Outsourcing Data Protection SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Outsourcing Data Protection Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Business Process Outsourcing
 •   Enterprise Data Protection and Privacy
 •   Technology Outsourcing
 •   Data Center Management
 •   Virtualization
 •   Security Policies
 •   Managed Security Services
 •   Application Security
 •   Security Monitoring

Related Searches
 •   Application Of Outsourcing
 •   Import Outsourcing
 •   Industry Outsourcing
 •   Outsourcing Data Distribution
 •   Outsourcing Data Impact
 •   Outsourcing Data Protection Related
 •   Outsourcing Data Report
 •   Outsourcing Data Rfp
 •   Outsourcing Devices
 •   Resources Outsourcing Data Protection
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

The Impact of Technology on Cost in Business Process Outsourcing (BPO) by SAP America, Inc..
Gain insight into the true cost of business process outsourcing (BPO) beyond what is typically reflected in the BPO provider's service price (total contract value). Learn more...
>> Discover more offerings from SAP America, Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Securing the Physical, Virtual, Cloud Continuum by Juniper Networks, Inc and Plan B Technologies, Inc

July 26, 2010 - (Free Research)
Information security best practices remain largely the same as 15 years ago, based on a strong perimeter defense. However, virtualization and cloud computing are radically changing data center operations. Security and compliance controls need to extend across the physical, virtual, cloud continuum in order to adapt to this new infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Case Study - System One by Webroot

May 17, 2013 - (Free Research)
This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security. 
(CASE STUDY) READ ABSTRACT |

Securely Outsourcing to the Cloud: Five Key Questions to Ask by CA Technologies.

July 31, 2012 - (Free Research)
This informative white paper outlines your security options when adopting cloud services. Discover how Identity and Access Management (IAM) can help you foster a secure cloud environment and learn how you can choose the right third-party outsourcer by clicking through to learn more. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - April 2010: Endpoints on the Loose by Information Security Magazine

April 07, 2010 - (Free Research)
This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more. 
(EZINE)

Information Security Magazine - March 2013 by SearchSecurity.com

March 01, 2013 - (Free Research)
This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more. 
(EZINE) READ ABSTRACT |

Cloud Security Insights for IT Strategic Planning by Intel

April 25, 2012 - (Free Research)
Cloud computing offers many benefits, but it's hard to ignore the security challenges that this dynamic environment can introduce. To combat these risks, you need an effective cloud security strategy in place. This white paper reviews key findings from a survey of 200 IT pros that can help you maximize data protection in the cloud. 
(WHITE PAPER) READ ABSTRACT |

Curtail the rising cost of disaster recovery by SunGard Availability Services

January 18, 2012 - (Free Research)
Recovery in the cloud is offering businsses a cost-effective alternative to traditional disaster recovery options. Learn more about outsourcing disaster recovery to cloud, including what questions to consider. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 20 December 2011: Read this week’s issue, featuring: retail IT issues for Christmas; the cost of software failure; the founder of agile development by ComputerWeekly.com

December 20, 2011 - (Free Research)
In this week's issue of Computer Weekly, we look at the key technologies that retailers are turning to for IT-enabling customers' Christmas shopping. We examine research revealing the huge cost of application software that fails to meet requirements; and we talk to one of the pioneers of agile software development. Download the new issue now. 
(EZINE) READ ABSTRACT |

Cloud Security Insights for IT Strategic Planning by Intel

January 20, 2012 - (Free Research)
This white paper reviews the results from a survey of 200 IT professionals that can help you optimize your cloud’s security. Key findings suggest that security plays a foundational role in the decision to implement a private cloud, protecting platform and infrastructure resources are top concerns and security drives outsourcing decisions. 
(WHITE PAPER) READ ABSTRACT |

Disaster Recovery and the Cloud: Are you prepared? by Symmetry Corporation (E-mail this company)

October 17, 2011 - (Free Research)
Check out this E-Guide for key considerations when drawing up a DR plan and to learn how the cloud can work into such a strategy. You'll also learn what types of organizations can most benefit from DR in the cloud. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Five Truths About Enterprise Data Protection by PGP Corporation

December 22, 2008 - (Free Research)
How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards by ComputerWeekly.com

December 02, 2011 - (Free Research)
In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now. 
(EZINE)

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market by Webroot

December 01, 2010 - (Free Research)
This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs. 
(WHITE PAPER) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Presentation Transcript: Location Evaluation Factors for Offshore Outsourcing: The Promise and the Peril by Accenture

March 17, 2009 - (Free Research)
When it comes to offshore outsourcing, security and location decisions have become more important overtime. Read this presentation transcript from the webcast of the same name and discover best practices and security risks in offshore outsourcing. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Global Sourcing Trends in 2012 by ComputerWeekly.com

March 05, 2012 - (Free Research)
The latest IT outsourcing trends from global law firm Morrison & Foerster. 
(IT BRIEFING) READ ABSTRACT |

Computer Weekly - 13 December 2011: Read this week’s special issue announcing the UKtech50 – the 50 most influential people in UK IT. by ComputerWeekly.com

December 09, 2011 - (Free Research)
In this week's special issue of Computer Weekly, we reveal the UKtech50 - our list of the 50 most influential people in UK IT. This year's winner is Mike Lynch, CEO of Autonomy, who talks in an exclusive interview about his hopes for the UK technology industry, and life at HP since the company's 7bn GBP acquisition. Download the new issue now. 
(EZINE) READ ABSTRACT |

Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success by Dell and VMware

March 10, 2011 - (Free Research)
Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security. 
(WHITE PAPER) READ ABSTRACT |

FAQ: Building a DR site vs. outsourcing disaster recovery by SearchStorage.com

April 15, 2013 - (Free Research)
Access this E-Guide to learn more about the thought that should go into making this decision. Read on to discover more about the importance of a good DR plan and learn: pros and cons of custom-built DR sites vs. outsourced DR, differences between hot sites, cold sites and warm sites, considerationswhen developing your own site and more. 
(EGUIDE) READ ABSTRACT |

Gamania Group tightens security to strengthen game development capability by Hewlett-Packard Company

October 31, 2012 - (Free Research)
Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward. 
(WHITE PAPER) READ ABSTRACT |

Data Protection for businesses with remote offices across multiple locations by HP & Intel®

November 09, 2010 - (Free Research)
This white paper drills deeper into challenges and the considerations for a better way to approach data protection. It also explains how the HP data protection portfolio can help businesses overcome their data protection challenges, and drive better business outcomes. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Building a better data backup plan: This year’s hottest backup trends by Zenith Infotech

March 16, 2011 - (Free Research)
To help you build the best backup plan for the new year, read this special report by featured writer Carol Sliwa on the hottest backup trends. Learn about what's new in backup software, backup hardware and backup outsourcing. 
(EGUIDE) READ ABSTRACT |

WEALTH MANAGER'S TAKE ON OUTSOURCING by Wipro Technologies

February 27, 2008 - (Free Research)
Wealth managers can ensure success of outsourcing relationships by ensuring a stringent service provider selection program based on service providers' processes, quality standards, cost efficiency and knowledge. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

Presentation Transcript: Don't Be Left Out of the Cloud: How to Sell Enterprise-Quality Cloud  Services and Data Protection to SMBs by KineticD

August 24, 2010 - (Free Research)
Read this expert transcript to learn why SMBs are adopting cloud services more rapidly than large enterprises and what challenges your clients face in protecting their business critical data in an increasingly mobile world. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts