IT Services  >   IT Management Services  >  

Security Management Services

RSS Feed    Add to Google    Add to My Yahoo!
Security Management Services Reports
 
Targeted attacks and how to defend against them
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

3 Reasons to Move to a Managed Security Service Provider
sponsored by MASERGY
MICROSITE: The cyberthreat landscape is growing with every technological advance. Learn how managed security service providers (MSSPs) can help bring the manpower to your constrained IT department by bringing new innovative services and approaches.
Posted: 27 May 2016 | Published: 17 Jun 2015

MASERGY

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Tripwire, Inc.

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

WGBH: WGBH Increases Security By '300 percent' with Perimeter as a Partner
sponsored by Perimeter eSecurity
CASE STUDY: Public broadcaster, WGBH, needed new security measures to be put in place so that compliance requirements could be met. View this case study to learn how Perimeter's technology, people, and experience inspired greater confidence in their decision to choose Perimeter.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity

WAN Optimization Made Easy
sponsored by Circadence
WHITE PAPER: Learn the challenges that come with WAN optimization and discover how to choose cost-effective and secure solutions.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

Circadence

Minimize your financial institution’s risk with solutions from IBM
sponsored by IBM
WHITE PAPER: Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

IBM

The Cloud Is Changing Everything: It’s Not Just for Scaling Your Business, But Protecting It Too
sponsored by Intel Security
WHITE PAPER: New technologies like the cloud come with both risks and rewards. But while many question the potential security risks, they fail to realize that the cloud isn’t just good for scaling a business’s computer power, it’s also a highly efficient way to scale security and protection. View this brief to explore the benefits of security from the cloud.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Intel Security

HP Enterprise Security
sponsored by HP Enterprise Security.
BROCHURE: View this resource to explore how HP Enterprise Security can uniquely deliver the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.

Expert guide to understanding SaaS and cloud computing issues
sponsored by Veracode, Inc.
EGUIDE: This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement