Tech Center Security Services
Dark Reading's Security Services Tech Center is dedicated to delivering the latest news, product information, analysis, and opinion on security services and outsourcing. Our goal: to help your organization make the right decisions about security services.
DDoS attacks of more than 10 Gbps now happen several times a day across the globe, study says
At RSA session, panelists argue that companies can better protect sensitive data and systems by using virtual desktop infrastructure, but warn that everything relies on the quality of the hypervisor
From managed services to threat intelligence, companies are using security services to create better policies, as well as manage and tune existing ones
Companies have started offering pay-as-you-go services for data loss prevention to reduce the complexity and the upfront costs
TaaSERA emerges from stealth, claims simpler, more effective anti-malware defense package
- Securing File Sharing Without Losing Productivity Gains
- Six Security Services Every Small Business Must Have
- How To Get Your MSSP In Line With Expectations
- Protecting Data In The Cloud Without Making It Unusable
- Free Browser Scan Service Debuts
By The Numbers
Driven by increasingly complex IT environments and lack of security expertise, more companies will be turning to managed security services -- both cloud and on-premise -- driving revenues to $18 billion in 2016, up from $11.7 billion in 2011, according to Infonetics Research.
Source: Infonetics' "Cloud and CPE Managed Security Services" report
Around the Web
- BYOD into the Cloud: The Next Phase of Enterprise Mobility -
- Digital Disruption - E2 Conference Boston
- Information Streams - Going Beyond the Activity Stream - E2 Conference Boston
- Discover the opportunities and challenges associated with mobile retail - Mobile Commerce World - Mobile Commerce World
- Learn how to move your broadband service to an All-IP network at TelcoVision (formerly TelcoTV) - TelcoVision
Dark Reading Digital Magazine
In This Issue
- Endpoint Security: End user security requires layers of tools and training as employees use more devices and apps.
- Security Isn't A Piece Of Cake: It's time we rethink the conventional wisdom about security layering.
- BYOD Is Here To Stay: Trying to keep employees' devices off the network is futile.