Costs of Self-Signed SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Many IT professionals believe that self-signed SSL certificates can help lower security costs. Unfortunately, aside from the certificate itself, there are a number of other costs. This paper uncovers the true total cost of ownership for self-signed SSL certificates and why they are costlier and riskier than working with a trusted security vendor.
Posted: 09 May 2012 | Published: 09 May 2012

Symantec Corporation

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security
sponsored by Dell SecureWorks
CASE STUDY: In this case study explore how implementing Dell SecureWorks enabled Pharmaceutical firm, ProStrakan, to enhance its security and compliance posture by providing 24/7 monitoring, instant alerts and in-depth threat analysis.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Dell SecureWorks

Maintaining security in managed services
sponsored by SearchSecurity.com
EGUIDE: Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model.
Posted: 06 Dec 2011 | Published: 05 Dec 2011

SearchSecurity.com

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

Webroot

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett-Packard Company

Cisco Cloud Security Accelerates Cloud Adoption
sponsored by Cisco Systems, Inc.
WHITE PAPER: Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Cisco Systems, Inc.

How Midsize Banks Can Overcome Escalating Security Threats
sponsored by IBM
WHITE PAPER: Like any business, midsize banks face increasing security challenges ranging from threats, compliance, changing business models and more. But what’s even more challenging is that they must address them with limited resources and expertise. In this paper, explore how to tackle security issues with a holistic, integrated approach.
Posted: 26 Apr 2012 | Published: 01 Jul 2011

IBM

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

The changing SIEM landscape: What you should know to stay ahead
sponsored by SearchSecurity.com
EGUIDE: While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

SearchSecurity.com

Leveraging Cloud Security to Weather Threatening Storms: How to Defend Your Perimeter from Today's Outsized Threats
sponsored by Akamai Technologies
WHITE PAPER: With rapid growth and complexity of today’s threats, traditional perimeter defenses are no longer enough to keep pace. This resource explores the current threat environment and how leveraging cloud-based security services can be a proactive and effective means to protecting against ever-evolving, modern day threats.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Akamai Technologies

451 Group Research Report: Intel-McAfee links up identity-in-the-cloud SSO with salesforce.com
sponsored by Intel
WHITE PAPER: Industry analyst Steve Coplan of The 451 Group takes a close look at the recent beta release of Intel Cloud SSO and places it in the context of the rapidly evolving cloud service broker market for mediating user ids and application APIs for cloud access. View now to learn more.
Posted: 02 Apr 2012 | Published: 02 Mar 2012

Intel

Worldwide and U.S. Security Services Threat Intelligence 2011–2014 Forecast: Out of the Basement and into the Clouds
sponsored by Vigilant
ANALYST REPORT: With threats becoming more advanced, organizations need new innovative ways to defend against them. View this excerpt from IDC Market Analysis to explore security services threat intelligence market including its current state, how the technology works, key benefits and competitive overview.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

Vigilant

The State of Cloud-Based Security: Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by Webroot Software Pty Ltd
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 12 Mar 2012 | Published: 12 Mar 2012

Webroot Software Pty Ltd

Staying Ahead of Cyberthreats: Recommendations for Financial Institutions
sponsored by Dell SecureWorks
WHITE PAPER: Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Dell SecureWorks

Expert guide to understanding SaaS and cloud computing issues
sponsored by Veracode, Inc.
EGUIDE: This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Veracode, Inc.

Making Office 365 More Secure and Compliant
sponsored by Proofpoint, Inc.
WHITE PAPER: Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

Proofpoint, Inc.

Simplify Your Relationship with Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: View this paper to explore the key reasons why managing endpoint security is complex, why a hosted endpoint solution can ease this complexity, to uncover Symantec Endpoint Protection.cloud and more.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Symantec Corporation

Endpoint Protection Performance Benchmarks
sponsored by GFI Software
WHITE PAPER: View this endpoint protection performance benchmark report to explore the impact of GFI Software on system performance for its end users based on a set of objective metrics including: installation time, boot time, average CPU usage, memory usage and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

A pragmatic approach to security - How to stay secure in 2012
sponsored by Dell SecureWorks
WHITE PAPER: While it can be tempting to simply buy new security technologies to solve your problems, they are unlikely to help if the basics of an effective security practice are not in place. In this white paper, discover how your organisation can apply pragmatism to IT security and do more with what you already have.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

Dell SecureWorks
51 - 75 of 140 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MANAGED SECURITY SERVICES DEFINITION (continued): … An MSSP (managed security service provider) is an Internet service provider (ISP) that provides an organization with some amount of network security management, which may include virus blocking, spam blocking, intrusion detection, firewalls, and virtual private network (VPN) management. An MSSP can also handle system changes, modifications, and upgrades. MSSPs have evolved in various ways. Some traditional ISPs, noting the increasing demand for Internet security that has occurred in recent years, have added managed security to their repertoires. A few security vendors have added Internet access, thus becoming MSSPs. Still other MSSPs have come into existence as brand new entities.An MSSP offers cost savings by allowing an organization to outsource its security functions. But some organizations are reluctant to give up complete control over the security of their systems. In addition, there may be considerable variability in competence among MSSPs.
Managed Security Services definition sponsored by SearchITChannel.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement