IT Security Services Reports

MicroScope – October 2022: 40 years of MicroScope
sponsored by MicroScope
EZINE: As we celebrate MicroScope's 40 anniversary, we look back (and forward) to assess how the channel keeps changing, with experts weighing in with their opinions
Posted: 30 Sep 2022 | Published: 03 Oct 2022

MicroScope

MicroScope – October 2021: Choosing a channel career
sponsored by MicroScope
EZINE: In this issue, we explore whether more partners equals better business, and take a closer look at how IT consumption is changing thanks to subscription services. Also read a special feature looking into whether the channel offers good prospects for school-leavers hoping to start on a career path that could make a difference
Posted: 01 Oct 2021 | Published: 01 Oct 2021

MicroScope

Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World
sponsored by OpenText Security Solutions
CASE STUDY: This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 15 May 2013 | Published: 15 May 2013

OpenText Security Solutions

Cisco Cloud Security Accelerates Cloud Adoption
sponsored by Cisco Systems, Inc.
WHITE PAPER: Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Cisco Systems, Inc.

The State of Cloud-Based Security: Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by Webroot Software Pty Ltd
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 12 Mar 2012 | Published: 12 Mar 2012

Webroot Software Pty Ltd

IT Services: A Management model for CIOs
sponsored by CenterBeam
EGUIDE: This expert e-guide explains how IT services and managed service providers (MSPs) deliver strategic value to the organizations that use them, and offers tips for choosing the right MSP. Also inside, learn why savvy CIOs are flocking to cloud computing.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

CenterBeam

Achieving PCI Compliance with Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis.
Posted: 20 Aug 2009 | Published: 19 Aug 2009

Red Hat and JBoss

Are You Securely Delivering Enterprise Data and Services?
sponsored by OpenText Security Solutions
WHITE PAPER: Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

OpenText Security Solutions

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
sponsored by VeriSign, Inc
WHITE PAPER: Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
Posted: 07 Jun 2010 | Published: 03 Jun 2010

VeriSign, Inc

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security