Outsourcing Security SupplierWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Outsourcing Security Supplier returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Outsourcing
 •   Technology Outsourcing
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Data Security
 •   Network Security
 •   Application Security
 •   Managed Security Services
 •   Testing and Analysis
 •   Data Center Management
 •   Content Delivery Networks/ Web Application Acceleration

Related Searches
 •   Fact Outsourcing Security Supplier
 •   Import Outsourcing
 •   Improving Outsourcing
 •   Multi Outsourcing
 •   Outsourcing Notes
 •   Outsourcing On-Line
 •   Outsourcing Security Proposals
 •   Outsourcing Security Supplier Vendors
Advertisement

ALL RESULTS
1 - 25 of 460 | Next Page

Featured Sponsors

The Impact of Technology on Cost in Business Process Outsourcing (BPO) by SAP America, Inc..
Gain insight into the true cost of business process outsourcing (BPO) beyond what is typically reflected in the BPO provider's service price (total contract value). Learn more...
>> Discover more offerings from SAP America, Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Information Security Magazine - March 2013 by SearchSecurity.com

March 01, 2013 - (Free Research)
This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more. 
(EZINE) READ ABSTRACT |

IBM POV: Security & Cloud Computing by IBM

November 02, 2009 - (Free Research)
Read this paper from IBM to see how cloud computing may present an added level of risk because essential services are often outsourced to a third party. Discover how the IBM Security Framework can help you address these key security challenges. 
(WHITE PAPER) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Location Evaluation Factors for Offshore Outsourcing: The Promise and the Peril by Accenture

March 17, 2009 - (Free Research)
When it comes to offshore outsourcing, security and location decisions have become more important overtime. Read this presentation transcript from the webcast of the same name and discover best practices and security risks in offshore outsourcing. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How to Extend your Identity Management Systems to use OAuth by Forum Systems

April 03, 2014 - (Free Research)
Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

Global Sourcing Trends in 2012 by ComputerWeekly.com

March 05, 2012 - (Free Research)
The latest IT outsourcing trends from global law firm Morrison & Foerster. 
(IT BRIEFING) READ ABSTRACT |

SearchCIO.com eBook: Unlock Outsourcing Potential and Change by SearchCIO.com

May 04, 2009 - (Free Research)
The key to unlocking outsourcing potential lies in targeting the right projects, choosing your suppliers wisely and then managing them with an eye on economic conditions at that global site. Here's a step-by-step plan for optimizing savings. 
(EBOOK) READ ABSTRACT |

WEALTH MANAGER'S TAKE ON OUTSOURCING by Wipro Technologies

February 27, 2008 - (Free Research)
Wealth managers can ensure success of outsourcing relationships by ensuring a stringent service provider selection program based on service providers' processes, quality standards, cost efficiency and knowledge. 
(WHITE PAPER) READ ABSTRACT |

Special Report on Steria by ComputerWeekly.com

September 14, 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on Steria, its strategy, products and services and reviews its financial performance. 
(WHITE PAPER) READ ABSTRACT |

Supplier Management: Five Simple Things Your Organization Can Do to Improve Supplier Performance by Global Knowledge

January 29, 2013 - (Free Research)
If you purchase goods and services from third parties to support your business processes, developing a solid supplier management strategy is crucial to your success. Access this paper to learn 7 features that make up an effective policy, how to use the ITIL to help during your program's creation, and much more. 
(WHITE PAPER) READ ABSTRACT |

IT Services Purchase Intentions 2013 by ComputerWeekly.com

January 24, 2013 - (Free Research)
This survey of over 130 European IT professionals from Computer Weekly and TechTarget examines company's buying plans for IT services in 2013. 
(ESSENTIAL GUIDE) READ ABSTRACT |

CW+: PA Consulting: Customer-supplier relationships in the cloud by ComputerWeekly.com

August 05, 2010 - (Free Research)
Organisations need to start getting to grips with imminent changes to the supplier landscape; that way, they will be ready to move if and when the time is right. 
(WHITE PAPER) READ ABSTRACT |

Accelerating Return on Investment through B2B Outsourcing by Crossgate

February 18, 2010 - (Free Research)
In the past, companies relied on software, developers, and consultants to adapt internal technology to fit their business. By outsourcing B2B to integrate suppliers and operations, companies can reduce ongoing infrastructure costs, reduce the amount of staff required to perform daily tasks, and most importantly, create organizational agility. 
(WHITE PAPER) READ ABSTRACT |

Service excellence and Managed Print Services by ComputerWeekly.com

September 27, 2012 - (Free Research)
First class service and support is essential in a managed print service, say analysts Louella Fernandes and Clive Longbottom. 
(ANALYST REPORT) READ ABSTRACT |

Computer Weekly - 28 February 2012: Taking UK government into the cloud by ComputerWeekly.com

February 28, 2012 - (Free Research)
This week's edition asks, now that the the G-Cloud store is up and running, will the government's cloudstore transform the market for public sector IT buyers and suppliers? It also examines research that has indicated OS upgrades will attract a significant chunk of investment this year. 
(EZINE)

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards by ComputerWeekly.com

December 02, 2011 - (Free Research)
In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now. 
(EZINE)

Computer Weekly – 19 February 2013: Software Developers in demand by ComputerWeekly.com

February 19, 2013 - (Free Research)
In this week's Computer Weekly, we look at why companies are struggling to attract the right talent for in-house IT. We investigate why CIOs are not happy with Oracle's Fusion strategy. And betting company William Hill tells us how mobile technology has changed the high street bookmaker. Read the issue now. 
(EZINE) READ ABSTRACT |

UK Service Provider Performance and Satisfaction 2012 by ComputerWeekly.com

September 14, 2012 - (Free Research)
This exclusive report from KPMG assesses UK organisations' satisfaction with their outsourcing service providers and looks at outsourcing trends in 2012. 
(IT BRIEFING) READ ABSTRACT |

Computer Weekly - 13 December 2011: Read this week’s special issue announcing the UKtech50 – the 50 most influential people in UK IT. by ComputerWeekly.com

December 09, 2011 - (Free Research)
In this week's special issue of Computer Weekly, we reveal the UKtech50 - our list of the 50 most influential people in UK IT. This year's winner is Mike Lynch, CEO of Autonomy, who talks in an exclusive interview about his hopes for the UK technology industry, and life at HP since the company's 7bn GBP acquisition. Download the new issue now. 
(EZINE) READ ABSTRACT |

CW+: 500 Club case study: The Royal Mail approach to supplier relationship management by ComputerWeekly.com

December 21, 2010 - (Free Research)
Your IT department and your suppliers are at loggerheads. There is a culture of one-upmanship and awkwardness on both sides. It’s not quite war, but its getting there. What do you do? 
(WHITE PAPER) READ ABSTRACT |

The VMI Model: Managing Inventory outside the Four Walls by Clear Spider Inc.

August 2008 - (Free Research)
Vendor Managed Inventory (VMI) is a business model that allows supplier/manufacturer organizations to access, control, and replenish inventory for their customers. Clear Spider is the industry leader in VMI technology. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 20 December 2011: Read this week’s issue, featuring: retail IT issues for Christmas; the cost of software failure; the founder of agile development by ComputerWeekly.com

December 2011 - (Free Research)
In this week's issue of Computer Weekly, we look at the key technologies that retailers are turning to for IT-enabling customers' Christmas shopping. We examine research revealing the huge cost of application software that fails to meet requirements; and we talk to one of the pioneers of agile software development. Download the new issue now. 
(EZINE) READ ABSTRACT |

The Outsourcing Decision for a Globally Integrated Enterprise: From Commodity Outsourcing to Value Creation by IBM

May 2008 - (Free Research)
The ability to manage operations, expertise and resources more fluidly enables globally integrated enterprises to enter new markets and seize new business opportunities wherever they happen to arise. 
(WHITE PAPER)

The Business Case for Outsourcing Software Testing to a Separate Vendor by LogiGear Corporation

January 2006 - (Free Research)
This whitepaper will explore the single-source, and the multi-source approach to application development, highlighting the advantages and disadvantages of each, and pointing out the distinct advantages that multi-sourcing has over single-sourcing. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 460 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts