ComputerWeekly.com Research Library

Powered by Bitpipe.com

Managed Security Services Research

  • Security as a Service: Benefits and Risks of Cloud-Based Security

    Sponsored by: SearchSecurity.com

    Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.

  • July Essentials Guide on Cloud Computing

    Sponsored by: SearchSecurity.com

    This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.

  • Exploring cloud Security as a Service options

    Sponsored by: SearchSecurity.com

    There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.

  • Maintaining security in managed services

    Sponsored by: SearchSecurity.com

    Security management has and will always be a key part of any organization. Whether it’s finding a way to secure data in the cloud or simply within the walls of your own organization, finding and implementing a process is of the utmost importance. This expert E-Guide will discuss important security considerations within a managed services model.

  • Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World

    Sponsored by: Webroot

    This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  • PassMark Success: Endpoint Protection

    Sponsored by: Symantec Corporation

    Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.

  • Information Security Magazine - March 2013

    Sponsored by: SearchSecurity.com

    This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

  • Cloud Endpoint Security: Considerations for Cloud Security Services

    Sponsored by: Symantec Corporation

    This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!

  • Cloud-delivered Endpoint Security

    Sponsored by: Webroot

    Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.

  • HP Fortify on Demand - Enterprise Software Security in the Cloud

    Sponsored by: Hewlett Packard Enterprise

    HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.

  • Cisco Cloud Security Accelerates Cloud Adoption

    Sponsored by: Cisco Systems, Inc.

    Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption.

  • How much security do you really need?

    Sponsored by: IBM

    Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.

  • The changing SIEM landscape: What you should know to stay ahead

    Sponsored by: SearchSecurity.com

    While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.

  • The State of Cloud-Based Security: Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs

    Sponsored by: Webroot Software Pty Ltd

    Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.

  • Expert guide to understanding SaaS and cloud computing issues

    Sponsored by: Veracode, Inc.

    This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.

  • The Business Case for Managed DDos Protection

    Sponsored by: Neustar®

    This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.

  • Are You Securely Delivering Enterprise Data and Services?

    Sponsored by: Webroot

    Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.

  • Security-In-Depth Using Integrated Risk-Conscious Controls

    Sponsored by: Tripwire, Inc.

    Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.

  • The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget

    Sponsored by: Kaspersky

    This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.

  • HP ArcSight Express 3.0

    Sponsored by: HP Enterprise Security.

    View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.

  • Software Security Delivered in the Cloud

    Sponsored by: Hewlett Packard Enterprise

    HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service.

  • Hosted, Outsourced, and Cloud Data Centers - Strategies and Considerations for Co-Location Tenants

    Sponsored by: Siemon Company

    As more companies look towards collocation, hosted, and managed services for their primary data center, there are crucial considerations every IT pros should know when selecting a provider. This resource explores hosted, outsourced, and cloud data centers, and providers strategies and considerations for co-location tenants.

  • E-Guide: Striving for Better Information Security Intelligence

    Sponsored by: Tripwire, Inc.

    The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments.

  • Information Security Magazine September 2011—Reader’s Choice Awards

    Sponsored by: Information Security Magazine

    Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.

  • E-Guide: IT Security and Defence Strategies

    Sponsored by: Kaseya International Limited

    With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.