NSP Reports

MicroScope – October 2020: Get in touch with remote network security
sponsored by MicroScope
EZINE: In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption
Posted: 08 Feb 2021 | Published: 02 Oct 2020

MicroScope

Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017

TechTarget ComputerWeekly.com

The Touch-Free Future and Current Adoption Trends of SDN
sponsored by Juniper Networks, Inc.
EGUIDE: There's a significant amount of work needed prior to reaching a future in which no-touch technology is in wide use and SDN security is common. Learn why experts say it's time to transform network change management and security to what is suitable for today's business climate and discover the status of SDN adoption and deployment in the enterprise.
Posted: 15 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.

Handbook: Architecting the cloud for mobile services
sponsored by TechTarget Networking
EGUIDE: This handbook will offer information on new cloud-based mobile services and provide guidance on architecting the cloud for mobile device management (MDM), location-based services and security requirements. We will also address managing the network to minimize problems in application performance and delivery.
Posted: 09 Aug 2013 | Published: 09 Aug 2013

TechTarget Networking

Kaspersky Lab’s COVID-19 Relief Initiatives
sponsored by Kaspersky
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020

Kaspersky

Cisco: Leading the Way to Borderless Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: Cisco's borderless networks promises to connect anyone to anywhere, using any device, to any resource—securely, reliably, transparently. In order to fully deliver on this promise, Cisco is advancing along three critical fronts: workplace transformation, technology leadership, and operational excellence. Read this paper to learn more.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

Cisco Systems, Inc.

Outsourcing Your Network – Lock, Stock, and Barrel or Bite-sized Chunks?
sponsored by Dimension Data
WHITE PAPER: This whitepaper covers the changing strategy for outsourcing ICT to a service planner. Organizations are now using a multi-or-selective sourcing model instead of an all-in-one approach.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Dimension Data

E-Guide: Managed Services - What you need to know
sponsored by Dell Software
EGUIDE: Today's companies need 24-hour operations, fast access to sales and production information, and flexibility to adapt to business changes. This e-guide uncovers why networking pros are moving towards managed service models to overcome these hurdles, while discussing your available options.
Posted: 10 May 2011 | Published: 09 May 2011

Dell Software

E-Guide: Increase your Revenues and Profits by Offering Managed Voice
sponsored by Cisco Systems, Inc.
EGUIDE: Offering hosted unified communications and VoIP services is a strong opportunity for service providers. How do you know which customized plan is right for your specific business needs? Read this E-Guide to learn pros and cons, as well as which questions to ask potential clients to ensure that you are delivering the solution that’s right for them.
Posted: 14 Mar 2011 | Published: 14 Mar 2011

Cisco Systems, Inc.

Information Security Magazine – July/August 2013
sponsored by TechTarget Security
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Security