IT Services  >   IT Management Services  >  

Security Assessment Services

RSS Feed    Add to Google    Add to My Yahoo!
Security Assessment ServicesReports
 
Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

SlideShare, A Hosting Partner Success Story
sponsored by IBM
CASE STUDY: In this brief case study, find out how SlideShare turned to a new, cost-effective hosting partner that leveraged automated services and infrastructure to achieve optimal performance and consistent support.
Posted: 15 Apr 2014 | Published: 31 Dec 2011

IBM

Evolving Your IT Services Offering in a Modern Mobile World
sponsored by LabTech Software
WHITE PAPER: This resource breaks down the BYOD risk and outlines the benefits of implementing mobile device management services in your provider business. Gain advice for selling these offerings to your clients to support their mobile demands.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

LabTech Software

Balancing Risk and Innovation with Sourcing Alternatives: Helping IT managers and CIOs raise the ROI of IT
sponsored by IBM
WHITE PAPER: This paper explains how clients can balance risk and innovation through the use of services from IBM.
Posted: 20 May 2011 | Published: 01 Dec 2010

IBM

Worldwide and U.S. Security Services Threat Intelligence 2011–2014 Forecast: Out of the Basement and into the Clouds
sponsored by Vigilant
ANALYST REPORT: With threats becoming more advanced, organizations need new innovative ways to defend against them. View this excerpt from IDC Market Analysis to explore security services threat intelligence market including its current state, how the technology works, key benefits and competitive overview.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

Vigilant

E-Guide: IT Security and Defence Strategies
sponsored by Kaseya International Limited
EGUIDE: With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Kaseya International Limited

Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 15 May 2013 | Published: 15 May 2013

Webroot

Making Office 365 More Secure and Compliant
sponsored by Proofpoint, Inc.
WHITE PAPER: Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

Proofpoint, Inc.

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

Hosted, Outsourced, and Cloud Data Centers - Strategies and Considerations for Co-Location Tenants
sponsored by Siemon Company
WHITE PAPER: As more companies look towards collocation, hosted, and managed services for their primary data center, there are crucial considerations every IT pros should know when selecting a provider. This resource explores hosted, outsourced, and cloud data centers, and providers strategies and considerations for co-location tenants.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Siemon Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement