All resources sponsored by:

CloudPassage

20 Matches
The Key to Cloud Security Compliance: Optimizing Cloud Infrastructure Security Programs
sponsored by CloudPassage
EGUIDE:In this exclusive e-guide, you will learn why SaaS vendors bear a heavy compliance burden for cloud security. Access now to determine which policies and security controls you should include in your cloud infrastructure security program to prevent cloud security compromises.
Posted: 29 Jan 2016 | Published: 29 Jan 2016
Get This Now


The CISO Role and the Ups and Downs of Cloud Compliance
sponsored by CloudPassage
EGUIDE:In this exclusive e-guide, you will learn about the shifting roles of the chief information security officer (CISO), as well as how to extend cyber and cloud security concerns beyond your IT department to permeate all layers of leadership. Access this guide in addition to see experts highlight the ups and downs of cloud compliance.
Posted: 28 Jan 2016 | Published: 31 Dec 2015
Get This Now


How the Server Revolution is Transforming Traditional Security & 7 Best Practices to Move Faster
sponsored by CloudPassage
RESOURCE:This blog outlines 7 best practices for securing virtual servers. Read on to learn about how to best protect cloud data and simplify virtual security management.
Posted: 21 Jan 2016 | Published: 25 Sep 2015
Get This Now


You Can’t Secure What You Can’t See: 7 Rules to Achieve Visibility in Virtual Infrastructure
sponsored by CloudPassage
RESOURCE:This blog post outlines 7 tips for increasing visibility in virtual environments for better security. Read on to learn about how to gain continuous visibility with comprehensive security functions.
Posted: 20 Jan 2016 | Published: 22 Sep 2015
Get This Now


Security Breaks DevOps – Here’s How to Fix It
sponsored by CloudPassage
WHITE PAPER:This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 20 Jan 2016 | Published: 14 Jul 2015
Get This Now


Docker and Enterprise Security: Establishing Best Practices
sponsored by CloudPassage
NEWSLETTER:This blog entry discusses the best way to implement a security structure using virtualized containers. Access now to see how to put containers into place in a way that fortifies security while increasing system speed.
Posted: 19 Jan 2016 | Published: 21 Oct 2015
Get This Now


Why Platforms Beat Tools: The Case for Strategic Thinking Around Security
sponsored by CloudPassage
NEWSLETTER:This blog entry discusses why choosing a platform for your security is preferable to implementing a patchwork of individual tools. Find out the benefits modern security platforms can offer your organization, including what you should look for before buying.
Posted: 19 Jan 2016 | Published: 17 Nov 2015
Get This Now


Containers and the Cloud: Overcoming Security Concerns
sponsored by CloudPassage
WEBCAST:This webcast contains a discussion of a cloud security innovation, containerization.
Posted: 19 Jan 2016 | Premiered: Dec 31, 2015
Get This Now


Security Breaks DevOps: Here's How Fix It
sponsored by CloudPassage
WEBCAST:This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 18 Jan 2016 | Premiered: Dec 30, 2015
Get This Now


How Enterprises Are Attacking the Cloud Security Challenge
sponsored by CloudPassage
WEBCAST:The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.
Posted: 15 Jan 2016 | Premiered: Dec 23, 2015
Get This Now


Best Practices for Securing AWS Instances
sponsored by CloudPassage
WEBCAST:In this webcast, security pros will explore the security challenges AWS computing presents and offer 7 best practices to secure your cloud environments faster. Watch now to learn more.
Posted: 15 Jan 2016 | Premiered: Dec 4, 2015
Get This Now


Forrester Market Overview: Cloud Workload Security Management Solutions - Automate or Die
sponsored by CloudPassage
WHITE PAPER:This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 13 Jan 2016 | Published: 02 Jun 2015
Get This Now


The Perceived Effectiveness of Traditional Security Solutions in the Cloud
sponsored by CloudPassage
WHITE PAPER:The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jan 2016 | Published: 30 Jun 2015
Get This Now


How Enterprises Are Attacking the IT Security Challenge
sponsored by CloudPassage
WHITE PAPER:This white paper will demonstrate the increasing complexity of managing IT security, spending trends, challenges and vulnerabilities.
Posted: 13 Jan 2016 | Published: 04 Sep 2015
Get This Now


SANS Institute Survey: Orchestrating Security in the Cloud
sponsored by CloudPassage
ANALYST REPORT:Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 13 Jan 2016 | Published: 30 Sep 2015
Get This Now


Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST:This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015
Get This Now


Don't Let Manual Processes Hold Up Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER:This white paper explores the challenges of cloud compliance and gives advice for meeting these challenges. Learn how you can make compliance simple, even in cloud and virtual environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015
Get This Now


Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER:Find out how you can avoid risk and gain complete visibility, no matter which cloud or virtual infrastructure you are using: public, private, hybrid, multi-cloud or virtualized data center. Learn how you can automate security and compliance for your infrastructure and feel confident you critical assets are protected.
Posted: 15 Jul 2015 | Published: 15 Jul 2015
Get This Now


Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST:This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015
Get This Now


Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE:This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014
Get This Now


20 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement