Security Consulting Reports

FAQ Guide on Endpoint Management
sponsored by CenterBeam
EGUIDE: This e-guide from SearchSecurity.com features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

CenterBeam

Software Security Delivered in the Cloud
sponsored by Hewlett Packard Enterprise
PRODUCT OVERVIEW: HP Fortify on Demand is a Security-as-a Service (SaaS) testing solution that allows organizations to quickly, accurately and affordably test the security of their applications without the need to manage or install any software. View now to learn more about this cloud-based, automated service.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

Hewlett Packard Enterprise

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

Virtualization Podcasts: Infrastructure Solutions for Midsized Companies
sponsored by IBM
PODCAST: Midsized businesses need IT solutions that will help them by cutting costs, adding capabilities and reducing risks. Hear about key technologies, trends, best practices and solutions from IBM experts, IBM Business Partners and Industry Analysts that will help you address the IT challenges facing your growing business.
Posted: 18 Feb 2009 | Premiered: Feb 18, 2009

IBM

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

E-Guide: Striving for Better Information Security Intelligence
sponsored by Tripwire, Inc.
EGUIDE: The need for realistic awareness of the threat landscape has led many businesses to expand their investment to broader insight outside the organization, and deeper visibility within. This expert tip explains how to turn data deluge into business opportunity and offers advice on managing threat exposure in complex IT environments.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.

Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER: Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008

Zenith Infotech

Leveraging security from the Cloud
sponsored by IBM
WHITE PAPER: Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. This whitepaper discusses the who, what, when, why and how of cloud-based security services.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection
sponsored by Panda Security
CASE STUDY: Read this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.
Posted: 03 Dec 2009 | Published: 20 Nov 2009

Panda Security

Presentation Transcript: The Cybercrime War; When Are We Going to Win?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: Why are information security issues so persistent? Why does it feel like we win small battles, yet the war keeps escalating? What does the next 20 years look like? Erik Petersen, Vice President of Security and Risk Consulting at Dell SecureWorks discuss micro and macro-economic theory to grapple with the core questions of “why.”
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks