All resources sponsored by:

Trend Micro

21 Matches
Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
TRANSCRIPT:This podcast transcript will detail the new security practices you need to put into place when you move to the cloud.
Posted: 11 Jun 2014 | Published: 11 Jun 2014
Get This Now


Balancing Risk with Agility: Best Practices for Securing Public Cloud Deployments
sponsored by Trend Micro
PODCAST:This exclusive webcast will give you key advice for ensuring the security of your data and applications in the cloud.
Posted: 04 Jun 2014 | Premiered: May 30, 2014
Get This Now


Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST:Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)
Get This Now


Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER:This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014
Get This Now


Best Practices for Security and Compliance with Amazon Web Services
sponsored by Trend Micro
WHITE PAPER:This resource sheds light on the latest expectations for cloud security, and what role providers and customers have in securing a cloud environment. Click through to reveal 12 steps to a successful secure cloud adoption.
Posted: 15 May 2014 | Published: 31 Dec 2013
Get This Now


Trend Micro Deep Security: VMWare vSphere with Operations Management
sponsored by Trend Micro
WHITE PAPER:This informative resource introduces a security and operations management solution that protects virtualized datacenters and desktops from the latest threats. Read on to learn how this solution can help your organization address 5 main areas of concern, including security, business continuity, and 3 more.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
Get This Now


Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers
sponsored by Trend Micro
WHITE PAPER:In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption.
Posted: 18 Dec 2013 | Published: 18 Dec 2013
Get This Now


Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER:This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012
Get This Now


Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER:Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013
Get This Now


IT Decision Checklist: Virtual Desktop Infrastructure Security
sponsored by Trend Micro
EGUIDE:Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.
Posted: 02 Nov 2010 | Published: 02 Nov 2010
Get This Now


The True Costs of E-mail Encryption
sponsored by Trend Micro
WHITE PAPER:Currently, e-mail encryption is a bit of a paradox. Large organizations understand and want privacy, but e-mail encryption technology is too in-depth for mass usage. Fortunately things are changing. Read this paper to learn so much more.
Posted: 11 Aug 2010 | Published: 11 Aug 2010
Get This Now


Meeting the challenges of virtualisation security
sponsored by Trend Micro
WHITE PAPER:Your organisation needs to consider which security mechanisms can best protect both physical and virtual servers, particularly as a virtualised architecture fundamentally affects how mission-critical applications are designed, deployed and managed. Download this white paper to find out more about real solutions to these challenges.
Posted: 04 Aug 2010 | Published: 01 Aug 2009
Get This Now


TechTarget ANZ Securing Virtualised Data Centres E-Book
sponsored by Trend Micro
EBOOK:Virtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them.
Posted: 04 Aug 2010 | Published: 04 Aug 2010
Get This Now


ZeuS: A Persistent Criminal Enterprise
sponsored by Trend Micro
WHITE PAPER:This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.
Posted: 11 May 2010 | Published: 24 Mar 2010
Get This Now


Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO:Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 21 Apr 2010 | Premiered: 14 Apr 2010
Get This Now


Data Sheet: Trend Micro Deep Security 7
sponsored by Trend Micro
DATA SHEET:This data sheet outlines the benefits of Trend Micro Deep Security, which provides server security in physical, virtual, and cloud computing environments. This comprehensive solution also protects applications, operating systems, web applications, and enterprise systems from attacks.
Posted: 14 Apr 2010 | Published: 21 Oct 2009
Get This Now


Case Study: Physician Organization Secures VMware Virtualized Environment with Trend Micro Deep Security 
sponsored by Trend Micro
CASE STUDY:This case study illustrates how a physicians' organization providing medical management services to 1,500 members was able to introduce Trend Micro's Deep Security solution and achieve increased security, increased flexibility, reduced costs, streamlined administration, and easy scalability.
Posted: 14 Apr 2010 | Published: 26 Oct 2009
Get This Now


Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO:Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 14 Apr 2010 | Premiered: 14 Apr 2010
Get This Now


Protecting the Dynamic Datacenter
sponsored by Trend Micro
WHITE PAPER:Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more!
Posted: 17 Mar 2010 | Published: 01 Aug 2009
Get This Now


Server and Application Protection - Behind the Lines
sponsored by Trend Micro
WHITE PAPER:For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software.
Posted: 17 Mar 2010 | Published: 01 Feb 2009
Get This Now


Virtualization Security: Achieving Compliance for the Virtual Infrastructure
sponsored by Trend Micro
WHITE PAPER:What’s top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren't articulating the ways in which their products can help enterprises address compliance concerns. Read this paper to learn about top trends in virtualization security, how virtualization poses unique challenges to compliance, and more!
Posted: 17 Mar 2010 | Published: 01 Dec 2009
Get This Now


21 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement