Managed security service

Results: 444



#Item
431Business / Evaluation / Information technology management / European Telecommunications Standards Institute / Performance indicator / Capability Maturity Model / Inter-Services Intelligence / Managed security service / Information security management system / Software development process / Carnegie Mellon University / Management

GS ISI[removed]V1[removed]Information Security Indicators (ISI); Key Performance Security Indicators (KPSI) for the evaluation of maturity detection of security events

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-05-13 08:18:49
432Internet hosting / Computer network security / Internet hosting service / Data center / Computer security / Cloud computing / Computing / Concurrent computing / Distributed computing

CASE STUDY Ultra Secure colocation managed with a difference SFW is an independently owned digital solutions provider based in Woking, Surrey. It specialises in developing business applications and systems integration se

Add to Reading List

Source URL: www.thebunker.net

Language: English - Date: 2014-01-06 10:56:33
433Software / Data synchronization / Backup / Remote backup service / Incremental backup / Snapshot / Continuous data protection / R1Soft Continuous Data Protection / Computing / Backup software / Data security

Information Technology Solutions Remote Backup: your data, safely off site WHAT IS IT? A managed backup solution

Add to Reading List

Source URL: www.suttonlea.org

Language: English - Date: 2013-02-19 09:30:34
434Managed security service / Outsourcing / Cloud computing / Centralized computing / Computing / Computer network security

For further information Sharmin Jassal Corporate Communications Manager Dimension Data Tel: +[removed]Mobile: +[removed]

Add to Reading List

Source URL: www.earthwave.com.au

Language: English - Date: 2013-05-22 01:24:23
435Security / Terremark / Data security / Digital forensics / Computer forensics / Data breach / Managed security service / Computer network security / Cyberwarfare / Computer security

SECURITY SERVICES INVESTIGATIVE RESPONSE SERVICE Preserve Confidence, Trust...and Evidence Security breaches are a real risk, not only to your

Add to Reading List

Source URL: www.terremark.hk

Language: English - Date: 2014-01-29 00:08:34
436Hedge fund / Investment / General Electric / Edison / Business / Financial economics / Thomas Edison / Finance

Edison Ventures Invests in eSentire Provider of Network Security as a Managed Service LAWRENCEVILLE, NJ, July[removed] – Edison Ventures today announced $5.5 million investment in a $7.0 million total financing round in

Add to Reading List

Source URL: www.edisonventure.com

Language: English - Date: 2013-07-22 13:48:06
437Public safety / Management / Crime prevention / Information security / National security / Risk / Managed security service / Security controls / Computer security / Security / Data security

Microsoft Word - IR Case Study Final[removed]doc

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:47:11
438Security / Terremark / Data security / Digital forensics / Computer forensics / Data breach / Managed security service / Computer network security / Cyberwarfare / Computer security

SECURITY SERVICES INVESTIGATIVE RESPONSE SERVICE Preserve Confidence, Trust...and Evidence Security breaches are a real risk, not only to your

Add to Reading List

Source URL: www.terremark.com

Language: English - Date: 2014-01-29 00:08:34
439Computing / Computer security / Auditing / Business software / Verisign / Managed security service / Audit / TRAC / Penetration test / Data security / Security / Computer network security

W H I T E PA P E R VeriSign® Global Security Consulting Services Optimizing Enterprise Information Security Compliance

Add to Reading List

Source URL: complianceandprivacy.com

Language: English - Date: 2007-03-03 10:21:35
440National security / Public safety / Computer security / Cyberwarfare / Penetration test / Information security / Cloud computing / Information technology security audit / Managed security service / Computer network security / Security / Crime prevention

REDSPIN PRESS RELEASE Redspin Announces Top 10 Security Issues for 2011 Proliferation of mobile and personal computing devices in the enterprise, greater adoption of virtualization and cloud computing, wireless everywhe

Add to Reading List

Source URL: www.redspin.com

Language: English - Date: 2014-02-26 18:43:52
UPDATE