IT Services  >   IT Management Services  >  

Security Assessment Services

RSS Feed    Add to Google    Add to My Yahoo!
Security Assessment Services Reports
 
MicroScope January 2014: A special issue looking at software defined networking
sponsored by SearchSecurity.com
EZINE: The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
Posted: 15 Jan 2014 | Published: 16 Jan 2014

SearchSecurity.com

Why Patch Management Matters
sponsored by Solarwinds N-able
WHITE PAPER: This white paper explains why an effective MSP needs to offer patch management services and suggests best practices for doing so.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

Solarwinds N-able

An advanced and integrated approach to managed enterprise network security
sponsored by ComputerWeekly.com
ANALYST BRIEF: Many businesses are turning to managed security services as a means of addressing the difficulty associated with deploying and managing multiple-point security systems, according to this report from Frost & Sullivan.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

ComputerWeekly.com

The Ultimate Guide to Selling Cloud Backup
sponsored by Intronis
WHITE PAPER: This e-book outlines steps for guidance and best practices for providing cloud backup as a service. Access now to learn how to lay the foundation for a cloud backup service, how to overcome common security and cost challenges, and how to develop a top sales team that will sell your cloud backup effectively.
Posted: 10 May 2016 | Published: 31 Dec 2013

Intronis

5 Ways Great MSP's Automate Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper can give you essential insight into achieving efficiency in your MSP business by outlining the five services that the most successful MSPs automate.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Solarwinds N-able

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

HP Enterprise Security
sponsored by HP Enterprise Security.
BROCHURE: View this resource to explore how HP Enterprise Security can uniquely deliver the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.

November Information Security Magazine
sponsored by SearchSecurity.com
EZINE: Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change.
Posted: 31 Oct 2013 | Published: 31 Oct 2013

SearchSecurity.com

Strategies for Secure Virtual Desktop Infrastructure
sponsored by Citrix Systems, Inc.
WHITE PAPER: Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Citrix Systems, Inc.

The Business Case for Managed DDos Protection
sponsored by Neustar®
WHITE PAPER: This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.
Posted: 18 Nov 2011 | Published: 17 Nov 2011

Neustar®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement