Security Management Services White Papers

(View All Report Types)
Balancing Risk and Innovation with Sourcing Alternatives: Helping IT managers and CIOs raise the ROI of IT
sponsored by IBM
WHITE PAPER: This paper explains how clients can balance risk and innovation through the use of services from IBM.
Posted: 20 May 2011 | Published: 01 Dec 2010

IBM

Penetration Tests
sponsored by Internet Security Systems, Inc.
WHITE PAPER: A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.
Posted: 06 Apr 2003 | Published: 01 Jan 2001

Internet Security Systems, Inc.

Providence Health & Services is Reacting to Threats Five Times Faster
sponsored by Symantec Corporation
WHITE PAPER: This case study features Providence Health & Services experience with a managed security services provider that offered reliable and efficient security management.
Posted: 25 Apr 2014 | Published: 31 Dec 2010

Symantec Corporation

Hosted, Outsourced, and Cloud Data Centers - Strategies and Considerations for Co-Location Tenants
sponsored by Siemon Company
WHITE PAPER: As more companies look towards collocation, hosted, and managed services for their primary data center, there are crucial considerations every IT pros should know when selecting a provider. This resource explores hosted, outsourced, and cloud data centers, and providers strategies and considerations for co-location tenants.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Siemon Company

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

The State of Cloud-Based Security: Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by Webroot Software Pty Ltd
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 12 Mar 2012 | Published: 12 Mar 2012

Webroot Software Pty Ltd

Taking the Next Step: How to Achieve Breakthrough Success in the IT Managed Services Business
sponsored by Kaseya
WHITE PAPER: The drive to build a company from the ground up and offer a competitive product or service that fulfills a need is a powerful pull. Owners of IT service provider businesses are no different. Check out this white paper to learn more.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

Kaseya

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM