IT Security Services Reports

MicroScope – June 2023: Take a balanced approach to security
sponsored by MicroScope
EZINE: In this issue, read about how to help customers manage their security portfolios in a world of increasingly complex systems, discover how insights are providing more opportunities for partners, and learn whether being an MSP is enjoyable or not
Posted: 01 Jun 2023 | Published: 02 Jun 2023

MicroScope

Expert guide to understanding SaaS and cloud computing issues
sponsored by Veracode, Inc.
EGUIDE: This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Veracode, Inc.

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Minimize your financial institution’s risk with solutions from IBM
sponsored by IBM
WHITE PAPER: Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

IBM

PassMark Success: Endpoint Protection
sponsored by Symantec Corporation
WHITE PAPER: Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Symantec Corporation

E-Guide: 7 Top Services Delivered Via Network Connections
sponsored by Nimsoft, Inc.
EGUIDE: What managed services are getting the most attention? Download this e-guide to learn the 7 top managed services delivered via network connections. Download to learn how you can create opportunities to further client relationships and expand your network of clients.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Nimsoft, Inc.

SMB Cybersecurity: The Need for Better Protection
sponsored by Kaspersky
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020

Kaspersky

The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget
sponsored by Kaspersky
WHITE PAPER: This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Kaspersky

Exploring cloud Security as a Service options
sponsored by TechTarget Security
EGUIDE: There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012

TechTarget Security

Achieving PCI Compliance with Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis.
Posted: 20 Aug 2009 | Published: 19 Aug 2009

Red Hat and JBoss