Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Outsourcing Security Part 3: Selecting a Managed Security Services Provider
As the final article in a three-part series on outsourcing security, the following article provides guidelines for selecting a dependable managed security
risks and benefits of outsourcing security can seem like a daunting task. Considerable study and extreme care must be given to weighing factors of managed security services providers, such as: Staying power of the company Expertise of security professionals Range and flexibility of the services Cost benefits Security philosophy, culture, and people Commitment to service-level agreements Support technology Existence of secure operations facilities Vendor Stability Since the MSSP industry is still fairly
Outsourcing--IT Infrastructure RFI/RFP Template
Employee Information, IT Facility and Data Center Operation, Distributed Technology Operation, Network and Communications Service, Business Continuity and Disaster Recovery, Security, Certi...
Get this template
Information Security Selection
Start evaluating software now
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Enter security code:
Already have a TEC account?
Sign in here.
Your user name or e-mail:
Don't have a TEC account?
Documents related to
Outsourcing 101 - A Primer Part Two: Outsourcing Categories
Outsourcing is a very diverse market, and there are many different outsourcing options and outsourcing service providers to choose from. This part examines the
in the I.T. infrastructure outsourcing arena: Physical facilities setup and maintenance Site security and environment control System security Data storage, backup and recovery management Disaster recovery Hardware/software procurement Help desk/end-user support Desktop break-fix Unlike application software, where a large percentage of the outsourced work will tend to be performed at a remote location (i.e. offshore), a majority of the I.T. infrastructure outsourced work will be performed at the client's
Winning Outsourcing Strategies
Outsourcing is increasingly used to reduce costs and increase value@but it has its risks. As companies look to push more of their custom software application
application development needs to outsourcing partners, you need to plan carefully to build stringent security requirements into contracts and create metrics to ensure those requirements are met. Find out how to increase the value and reduce the risk of outsourcing.
Outsourcing in Latin America
Global economic instability has modified the configuration in the worldwide outsourcing market. Find out what impact the crisis has had for Latin America
that they can provide outsourcing investors with a confident human resources source. Is clear that Latin America will not be able to compete with China and India in terms of workforce volumes, but opportunities could come in attending to very special niches such as English-Spanish markets for BPO and ITO services. Security and regulation standards —Another factor that could be an issue in some countries is related to safety and security. There may be concerns from outsourcing contractors regarding high
Outsourcing Security Part 2: Measuring the Cost
Evaluating the cost of outsourcing can be challenging because most organizations cannot fully estimate the financial impact of such a decision.
organizations of all sizes, outsourcing security is becoming an increasingly attractive method for maintaining a strong security posture. In fact, outsourced security is the fastest growing segment of the information security services market, according to a recent Gartner Dataquest study. Often, the decision to outsource security is based on cost: Can the company effectively outsource or co-source security management functions while still realizing a good return on investment? The following is part two
Ernst & Young Leads Big 5 in Security
Announcing an upgrade to its online security portal, Ernst & Young, takes the lead in big 5 security services.
& Young Leads Big 5 in Security Ernst & Young Leads Big 5 in Security L. Taylor - May 19, 2000 Event Summary Announcing an upgrade to its online security portal, Ernst & Young is clearly out in front of the big five when it comes to security consulting services. Its newly expanded online portal, eSecurityOnline.Com, offers a multitude of resources including newsgroups, mailing lists, vulnerability and virus information, a listing of security service offerings, security training, a library, and much
Application Security, Inc.
Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's
Security, Inc. Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step
Outsourcing-The Pros and Cons
Outsourcing’s in the news these days, what with the US presidential election and all, but it’s usually covered from an “is it good for us” angle—where “us” is
let A.B. Maynard, TEC’s outsourcing analyst, speak for the rest of this post—the excerpt below is from his article Outsourcing 101 - A Primer , and I thought it was an excellent overview of the factors you should consider before making a decision . Why Do It? There are a number of reasons that drive companies to outsource some or many of the work activities. The list of reasons include Lower costs (or lower total costs). Sometimes achieved through lower wages costs, but also through economies of
Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards
Original News & Educational ReviewCourse SummaryErnst & Young, has put together the quintessential course for security engineers looking to improve their
for the Pros; Why Ernst & Young Will Lead Security Auditing Standards Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards Featured Author - Laura Taylor - January 19, 2002 Original News & Educational Review Course Summary Ernst & Young, has put together the quintessential course for security engineers looking to improve their ability to protect their organization's website, systems, and network. Dubbed eXtreme Hacking, and carrying a price tag of $5,000 a slot, this
Security Strategies for the Midsized Business
Midsize businesses face the same security threats as larger companies, and likewise they must comply with the same regulations. But, their security budgets are
Strategies for the Midsized Business Midsize businesses face the same security threats as larger companies, and likewise they must comply with the same regulations. But, their security budgets are smaller. The good news is that IT security systems don’t have to be expensive. Learn about the top three security problems, how to develop security policies using integrated security solutions, and how to do vulnerability assessment with low-cost security tools.
Software development outsourcing
Heurística can help companies determine if Mexico is the best option for their outsourcing plans, and then offer a choice of locations. The company can also
development outsourcing Heurística can help companies determine if Mexico is the best option for their outsourcing plans, and then offer a choice of locations. The company can also help clients find a reliable software development company that partners with clients according to their conditions, and asks in-depth questions about clients specific tecnical recommendations. Heurística can also help with the legal and accounting aspects of outsourcing in Mexico.
Business Connexion solutions focus on five areas: Technology Infrastructure: providing the technology foundation including servers, storage, networking
Business Connexion solutions focus on five areas: Technology Infrastructure: providing the technology foundation including servers, storage, networking, and related support services. Business Applications: offering a best-of-breed applications solutions portfolio to cater the clients’ business requirements. Communications: using an next generation network (NGN) to carry data, voice, and video traffic on behalf of clients. Outsourcing: focussing on controlling and managing the provision of ICT
Best Practices: Financial Due Diligence and the Outsourcing of Freight Bill Audit and Payment
There are significant advantages to outsourcing freight bill audit and payment (FBAP), not the least of which is the potential for reduced costs. And while
Due Diligence and the Outsourcing of Freight Bill Audit and Payment There are significant advantages to outsourcing freight bill audit and payment (FBAP), not the least of which is the potential for reduced costs. And while nothing can be outsourced without some risk, there are a number of steps that can be taken to ensure a successful relationship and minimize the financial risk to the outsourcer. Know what steps your company can take to ensure you get the most out of outsourcing FBAP.
Security in the Software Development Lifecycle
Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to
in the Software Development Lifecycle Application security is an important emerging requirement in software development. This article introduces CLASP, an application security process and plug-in to IBM 's Rational Unified Process environment. It was developed by Secure Software, and gives organizations a structured way to address security concerns during the software development lifecycle.
Features and Functions
White Paper Newsletters