ComputerWeekly.com Research Library

Powered by Bitpipe.com

Managed Security Services Research

  • Targeted attacks and how to defend against them

    Sponsored by: ComputerWeekly.com

    Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.

  • CW Special report on Symantec

    Sponsored by: ComputerWeekly.com

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.

  • Information security trends

    Sponsored by: ComputerWeekly.com

    This report from CompTIA, based on original research, assesses the current trends in information security.

  • Security as a Service: Benefits and Risks of Cloud-Based Security

    Sponsored by: SearchSecurity.com

    Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.

  • VMworld Europe Case Study:  Colt Technology

    Sponsored by: ComputerWeekly.com

    Managed service provider Colt designed and rolled out a scalable, cloud-hosted desktop virtualisation project that is reaping benefits for local councils.

  • July Essentials Guide on Cloud Computing

    Sponsored by: SearchSecurity.com

    This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.

  • Domino’s Pizza:  Datacentre Transformation

    Sponsored by: ComputerWeekly.com

    Colin Rees, IT Director at Domino’s Pizza explains how a project to move the company data centre into the cloud has transformed its online business.

  • Exploring cloud Security as a Service options

    Sponsored by: SearchSecurity.com

    There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.

  • Strategies for Secure Virtual Desktop Infrastructure

    Sponsored by: Citrix Systems, Inc.

    Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI.

  • Security Intelligence – Is Security a Battle You Can Win

    Sponsored by: IBM

    This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.

  • BYOD: Bring Your Own Device – or Bring Your Own Danger?

    Sponsored by: WatchGuard Technologies, Inc.

    This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.

  • Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World

    Sponsored by: Webroot

    This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  • How to Overcome Security Skills Deficiencies

    Sponsored by: IBM

    This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!

  • The Financial Benefit of Cisco’s Elastic Core

    Sponsored by: Cisco Systems, Inc.

    Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.

  • IT Services: A Management model for CIOs

    Sponsored by: CenterBeam

    This expert e-guide explains how IT services and managed service providers (MSPs) deliver strategic value to the organizations that use them, and offers tips for choosing the right MSP. Also inside, learn why savvy CIOs are flocking to cloud computing.

  • FAQ Guide on Endpoint Management

    Sponsored by: CenterBeam

    This e-guide from SearchSecurity.com features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.

  • Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World

    Sponsored by: Webroot

    This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  • PassMark Success: Endpoint Protection

    Sponsored by: Symantec Corporation

    Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.

  • Information Security Magazine - March 2013

    Sponsored by: SearchSecurity.com

    This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

  • Cloud Endpoint Security: Considerations for Cloud Security Services

    Sponsored by: Symantec Corporation

    This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!

  • Cloud-delivered Endpoint Security

    Sponsored by: Webroot

    Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.

  • HP Fortify on Demand - Enterprise Software Security in the Cloud

    Sponsored by: Hewlett Packard Enterprise

    HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.

  • Cisco Cloud Security Accelerates Cloud Adoption

    Sponsored by: Cisco Systems, Inc.

    Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption.

  • How much security do you really need?

    Sponsored by: IBM

    Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.

  • The changing SIEM landscape: What you should know to stay ahead

    Sponsored by: SearchSecurity.com

    While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.