RecruitingBlogscom

Follow Us:

 

managed service providers

Results 26 - 40 of 40Sort Results By: Published Date | Title | Company Name
Published By: Logicalis     Published Date: Apr 10, 2014
Learn the top trends and concerns for choosing the right managed services partner.
Tags : 
logicallis, managed service, providers, it management, data management
    
Logicalis
Published By: IBM     Published Date: Oct 10, 2013
The security world is a scary place, and it’s getting scarier. Every day brings more risks, threats, customer demands, and regulations. Worse yet, it’s becoming more difficult to recruit and retain people who really get it and know how to help. It’s time for a new model. A survey conducted by Forrester Consulting and commissioned by IBM shows that security leaders are partnering with managed security services providers in increasing numbers—and the feedback is overwhelmingly positive.
Tags : 
security, risks, threats, security breach, customer demands, regulations, forrester consulting, ibm, security leaders, managed security services, it solutions, sercurity service providers, it management, data management, business technology
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
cloud computing, managed services, it service providers, ibm, cost reduction, complexity mangement, it organization, partnership, managed services provider, business technology
    
IBM
Published By: SilverSky     Published Date: Apr 16, 2013
In Forrester's 15-criteria evaluation of the emerging managed security services provider (MSSP) market, SilverSky was identified as a leader. Forrester identified the 10 most significant providers in this category and researched, analyzed, and scored them. SilverSky was given high ranks for business and technical value, SLA adherence, security services, and threat intelligence and analytics. Download this industry research paper now to learn why SilverSky is the MSSP you should be working with today.
Tags : 
managed security, msp, managed service provider, sla adherance, threat intelligence, analytics, mssp, forrester
    
SilverSky
Published By: Savvis UK Limited     Published Date: Nov 12, 2010
This white paper reviews the evolution of data center outsourcing, and introduces cloud offerings within this historical framework.
Tags : 
savvis, managed services providers, msps, data center outsourcing, application lifecycle, virtualization
    
Savvis UK Limited
Published By: Arcserve     Published Date: Jul 26, 2010
The Emergence of the Application Delivery 2.0 Era: The primary goal of this handbook is to help IT organizations plan for that transformation.
Tags : 
ca technologies, application delivery 2.0 era, virtualization, mobile workforce, cloud computing, network, application optimization, managed service providers, msp
    
Arcserve
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan, firewall, virtual private network, vpn, security, support costs, isdn, wifi, slas, tco, it management
    
WebEx
Published By: Cisco     Published Date: Jan 29, 2009
The following are 10 tips for using network technology to help your business increase operational efficiency, reduce costs, improve customer satisfaction, and stay ahead of the competition.
Tags : 
cisco, increasing operational efficiency, boost operational efficiency, mobile employees, smb employees, secure wireless access, outsource it tasks, improve employee retention, long-term technology plan, value-added resellers, vars, managed service providers, security and vpn, unified communications, cisco business application connectors, cisco systems capital, enterprise applications
    
Cisco
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: Quocirca     Published Date: Jul 03, 2008
As enterprises recognize the costs associated with an uncontrolled printing environment, many are turning to specialist managed print services (MPS) providers. MPS services encompass the assessment, optimization and management of the print environment. Increasingly, MPS providers are now adopting a partnered out-tasking approach by delivering flexible services that can be tailored to individual customer requirements.
Tags : 
managed print services, mps, quocirca
    
Quocirca
Published By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. answers the demands of the market by providing enterprises, systems integrators and managed service providers with scaleable IP Communications solutions that maximize ongoing operations and ensure increased end user confidence and efficiency. Learn more about Clarus Systems and how they can help your business in this data sheet.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top