IT Services  >   IT Management Services  >  

Security Assessment Services

RSS Feed    Add to Google    Add to My Yahoo!
Security Assessment ServicesReports
 
AlienVault and the MSSP Program Overview
sponsored by AlienVault
WEBCAST: Watch this webcast to get an inside scoop on all that MSSP has to offer.
Posted: 17 Jun 2014 | Premiered: Jun 17, 2014

AlienVault

TELUS leverages HP ArcSight and TippingPoint
sponsored by Hewlett-Packard Company
CASE STUDY: This informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.
Posted: 29 May 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

Maintaining security in managed services
sponsored by SearchSecurity.com
EGUIDE: Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model.
Posted: 06 Dec 2011 | Published: 05 Dec 2011

SearchSecurity.com

Deliver Secure New Business Services
sponsored by CA Technologies.
WHITE PAPER: This informative guide explores how you can deliver secure business services and improve customer experience.
Posted: 23 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Recovery Performance-Based Pricing: An Innovation to Drive Business Growth
sponsored by Asigra
WHITE PAPER: This whitepaper explores how service providers offer data protection in the marketplace and how they can adapt to data growth, BYOD and mobile workforces.
Posted: 22 Apr 2014 | Published: 31 Dec 2013

Asigra

Antivirus Alternatives: Evolving Enterprise Endpoint Security Strategy
sponsored by N-able Technologies
EGUIDE: In this e-Guide, security expert Matt Pascucci introduces an innovative strategy to fight malware that looks beyond antivirus systems, exploring alternative security measures at the cloud, network, and endpoint layers.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

N-able Technologies

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

Webroot

Simplify Your Relationship with Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: View this paper to explore the key reasons why managing endpoint security is complex, why a hosted endpoint solution can ease this complexity, to uncover Symantec Endpoint Protection.cloud and more.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Symantec Corporation

Presentation Transcript: Customer Experience Focused Transformation
sponsored by Alcatel-Lucent
PRESENTATION TRANSCRIPT: This presentation transcript discusses Telecom Service Provider Transformations as well as business strategies and models to improve quality of experience, including customer experience management planning and the role-managed services can play in this transformation.
Posted: 14 Apr 2011 | Published: 14 Apr 2011

Alcatel-Lucent

Demonstrating HIPAA Security Rule Compliance
sponsored by Q1 Labs, an IBM Company
WHITE PAPER: View this paper to learn about the key elements of the HIPAA Security Rule including administrative, technical and, physical safeguards. In addition, explore how new advanced technology, QRadar, can help covered entities ease the burden of these rules and meet compliance.
Posted: 15 Aug 2011 | Published: 08 Aug 2011

Q1 Labs, an IBM Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement