Security Outsourcing Reports

MicroScope - December 2021: Valuing the MSP
sponsored by MicroScope
EZINE: In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.
Posted: 26 Nov 2021 | Published: 03 Dec 2021

MicroScope

MicroScope – March 2022: Taking the steady approach to becoming an MSP
sponsored by MicroScope
EZINE: In this issue, take a closer look at the risks and pitfalls on the journey to becoming a manages services provider, read about expected ongoing change and consolidation in the year ahead, and discover what experts have to say on the skills and supply chain shortages
Posted: 03 Mar 2022 | Published: 04 Mar 2022

MicroScope

PassMark Success: Endpoint Protection
sponsored by Symantec Corporation
WHITE PAPER: Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Symantec Corporation

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett Packard Enterprise
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett Packard Enterprise

The changing SIEM landscape: What you should know to stay ahead
sponsored by TechTarget Security
EGUIDE: While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

TechTarget Security

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security

Information Security Magazine - December 2009 / January 2010: Basic Database Security
sponsored by Information Security Magazine
EZINE: This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Information Security Magazine

TELUS leverages HP ArcSight and TippingPoint
sponsored by Hewlett Packard Enterprise
CASE STUDY: This informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.
Posted: 29 May 2014 | Published: 30 Sep 2013

Hewlett Packard Enterprise

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Exploring cloud Security as a Service options
sponsored by TechTarget Security
EGUIDE: There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012

TechTarget Security