managed service

Results 1 - 25 of 338Sort Results By: Published Date | Title | Company Name

Employee Fraud within Financial Services

Published By: Actimize     Published Date: Oct 10, 2007
According to the results of Actimize's 2007 Employee Fraud survey, which was managed by Infosurv, an independent research company, financial services institutions know that they have a significant and growing problem with employee fraud and are not fully prepared to handle the threat as attacks from organized crime, dissatisfied staff and financially distressed employees become more sophisticated.
Tags : 
auditing, audit, finserve, finserv, financial services, data theft, identity theft, data protection
    
Actimize

Improving Web Application Security: The Akamai Approach to WAF

Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security, risk management
    
Akamai Technologies

See Why Gartner Named Akamai a WAF Leader

Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies

Managed Security Service Provider (MSSP) Success Checklist

Published By: AlienVault     Published Date: Oct 20, 2017
When you're starting service with a customer, setting the tone early on is very important. That's why we've created a checklist to help you stay organized from the start and implement smart process around your Managed Security Service Provider (MSSP) service. Feel free to use it but most importantly modify it. Use this checklist to help you document: • Network information • Logging devices • Contact information • Priority escalation contacts • Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault

2017 Spotlight Report – Use of Managed Security Service Providers (MSSPS)

Published By: AlienVault     Published Date: Oct 20, 2017
This 2017 Spotlight report reveals the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs. You'll learn about key findings including: The predominant driver for organizations to consider managed security services The most critical capabilities organizations look for in MSSPs The most requested security services offered by MSSPs Key benefits respondents have achieved by partnering with an MSSP Whether you are evaluating using an MSSP, or are an MSSP yourself, download this report to gain valuable insights into how MSSPs are helping their clients improve their security posture.
Tags : 
    
AlienVault

Transitioning from Managed Services to Managed Security

Published By: AlienVault     Published Date: Oct 20, 2017
Transitioning from MSP to MSSP is a well-trodden path and there are a lot of best practices to increase chances of success. Success is due to people, processes, and tech in equal proportions. Generally, new MSSPs should pick a core set of competencies and branch outward from there. In this white paper, Garrett Gross, Director of Field Enablement, AlienVault and Tim Foley, Sr. Manager of Information Security, Dataprise discuss the current state of the market for MSSPs and best practices for new MSSPs.
Tags : 
    
AlienVault

Machine Learning on AWS

Published By: Amazon Web Services     Published Date: Feb 01, 2018
At Amazon, we’ve been investing deeply in AI for more than 20 years. Machine learning (ML) algorithms drive many of our internal systems, and have formed the core of our customers' experience —from the path optimization in our fulfillment centers, and Amazon.com’s recommendations engine, to Echo powered by Alexa, and our new retail experience, Amazon Go. Our mission is to share our learnings and ML capabilities as fully managed services, and put them into the hands of every executive, developer, and data scientist.
Tags : 
machine learning, algorithms, interal systems, amazon
    
Amazon Web Services

How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor

Arbor Networks Enables DDoS Protection for Cloud Service and Hosting Providers

Published By: Arbor Networks     Published Date: Jan 18, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and increase revenue by offering Arbor-based, managed DDoS protection services.
Tags : 
ddos, arbor networks, cloud services, protection, data center, ddosattack, hosting provider, business technology
    
Arbor Networks

Infonetics Research 2012 DDoS Prevention Appliance Report

Published By: Arbor Networks     Published Date: Mar 06, 2013
According to Infonetics Research, the DDoS market is being driven by high visibility attacks, Internet traffic growth, enterprise, mobile and managed security services demand. Learn more with this Infonetics Research report on DDoS.
Tags : 
arbor networks, ddos, security, infonetics, prevention appliance report, data management, business technology, data center
    
Arbor Networks

The 2010 Handbook of Application Delivery

Published By: Arcserve     Published Date: Jul 26, 2010
The Emergence of the Application Delivery 2.0 Era: The primary goal of this handbook is to help IT organizations plan for that transformation.
Tags : 
ca technologies, application delivery 2.0 era, virtualization, mobile workforce, cloud computing, network, application optimization, managed service providers
    
Arcserve

The Critical Role of Content Management in Delivering Business Services

Published By: ASG Software Solutions     Published Date: Aug 08, 2008
Business runs on content and that content must be managed holistically, across the entire business. However, managing content is, in itself, not enough to drive business. Enterprises must incorporate ECM with other IT management systems to provide complete Business Service Management (BSM).
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm
    
ASG Software Solutions

Enable an Empowered and Distributed Workforce through Managed Remote Service

Published By: AT&T     Published Date: Nov 07, 2011
Organizations are responding to customer needs by shifting workforces into the flow of their lives resulting in an expansion of remote connectivity.
Tags : 
remote workers, managed remote service, distributed workforce, att, at&t, at+t, customers, mobile computing
    
AT&T

Enable an Empowered and Distributed Workforce through Managed Remote Service

Published By: AT&T     Published Date: Nov 07, 2011
Organizations are responding to customer needs by shifting workforces into the flow of their lives resulting in an expansion of remote connectivity.
Tags : 
remote workers, managed remote service, distributed workforce, att, at&t, at+t, customers, mobile computing
    
AT&T

Is your Managed Print Services program sustainable?

Published By: AUXILIO, Inc.     Published Date: Apr 12, 2011
The white paper examines the greater value of continuous process improvement methodology and standardization of workflow for managing change in a patient care environment.
Tags : 
managed print services, healthcare, health care, mps, workflow, efficiency, improvement
    
AUXILIO, Inc.

What Financial Institutions Should Look for in a Managed Security Service Provider

Published By: BAE Systems     Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
Tags : 
bae systems, applied intelligence, financial institution, managed security, managed security services, managed security service provider, mssp, data breach
    
BAE Systems

Managed Service Provider Simplifies Deployment and Management of Systems in Customer Data Centers

Published By: BubblewrApp     Published Date: Jan 20, 2015
The Company (name withheld) provides data center management and monitoring services to a number of enterprises across the United States. The Company maintains multiple network operations centers (NOCs) across the country where engineers monitor customer networks and application uptimes around the clock. The Company evaluated BubblewrApp’s Secure Access Service and was able to enable access to systems within customer data centers in 15 minutes. In addition, the Company was able to: a. Do away with site-to-site VPNs – no more reliance on jump hosts in the NOC b. Build out monitoring systems in the NOC without worry about possible IP subnet conflicts c. Enable NOC engineers to access allowed systems in customer networks from any device
Tags : 
systems management, customer data centers, network operation centers, secure access service, enterprise applications
    
BubblewrApp

Get Complimentary Microsoft Online Training

Published By: C.B.Learning     Published Date: Jul 10, 2008
An official provider of Microsoft Online Learning, C.B.Learning offers cost-effective, managed training which your team can complete without leaving the office. Their Learning Management System (LMS) is a secure online service that offers you a direct way to monitor progress and helps you extend your training budget. Try a free Microsoft course today.
Tags : 
network management, microsoft, mcp, certification, microsoft certification, training, online training, online classes
    
C.B.Learning

CA Application Quality Management and Testing Tools

Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing, application performance management, software testing
    
CA Mainframe

Efficiency, Optimization and Predictive Reliability

Published By: CA Technologies     Published Date: Aug 19, 2014
IT organizations are increasingly being called upon to cost-effectively deliver reliable support for the entire catalog of business services, or risk outsourcing to a managed service provider.
Tags : 
ca technologies, capacity management, business automation, business intelligence, business scoring, network performance, business analytics, business process automation
    
CA Technologies

Stepping into the Spotlight

Published By: CA Technologies     Published Date: Feb 13, 2015
For internal support centers, the message coming from the overall business is clear: You need to demonstrate your business value. Outsourcing, managed services and cloud-based solutions that didn’t exist just a few years ago are piling on the pressure.
Tags : 
cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics, cloud-based solutions
    
CA Technologies

Leveraging Your Service Desk to Scale Your MSP Business

Published By: CA Technologies     Published Date: Feb 13, 2015
For the managed services provider (MSP), service desk capabilities play a critical role in the level of service that customers receive and in the degree to which those services are delivered efficiently and profitably. In short, the service desk can make the difference between a service provider’s success or failure. This paper offers some key principles MSPs should adopt in order to ensure their service desk fully supports operational efficiency, optimal service levels and business growth.
Tags : 
service desk, customer service, msp business, service providers
    
CA Technologies

Better Manage Your Company’s Documents to Improve Business Results and Mitigate Risk

Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Be confident that you are measurably improving operational efficiency and reducing costs for your business by initiating a best-practices document performance management system with proven methodologies and tools
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management
    
Canon Business Process Services

Improve Business Performance with Document Process Management

Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Discover how your business can institute an effective management strategy to reduce costs, increase productivity and manage document related risks by outsourcing your document process management function.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management
    
Canon Business Process Services

Four Keys to Unlocking the Power of Managed Print Services

Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Managed print services have been proven to drive cost savings as much as 10-30 percent over traditional approaches as well as increase efficiency, security and sustainability across your business.
Tags : 
print management, business process outsourcing, business performance management, managed print services, business imaging, document and print management, business management, knowledge management
    
Canon Business Process Services
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.