IT Services  >   IT Management Services  >  

Security Consulting

RSS Feed    Add to Google    Add to My Yahoo!
Security ConsultingReports
 
Exploring cloud Security as a Service options
sponsored by SearchSecurity.com
EGUIDE: There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012

SearchSecurity.com

Moving to the Cloud? How A Managed Services Provider Can Help
sponsored by Rackspace
WHITE PAPER: Access this expert resource to learn how a managed services provider can help you on your move to the cloud. You'll get insight into how managed service providers can help you with product selection, scalability, and shifting workloads to the cloud as well as ensuring cloud security.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

Rackspace

IaaS Success Story: SlideShare achieves a stable hosted infrastructure, consistent system performance, and reliable support
sponsored by IBM
CASE STUDY: In this brief case study, find out how SlideShare turned to a new, cost-effective hosting partner that leveraged automated services and infrastructure to achieve optimal performance and consistent support.
Posted: 15 Apr 2014 | Published: 31 Dec 2011

IBM

Evolving Your IT Services Offering in a Modern Mobile World
sponsored by LabTech Software
EBOOK: This article breaks down the BYOD risk and outlines the benefits of implementing mobile device management services in your IT service provider business. Gain advice for selling these offerings to your clients to support their mobile demands.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

LabTech Software

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

E-Guide: IT Security and Defence Strategies
sponsored by Kaseya International Limited
EGUIDE: With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Kaseya International Limited

The Financial Benefit of Cisco’s Elastic Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Cisco Systems, Inc.

The Cloud Is Changing Everything: It’s Not Just for Scaling Your Business, But Protecting It Too
sponsored by McAfee, Inc.
WHITE PAPER: New technologies like the cloud come with both risks and rewards. But while many question the potential security risks, they fail to realize that the cloud isn’t just good for scaling a business’s computer power, it’s also a highly efficient way to scale security and protection. View this brief to explore the benefits of security from the cloud.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

McAfee, Inc.

Cloud Endpoint Security: Considerations for Cloud Security Services
sponsored by Symantec Corporation
EGUIDE: This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Symantec Corporation

Demonstrating HIPAA Security Rule Compliance
sponsored by Q1 Labs, an IBM Company
WHITE PAPER: View this paper to learn about the key elements of the HIPAA Security Rule including administrative, technical and, physical safeguards. In addition, explore how new advanced technology, QRadar, can help covered entities ease the burden of these rules and meet compliance.
Posted: 15 Aug 2011 | Published: 08 Aug 2011

Q1 Labs, an IBM Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement