Check up on IT security services for your clients

Use these easy-to-scan checklists to get a valuable overview of key IT security topics in the minimum amount of time.

Looking for a quick and easy way to provide added value to your clients? Look no further than our Channel Checklists. These easy-to-scan checklists provide a valuable overview of key security topics that give you the maximum amount of usable information in the minimum amount of time. To make our Channel Checklists even more accessible, we offer all of them as easy-to-download PDFs that you can print out and bring with you to client sites. Email us your requests for more Channel Checklists, and check back here for more installments in the series.

Five steps to assessing a customer's antivirus protection

One of the most important security issues service providers and value-added resellers (VARs) can discuss with customers is their antivirus protection strategy. This Channel Checklist provides five steps to walk through with customers to gain a better understanding of their antivirus protection strategy and to help correct deficiencies.

How to prepare for network penetration testing services

As value-added resellers (VARs) diversify from pure product resales to professional services, they begin to navigate new waters. One common service offering is security assessment, such as network penetration testing, or pen testing. Pen testing involves exploiting holes in a customer's network to determine its absolute level of security. This Channel Checklist provides five steps to help VARs prepare to offer penetration testing services.

This was first published in March 2008

Dig deeper on Threat management and prevention

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close