IT Services  >   xSP  >  

Security Services Providers

RSS Feed    Add to Google    Add to My Yahoo!
Security Services ProvidersReports
 
Sourcing and integrating managed services
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the issues business managers need to take into account when deciding how to deploy applications and when they should consider turning to managed service providers (MSP) for resources and advice.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

7 Steps to Next-Gen IT Managed Services
sponsored by LabTech Software
WHITE PAPER: Discover 7 top techniques for expanding your service offerings beyond the traditional MSP model to include next-gen services such as managed security, cloud services, mobile device management and more.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

LabTech Software

How Managed Endpoint Security Can Help Expand Your Managed Services Business
sponsored by N-able Technologies
WHITE PAPER: In this white paper, learn how utilizing a single integrated management platform for malware protection can help Managed Service Providers (MSPs) streamline and standardize their security efforts, and the many benefits of implementing managed endpoint security for MSPs and their customers.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

N-able Technologies

AlienVault and the MSSP Program Overview
sponsored by AlienVault
WEBCAST: Watch this web cast to get an inside scoop on all that MSSP has to offer.
Posted: 17 Jun 2014 | Premiered: Jun 17, 2014

AlienVault

IT Services: A Management model for CIOs
sponsored by CenterBeam
EGUIDE: This expert e-guide explains how IT services and managed service providers (MSPs) deliver strategic value to the organizations that use them, and offers tips for choosing the right MSP. Also inside, learn why savvy CIOs are flocking to cloud computing.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

CenterBeam

E-Guide: 6 Things Every New MSP Needs to Know about the Business
sponsored by Nimsoft, Inc.
EGUIDE: While many VARs, integrators and solution providers are offering “services,” there remains a substantial portion that either have only a small amount of revenue coming from managed services or no managed services practices at all. This guide will walk you through the 6 best practices you need to know about being a managed service provider.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Nimsoft, Inc.

Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection
sponsored by Panda Security
CASE STUDY: Read this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.
Posted: 03 Dec 2009 | Published: 20 Nov 2009

Panda Security

Information Security Magazine - December 2009 / January 2010: Basic Database Security
sponsored by Information Security Magazine
EZINE: This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Information Security Magazine

Next-Generation Managed Services: The Key to Business Transformation
sponsored by Alcatel-Lucent
WHITE PAPER: This paper will address various transformational managed services business model options such as Managed Infrastructure, Managed End to End Services Operations and Full Outsourcing (Virtual Telco), and how they help Communications Service Provider achieve not only cost transformation but also business transformation.
Posted: 19 Aug 2010 | Published: 19 Aug 2010

Alcatel-Lucent

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement