Managed Security ServicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsManaged Security Services  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 469 | Next Page

Protecting Your Enterprise Network by Infoblox

August 30, 2013 - (Free Research)
This comprehensive white paper provides deeper insight into enterprise IT security threats and the implementation of modern tools that are available to build more robust domain name server (DNS) infrastructures, including DNS firewalls to close security gaps. 
(WHITE PAPER) READ ABSTRACT |

CW Special Report on IBM by ComputerWeekly.com

August 15, 2014 - (Free Research)
This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy.. 
(IT BRIEFING) READ ABSTRACT |

The hidden costs of self-signed SSL certificates by Symantec Corporation

December 31, 2012 - (Free Research)
This exclusive white paper explores the true TCO for self-signed SSL certificate, including a side-by-side comparison of a self-signed architecture verses working with a third party SSL vendor. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Self-Signed SSL Certificates by Symantec Corporation

May 09, 2012 - (Free Research)
Many IT professionals believe that self-signed SSL certificates can help lower security costs. Unfortunately, aside from the certificate itself, there are a number of other costs. This paper uncovers the true total cost of ownership for self-signed SSL certificates and why they are costlier and riskier than working with a trusted security vendor. 
(WHITE PAPER) READ ABSTRACT |

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown by Dell Software

November 15, 2012 - (Free Research)
Learn how to get ahead of mobile security threats and develop a pragmatic strategy to protect data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise. 
(WHITE PAPER) READ ABSTRACT |

Strategies for Secure Virtual Desktop Infrastructure by Citrix Systems, Inc. (E-mail this company)

October 17, 2013 - (Free Research)
Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI. 
(WHITE PAPER) READ ABSTRACT |

Taking Your Enterprise Mobile: The Executive Checklist by Citrix Systems, Inc. (E-mail this company)

February 26, 2013 - (Free Research)
Businesses can't afford not to make mobile governance and security a top priority. Read this mobility whitepaper to learn the critical facts about mobile security and management, and what you can do to keep your organization secure. 
(WHITE PAPER) READ ABSTRACT |

Threat prevention techniques: How to build a strong network by SearchSecurity.com

October 18, 2012 - (Free Research)
Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now. 
(EGUIDE) READ ABSTRACT |

Securely Outsourcing to the Cloud: Five Key Questions to Ask by CA Technologies.

July 31, 2012 - (Free Research)
This informative white paper outlines your security options when adopting cloud services. Discover how Identity and Access Management (IAM) can help you foster a secure cloud environment and learn how you can choose the right third-party outsourcer by clicking through to learn more. 
(WHITE PAPER) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 07, 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Protection Small Business Edition by Symantec Corporation

September 05, 2012 - (Free Research)
Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses. 
(VIDEO) READ ABSTRACT |

Symantec Endpoint Protection Small Business Edition 12 by Symantec Corporation

May 26, 2011 - (Free Research)
Symantec Endpoint Protection Small Business Edition 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats. 
(DOWNLOAD) READ ABSTRACT |

Unified Content Security in Practice by Websense, Inc.

May 03, 2011 - (Free Research)
Unified Content Security is a new sescurity solution, but it is an effective one. With this solutions your business is able to combine web security, email security, and data loss prevention. 
(WHITE PAPER) READ ABSTRACT |

Bailing Out Your Budget: How Websense Lowers Your TCO by Websense, Inc.

December 01, 2010 - (Free Research)
The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership. 
(WHITE PAPER) READ ABSTRACT |

WebPulse Collaborative Defense by BlueCoat

November 04, 2011 - (Free Research)
Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide. 
(WHITE PAPER) READ ABSTRACT |

Avocent Accelerates Critical Applications over WAN While Ensuring Distributed Web Security at Branch Offices by BlueCoat

September 19, 2011 - (Free Research)
IT infrastructure management solutions provider, Avocent Corporation, needed to accomplish two critical tasks: Improve performance of key business applications and provide decentralized Web security and control for their branch offices. View this case study to learn how they were able to meet both needs with just one solution. 
(CASE STUDY) READ ABSTRACT |

Application Delivery Networks: The New Imperative for IT Visibility, Acceleration and Security by BlueCoat

September 14, 2010 - (Free Research)
Your business depends on one thing: getting the right information to the right people at the right time. To gain a competitive advantage, improve customer service and access more business intelligence, you have to ensure fast and responsive application delivery to users wherever they are. 
(WHITE PAPER) READ ABSTRACT |

InterMapper Network Monitoring Keeps Detroit Radio Stations on the Air by InterMapper

April 05, 2011 - (Free Research)
When Greater Media Detroit’s three radio stations encountered several hard to find and difficult to understand network problems, they turned to InterMapper to track the issues down. Read their story here. 
(CASE STUDY) READ ABSTRACT |

The MSP Report Advantage by N-able Technologies

December 06, 2012 - (Free Research)
Discover why professional, standardized reports have emerged as a key success factor for many MSPs and IT services providers, helping prove relevance and demonstrate the value of service delivered to their clients. View now to learn how such reporting can help you gain the title of "Trusted Advisor." 
(WHITE PAPER) READ ABSTRACT |

IBM zSecure Compliance and Administration by IBM

March 11, 2013 - (Free Research)
View this webcast to learn how you can improve collaboration with your employees and business data. Find out the key to keeping up with today's fast-paced culture and how you can ensure your data is protected no matter where your employees access the information. 
(WEBCAST) READ ABSTRACT |

Get actionable insight with security intelligence for mainframe environments by IBM

March 08, 2013 - (Free Research)
View this white paper to learn more about the importance of alerts with enterprise security. Find out how you can deliver integrated threat analysis, real-time alerts, and audit consolidation to manage today's growing threats. This resource discusses how you can enhance security without increasing overhead. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Intelligence: Transforming Enterprise Security by IBM

March 08, 2013 - (Free Research)
Consult this white paper to learn more about how the concepts of business IT are transforming. It describes the nature of identity and access intelligence and the factors that are behind this new and emerging aspect of security evolution. 
(WHITE PAPER) READ ABSTRACT |

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business by IBM

March 11, 2013 - (Free Research)
View this webcast to find out how you can create effective application security in the enterprise. Learn more about eliminating some of the most prevalent threats to your businesses by tuning in to this video now. 
(WEBCAST) READ ABSTRACT |

Introducing IBM's Advanced Threat Protection Platform: IBM's Extensible Approach to Threat Prevention by IBM

March 07, 2013 - (Free Research)
Watch this webcast to find out about solutions that are helping clients stay more secure and adapt successfully to today's threat landscape. Topics covered include the challenging state of network security, evolving attack vectors, advanced threat protection, and more. 
(WEBCAST) READ ABSTRACT |

PCI in the cloud: Compliance guide by SearchSecurity.com

April 26, 2012 - (Free Research)
Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 469 | Next Page

> Explore alternative searches for: Managed Security Services

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts