Internet Security Services Reports

MicroScope – March 2020: Making life simpler for the channel
sponsored by MicroScope
EZINE: In this issue, read about how Dell is continuing on its mission to make life easier for partners by introducing improved tools, and we take a closer look at how cloud, cyber security and 5G are set to dominate over the course of 2020
Posted: 08 Feb 2021 | Published: 03 Mar 2020

MicroScope

MicroScope – February 2020: The power to transform
sponsored by MicroScope
EZINE: In this issue, MicroScope asks experts what to expect in 2020, and the channel shares why change is necessary to thrive in different business environments
Posted: 08 Feb 2021 | Published: 03 Feb 2020

MicroScope

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
sponsored by VeriSign, Inc
WHITE PAPER: Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
Posted: 07 Jun 2010 | Published: 03 Jun 2010

VeriSign, Inc

Information Security Magazine September 2011—Reader’s Choice Awards
sponsored by Information Security Magazine
EZINE: Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.
Posted: 01 Sep 2011 | Published: 01 Sep 2011

Information Security Magazine

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Tripwire, Inc.

FAQ Guide on Endpoint Management
sponsored by CenterBeam
EGUIDE: This e-guide from SearchSecurity.com features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

CenterBeam

Providence Health & Services is Reacting to Threats Five Times Faster
sponsored by Symantec Corporation
WHITE PAPER: This case study features Providence Health & Services experience with a managed security services provider that offered reliable and efficient security management.
Posted: 25 Apr 2014 | Published: 31 Dec 2010

Symantec Corporation

SMB Cybersecurity: The Need for Better Protection
sponsored by Kaspersky
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020

Kaspersky

MSPs: Documentation, RMM Tools and Security Portfolios
sponsored by Solarwinds MSP
EGUIDE: In this expert e-guide, learn what makes MSP documentation essential in today's world. Additionally, discover how RMM tools are focusing on ease of use, integration and cloud and MSP security portfolios.
Posted: 31 May 2017 | Published: 19 May 2017

Solarwinds MSP

Information Security Magazine - March 2013
sponsored by TechTarget Security
EZINE: This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013

TechTarget Security