IT Services  >   IT Management Services  >  

MSS

RSS Feed   
MSS Reports
 
Privileged Access Management in the Modern Threatscape
sponsored by Centrify Corporation
WHITE PAPER: Privileged access remains the preferred vector for attackers, and most organizations aren't taking the very basic steps to secure it. Dive into this 2019 Centrify Privileged Access Management Survey to learn about their findings for securing the modern threatscape with zero trust privilege.
Posted: 04 Sep 2019 | Published: 19 Feb 2019

Centrify Corporation

MDR Buyer's Guide
sponsored by Arctic Wolf Networks, Inc.
EBOOK: Managed detection and response (MDR) is an increasingly popular approach that addresses security monitoring challenges, as it delivers real-time, 24/7 managed detection and response using a holistic, turnkey approach. Download this buyer's guide for key features you should look for in an MDR service.
Posted: 08 Aug 2019 | Published: 08 Aug 2019

Arctic Wolf Networks, Inc.

Disaster Recovery Testing: An MSP's Most Valuable Offering
sponsored by Unitrends
WHITE PAPER: How often should you test your customers' DR and what tools should you use? Download this paper to find out. By reading, you'll also glean 5 reasons to test you and your clients' DR more often, identify the different levels of testing, and debunk several excuses for not testing.
Posted: 30 Apr 2019 | Published: 31 Dec 2018

Unitrends

The Ultimate Guide to As-A-Service: Step-by-Step Advice for Empowering Your Business
sponsored by ConnectWise
EBOOK: This 9-chapter, 70-page e-book serves as your organization's complete guide to establishing as-a-service solutions to expand your service offering. The e-book can be accessed here, with detail information on managing cash flow, getting clients on board with new services, navigating cloud services, and more.
Posted: 24 Sep 2018 | Published: 24 Sep 2018

ConnectWise

Presentation Transcript: The Cybercrime War; When Are We Going to Win?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Will MSPs Answer the Call for Cybersecurity Services?
sponsored by SolarWinds, Inc.
EGUIDE: Many customers today are looking for security offerings from their service providers, but is this the right direction to take your business? Read this guide to learn what concerns providers must be able to address, and how you could begin to integrate security services into your enterprise.
Posted: 25 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Tripwire, Inc.

Devices-as-a-Service Potential Set to Expand for Channel Partners and Organizations
sponsored by CompuCom Systems, Inc.
EGUIDE: This expert guide serves as your window into the DaaS market—deconstructing the DaaS growth forecast, how to become a DaaS provider should you choose to do so, and how your company can make the most of mobile services. Read on for the details.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

CompuCom Systems, Inc.

Information Security Magazine September 2011—Reader’s Choice Awards
sponsored by Information Security Magazine
EZINE: Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Information Security Magazine

Strategies for Secure Virtual Desktop Infrastructure
sponsored by Citrix Systems, Inc.
WHITE PAPER: Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Citrix Systems, Inc.
 
Browse by Report Type:
MSS White Papers | MSS Multimedia | MSS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info