IT Services  >   IT Management Services  >  

Security Outsourcing

RSS Feed    Add to Google    Add to My Yahoo!
Security Outsourcing Reports
 
Maintaining security in managed services
sponsored by SearchSecurity.com
EGUIDE: Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model.
Posted: 06 Dec 2011 | Published: 05 Dec 2011

SearchSecurity.com

Taking the Next Step: How to Achieve Breakthrough Success in the IT Managed Services Business
sponsored by Kaseya
WHITE PAPER: The drive to build a company from the ground up and offer a competitive product or service that fulfills a need is a powerful pull. Owners of IT service provider businesses are no different. Check out this white paper to learn more.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

Kaseya

Expert guide to understanding SaaS and cloud computing issues
sponsored by Veracode, Inc.
EGUIDE: This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Veracode, Inc.

Balancing Risk and Innovation with Sourcing Alternatives: Helping IT managers and CIOs raise the ROI of IT
sponsored by IBM
WHITE PAPER: This paper explains how clients can balance risk and innovation through the use of services from IBM.
Posted: 20 May 2011 | Published: 01 Dec 2010

IBM

November Information Security Magazine
sponsored by SearchSecurity.com
EZINE: Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change.
Posted: 31 Oct 2013 | Published: 31 Oct 2013

SearchSecurity.com

Presentation Transcript: The Cybercrime War; When Are We Going to Win?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Presentation Transcript: Customer Experience Focused Transformation
sponsored by Alcatel-Lucent
PRESENTATION TRANSCRIPT: This presentation transcript discusses Telecom Service Provider Transformations as well as business strategies and models to improve quality of experience, including customer experience management planning and the role-managed services can play in this transformation.
Posted: 14 Apr 2011 | Published: 14 Apr 2011

Alcatel-Lucent

451 Group Research Report: Intel-McAfee links up identity-in-the-cloud SSO with salesforce.com
sponsored by Intel
WHITE PAPER: Industry analyst Steve Coplan of The 451 Group takes a close look at the recent beta release of Intel Cloud SSO and places it in the context of the rapidly evolving cloud service broker market for mediating user ids and application APIs for cloud access. View now to learn more.
Posted: 02 Apr 2012 | Published: 02 Mar 2012

Intel

Keep Your Enemies Closer - Get Proactive about Security
sponsored by AT&T Corp
WEBCAST: Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 15 May 2013 | Published: 15 May 2013

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement