IT Services  >   IT Management Services  >  

Security Management Services

RSS Feed    Add to Google    Add to My Yahoo!
Security Management Services Reports
 
Recovering the Workstation: Cloud-Based Backup and Recovery
sponsored by LogicNow
WHITE PAPER: This white paper introduces a fast and reliable, cloud-based, backup and recovery solution that can recover workstations in the event of a disaster. Read on to learn how this hybrid cloud solution can enable your enterprise to provide a comprehensive disaster recovery solution to your customers without incurring more fees and labor costs.
Posted: 16 Feb 2016 | Published: 31 Dec 2014

LogicNow

Pricing Data Protection in a Fixed Price World
sponsored by Intronis
WHITE PAPER: This e-book highlights best practices for packaging and re-selling fixed-price cloud data protection, focusing on 3 unique pricing models. Access now to see how fixed price data protection can enable your enterprise focus your attention on protecting your clients' data and building a more profitable IT services business.
Posted: 10 May 2016 | Published: 10 May 2016

Intronis

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Deliver Secure New Business Services
sponsored by CA Technologies.
WHITE PAPER: This informative guide explores how you can deliver secure business services and improve customer experience.
Posted: 23 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Hosted, Outsourced, and Cloud Data Centers - Strategies and Considerations for Co-Location Tenants
sponsored by Siemon Company
WHITE PAPER: As more companies look towards collocation, hosted, and managed services for their primary data center, there are crucial considerations every IT pros should know when selecting a provider. This resource explores hosted, outsourced, and cloud data centers, and providers strategies and considerations for co-location tenants.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Siemon Company

How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

Choosing and Managing Mobile Devices Chapter 2: Evaluating Mobile Device Management Products
sponsored by SearchMobileComputing
EBOOK: This expert resource will help readers examine the capabilities of contemporary MDM products and their desirable features. Find out how these tools can help boost workplace performance as well as the limitations you should watch out for.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchMobileComputing

Software Security Delivered in the Cloud
sponsored by Hewlett Packard Enterprise
PRODUCT OVERVIEW: HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

Hewlett Packard Enterprise

Strategies for Secure Virtual Desktop Infrastructure
sponsored by Citrix Systems, Inc.
WHITE PAPER: Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Citrix Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement