Outsourcing SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Outsourcing Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Outsourcing
 •   Technology Outsourcing
 •   Data Security
 •   Virtualization
 •   Data Center Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Enterprise Systems Management
 •   Enterprise Resource Planning (ERP)

Related Searches
 •   Format Outsourcing Secure
 •   Operate Outsourcing Secure
 •   Outsourcing Capacity
 •   Outsourcing Devices
 •   Outsourcing Risk
 •   Outsourcing Secure Demand
 •   Outsourcing Secure Graph
 •   Outsourcing Secure Trend
 •   Outsourcing Study
 •   Reviews Outsourcing Secure
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

The Impact of Technology on Cost in Business Process Outsourcing (BPO) by SAP America, Inc..
Gain insight into the true cost of business process outsourcing (BPO) beyond what is typically reflected in the BPO provider's service price (total contract value). Learn more...
>> Discover more offerings from SAP America, Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Presentation Transcript: Location Evaluation Factors for Offshore Outsourcing: The Promise and the Peril by Accenture

March 17, 2009 - (Free Research)
When it comes to offshore outsourcing, security and location decisions have become more important overtime. Read this presentation transcript from the webcast of the same name and discover best practices and security risks in offshore outsourcing. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SAP Outsourcing for Mid-Market Companies: A Comparison of Three Leading Providers by itelligence, Inc.

March 28, 2011 - (Free Research)
Running a business on SAP requires that the application be available 7x24, data be secure, and that the application can grow with an organization. The decision to select an outsourcer goes far beyond finding a data center. Read this paper and learn what questions to ask in order to select an outstanding SAP outsourcing provider. 
(WHITE PAPER) READ ABSTRACT |

Secure Internet Single Sign-On (SSO) 101 by Ping Identity Corporation

June 08, 2009 - (Free Research)
Written for anyone interested in understanding how secure Internet SSO works, this white paper explores the limitations of current SSO implementations outside of a single security domain (including identity and access management systems and open source development) and introduces standalone secure Internet SSO as a solution. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Internet Single Sign-On (SSO) by Ping Identity Corporation

June 05, 2009 - (Free Research)
This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on. 
(WHITE PAPER) READ ABSTRACT |

Harvey Nash CIO Survey 2012 by ComputerWeekly.com

May 14, 2012 - (Free Research)
CIOs are more confident of securing technology budget increases than at any time in the last five years, according to the CIO Technology Survey 2012. 
(IT BRIEFING) READ ABSTRACT |

Securely Outsourcing to the Cloud: Five Key Questions to Ask by CA Technologies.

July 31, 2012 - (Free Research)
This informative white paper outlines your security options when adopting cloud services. Discover how Identity and Access Management (IAM) can help you foster a secure cloud environment and learn how you can choose the right third-party outsourcer by clicking through to learn more. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Allied Solutions Moves IP Telephony System to CDW Data Center by CDW Corporation

September 01, 2009 - (Free Research)
As part of a larger outsourcing project, Allied Solutions decided to outsource their IP Telephony infrastructure to take advantage of the stability, security, and redundancy that a data center could offer. To achieve this goal, they turned to CDW’s Hosting and Managed Services solutions. 
(CASE STUDY) READ ABSTRACT |

Cut costs and time by outsourcing records management by Iron Mountain

March 06, 2012 - (Free Research)
Access this resource to learn how outsourcing your records management can help protect against costly breaches while reducing costs through fewer infrastructure needs, increased productivity, improved regulatory compliance, and more. 
(DATA SHEET) READ ABSTRACT |

Transform Your Desktop into a Virtual Workspace using Cisco VXI with VMware View - Presentation Transcript by VMware, Inc.

December 05, 2011 - (Free Research)
Read this resource to learn how Cisco and VMware are partnering to improve business process outsourcing, delivering a secure environment with a new virtual workspace that unifies virtual desktops, voice, and video. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Computer Weekly - 14 February 2012: Does government IT deliver value for money? by ComputerWeekly.com

February 14, 2012 - (Free Research)
This week’s Computer Weekly, investigates the costs of government IT, asking whether taxpayers are getting value for money from the 8,000 IT staff employed by Whitehall. We also examine how IT leaders are preparing for the growth of bring-your-own-device policies and the mobile security implications. 
(EZINE) READ ABSTRACT |

Computer Weekly 15 November 2011: Read this week's issue of the UK's leading technology publication, with all the latest news, analysis and opinion for IT managers by ComputerWeekly.com

November 11, 2011 - (Free Research)
In this week's Computer Weekly, we hear from Visa Europe CIO Steve Chambers on the technology behind the credit card transactions that retailers rely on. We examine the challenges facing the government's G-Cloud project; and we ask how Microsoft will cope when customers no longer want to purchase software licences. Download the new issue now. 
(EZINE)

Presentation Transcript: Strategies for Creating a Secure and Flexible Hybrid Cloud Environment by Layered Tech

April 12, 2010 - (Free Research)
This transcript of the "Strategies for Creating a Secure and Flexible Hybrid Cloud Environment" webcast explores the trend toward hybrid cloud computing. Gain insight into how it integrates the benefits of both virtualization and dedicated servers. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Five Truths About Enterprise Data Protection by PGP Corporation

December 22, 2008 - (Free Research)
How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy. 
(WHITE PAPER) READ ABSTRACT |

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market by Webroot

December 01, 2010 - (Free Research)
This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs. 
(WHITE PAPER) READ ABSTRACT |

Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets by Iron Mountain

December 20, 2013 - (Free Research)
Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met. 
(WHITE PAPER) READ ABSTRACT |

Open, Manage, and Accelerate SSL Encrypted Applications by BlueCoat

September 01, 2007 - (Free Research)
Enterprise users and their data have never been further apart. Business pressures that keep employees out of headquarters and close to customers and partners have met head-on with other drivers that are bringing far flung servers back to the datacenter. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly Buyers' Guide: Cloud Computing by SearchDataCenter.com

January 19, 2011 - (Free Research)
This seven-page Buyer’s Guide to Cloud Computing by Computer Weekly journalists details the kinds of cloud offering that CIOs and senior IT professionals will need to take into account as they plan future outsourcing, hosting and application strategies. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Change is Good: New Business Models for Converging Communications by Alcatel-Lucent

January 2008 - (Free Research)
Converged voice, data, and video communications must be designed to integrate with business processes. Read this paper that details how a tailored outsourcing solution is the answer. 
(ARTICLE) READ ABSTRACT |

9 Steps to Building a Business Case for B2B Integration by IBM

February 2011 - (Free Research)
Putting together a business case does not rank high on most IT executives’ list of favorite activities. But the ability to put together a compelling case is now more than ever a core competency. This paper explains how you can significantly increase your chances of approval if you follow the nine steps provided within. 
(WHITE PAPER) READ ABSTRACT |

Impact of Cloud on IT Consumption Models: Top 10 Insights by Cisco Systems, Inc.

November 2013 - (Free Research)
This whitepaper reviews the conclusions from a survey of IT leaders around the world. 
(WHITE PAPER) READ ABSTRACT |

Securing the Physical, Virtual, Cloud Continuum by Juniper Networks, Inc and Plan B Technologies, Inc

July 2010 - (Free Research)
Information security best practices remain largely the same as 15 years ago, based on a strong perimeter defense. However, virtualization and cloud computing are radically changing data center operations. Security and compliance controls need to extend across the physical, virtual, cloud continuum in order to adapt to this new infrastructure. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Health care, cloud storage providers and data ownership by Intel

February 2012 - (Free Research)
This E-Guide discusses the HIPAA requirements around patient’s access to his or her records as well as issues surrounding data ownership when health care data is stored in the cloud. 
(EGUIDE) READ ABSTRACT |

Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success by Dell and VMware

March 2011 - (Free Research)
Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications by Veracode, Inc.

May 2010 - (Free Research)
Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts