IT Services  >   IT Management Services  >  

Security Consulting

RSS Feed    Add to Google    Add to My Yahoo!
Security Consulting Reports
 
Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

IDC MarketScape Excerpt: Worldwide Managed Security Services 2014 Vendor Assessment
sponsored by IBM
WHITE PAPER: This important white paper answers those questions by evaluating IBM's MSSP offering on service capability across the MSS life cycle, revenue, and geographic presence.
Posted: 21 Jan 2015 | Published: 17 Jun 2014

IBM

Complete Look at the Managed Service Provider Market
sponsored by Webroot
WHITE PAPER: Download this exclusive white paper now to learn how MSPs are no longer reserved only for the big companies and get a complete look at the MSP market.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Webroot

July Essentials Guide on Cloud Computing
sponsored by SearchSecurity.com
EBOOK: This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.
Posted: 11 Jul 2012 | Published: 09 Jul 2012

SearchSecurity.com

Hosted, Outsourced, and Cloud Data Centers - Strategies and Considerations for Co-Location Tenants
sponsored by Siemon Company
WHITE PAPER: As more companies look towards collocation, hosted, and managed services for their primary data center, there are crucial considerations every IT pros should know when selecting a provider. This resource explores hosted, outsourced, and cloud data centers, and providers strategies and considerations for co-location tenants.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Siemon Company

Making Office 365 More Secure and Compliant
sponsored by Proofpoint, Inc.
WHITE PAPER: Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

Proofpoint, Inc.

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Tripwire, Inc.

Choosing and Managing Mobile Devices Chapter 2: Evaluating Mobile Device Management Products
sponsored by SearchConsumerization.com
EBOOK: This expert resource will help readers examine the capabilities of contemporary MDM products and their desirable features. Find out how these tools can help boost workplace performance as well as the limitations you should watch out for.
Posted: 22 Apr 2013 | Published: 22 Apr 2013


HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett-Packard Company

How Midsize Banks Can Overcome Escalating Security Threats
sponsored by IBM
WHITE PAPER: Like any business, midsize banks face increasing security challenges ranging from threats, compliance, changing business models and more. But what’s even more challenging is that they must address them with limited resources and expertise. In this paper, explore how to tackle security issues with a holistic, integrated approach.
Posted: 26 Apr 2012 | Published: 01 Jul 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement