IT Security Services Reports

MicroScope - December 2021: Valuing the MSP
sponsored by MicroScope
EZINE: In this month's MicroScope, we look at why customers should be prepared to pay for the value offered by a managed service provider, identify the biggest drivers in the data storage market, and look at why some firms are struggling to get to grips with remote working. Read the issue now.
Posted: 26 Nov 2021 | Published: 03 Dec 2021

MicroScope

Beyond your company boundaries
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of interactive presentations, written especially for Computer Weekly.
Posted: 08 Feb 2021 | Published: 06 Jul 2017

TechTarget ComputerWeekly.com

Cloud Endpoint Security: Considerations for Cloud Security Services
sponsored by Symantec Corporation
EGUIDE: This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Symantec Corporation

Presentation Transcript: Customer Experience Focused Transformation
sponsored by Alcatel-Lucent
PRESENTATION TRANSCRIPT: This presentation transcript discusses Telecom Service Provider Transformations as well as business strategies and models to improve quality of experience, including customer experience management planning and the role-managed services can play in this transformation.
Posted: 14 Apr 2011 | Published: 14 Apr 2011

Alcatel-Lucent

Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection
sponsored by Panda Security
CASE STUDY: Read this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.
Posted: 03 Dec 2009 | Published: 20 Nov 2009

Panda Security

Achieving PCI Compliance with Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis.
Posted: 20 Aug 2009 | Published: 19 Aug 2009

Red Hat and JBoss

TELUS leverages HP ArcSight and TippingPoint
sponsored by Hewlett Packard Enterprise
CASE STUDY: This informative whitepaper explores how managed security service providers are utilizing effective intelligent analysis for their SIEM solutions.
Posted: 29 May 2014 | Published: 30 Sep 2013

Hewlett Packard Enterprise

Security Operations Center (SOC) Essentials for the SME
sponsored by AT&T Cybersecurity
WEBCAST: Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014

AT&T Cybersecurity

The Financial Benefit of Cisco’s Elastic Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Cisco Systems, Inc.

The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget
sponsored by Kaspersky
WHITE PAPER: This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Kaspersky