IT Services  >   IT Management Services  >  

Security Management Services

RSS Feed    Add to Google    Add to My Yahoo!
Security Management ServicesReports
 
What Does the Future Hold for Managed File Transfer?
sponsored by IBM
WEBCAST: This webcast investigates the future of managed file transfer due to the evolving digital universe.
Posted: 15 Aug 2014 | Premiered: Aug 15, 2014

IBM

MicroScope August 2014: An issue covering changes in the unified communications market
sponsored by MicroScope
EZINE: An issue highlighting the opportunities in the UC market as well as the ways resellers are adapting to the growth in cloud computing.
Posted: 20 Aug 2014 | Published: 14 Aug 2014

MicroScope

Six steps to effective reputational and IT Risk Management
sponsored by IBM
WHITE PAPER: This resource highlights 6 tips to effectively manage reputational and IT risk in order to protect and enhance brand value and competitive standing.
Posted: 25 Aug 2014 | Published: 30 Sep 2013

IBM

November Information Security Magazine
sponsored by SearchSecurity.com
EZINE: Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change.
Posted: 31 Oct 2013 | Published: 31 Oct 2013

SearchSecurity.com

TELUS leverages HP ArcSight and TippingPoint
sponsored by Hewlett-Packard Company
CASE STUDY: This informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.
Posted: 29 May 2014 | Published: 30 Sep 2013

Hewlett-Packard Company

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner
sponsored by Perimeter eSecurity
CASE STUDY: Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity

HP ArcSight Express 3.0
sponsored by HP Enterprise Security.
WHITE PAPER: View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

Webroot

Cisco Cloud Security Accelerates Cloud Adoption
sponsored by Cisco Systems, Inc.
WHITE PAPER: Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Cisco Systems, Inc.

How Midsize Banks Can Overcome Escalating Security Threats
sponsored by IBM
WHITE PAPER: Like any business, midsize banks face increasing security challenges ranging from threats, compliance, changing business models and more. But what’s even more challenging is that they must address them with limited resources and expertise. In this paper, explore how to tackle security issues with a holistic, integrated approach.
Posted: 26 Apr 2012 | Published: 01 Jul 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement