IT Services  >   IT Management Services  >  

Security Management Services

RSS Feed    Add to Google    Add to My Yahoo!
Security Management Services Reports
 
Five Reasons to Adopt an MSSP
sponsored by MASERGY
WHITE PAPER: Security breaches cost an average of $3.4 million per incident. This cost, coupled with the number of breaches that occurring in the past few years, is reason enough to seriously invest in managed security service providers (MSSPs). Discover the top five reasons why an MSSP is right for your business.
Posted: 27 May 2016 | Published: 11 May 2016

MASERGY

Maintaining security in managed services
sponsored by SearchSecurity.com
EGUIDE: Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model.
Posted: 06 Dec 2011 | Published: 05 Dec 2011

SearchSecurity.com

Plugging the Security Gaps of Cloud File Sharing Services
sponsored by Imperva
WHITE PAPER: This paper examines seven items to consider when it comes to security and compliance of cloud file sharing services and how you can mitigate the risks with a Cloud Access Security Broker (CASB) solution.
Posted: 14 Mar 2016 | Published: 17 Feb 2016

Imperva

European Channel MPS Priorities
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom examine MPS adoption amongst resellers in Europe, based on original Quocirca research, and discusses the challenges faced as they embark on their MPS journey.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

5 Ways Great MSP's Automate Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper can give you essential insight into achieving efficiency in your MSP business by outlining the five services that the most successful MSPs automate.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Solarwinds N-able

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett Packard Enterprise
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett Packard Enterprise

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner
sponsored by Perimeter eSecurity
CASE STUDY: Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity

E-Guide: Striving for Better Information Security Intelligence
sponsored by Tripwire, Inc.
EGUIDE: The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.

E-Guide: IT Security and Defence Strategies
sponsored by Kaseya International Limited
EGUIDE: With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Kaseya International Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement