Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Multimedia (View All Report Types)
1 - 25 of 128 Matches Previous Page  |  Next Page
Enterprise Cloud Communications: Run Your Business at Customer Speed
sponsored by 8x8, Inc.
VIDEO: In this video, you will learn how to combine the power of Salesforce with an enterprise cloud communications platform to deliver highly personalized customer service. Learn how to empower enterprise collaboration with the utmost security and availability by tuning in now.
Posted: 24 Nov 2015 | Premiered: 28 Jul 2015

8x8, Inc.

Security Has Failed Us - But it's not Too Late
sponsored by Unisys
VIDEO: Watch this brief video as security solutions expert Tom Patterson explains the failures of the security industry and how they've worsened due to new threats and environments. Tune in and discover the surprising way to overcome these failures.
Posted: 23 Nov 2015 | Premiered: 09 Nov 2015


The State of Security Today: What Needs to Change
sponsored by Unisys
VIDEO: This video discusses the state of security and what needs to change in order to keep our enterprises safe in today's environment. Watch now to learn how micro segmentation can minimize the damage of vicious threats and attacks.
Posted: 20 Nov 2015 | Premiered: 09 Nov 2015


Security into an IoT Device: Why & How?
sponsored by Inside Secure
WEBCAST: This webinar on December 8th will provide the valuable information needed to help you to understand just what the main IoT security concerns are and what to do about it. Sign up to this free webinar before November 30th and receive a free IoT Security for Dummies Book to download in December.
Posted: 19 Nov 2015 | Premieres: Dec 8, 2015

Inside Secure

IDC’s Top Ten IT Security Predictions for Asia-Pacific
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this video to uncover the top 10 IT Security predictions from IDC Asia Pacific's head of IT security research, Simon Piff. Tune in as he discusses the potential impact each projection will have on Asia Pacific markets.
Posted: 19 Nov 2015 | Premiered: 16 Nov 2015

RSA, The Security Division of EMC

Secure Your Private Cloud Infrastructure
sponsored by Oracle Corporation
WEBCAST: In this webcast, take a closer look at one private cloud infrastructure and how it can help you protect your sensitive data.
Posted: 17 Nov 2015 | Premiered: Nov 11, 2015

Oracle Corporation

Find The Right Cloud Service Provider For Your Organization
sponsored by VMware
VIDEO: Watch this brief video to examine a cloud network that provides customers with unprecedented levels of extensibility, flexibility, and choice of public and hybrid cloud services.
Posted: 16 Nov 2015 | Premiered: 03 Mar 2015


Security and Performance in One Cloud Infrastructure
sponsored by Oracle Corporation
VIDEO: This brief video explains how you can build a highly secure cloud infrastructure that offers equally effective performance.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Cloud Application Discovery, SSO, and Threat Prevention for Cloud Apps
sponsored by IBM
VIDEO: Watch this video, to hear about strategies for tackling cloud security challenges from cloud security expert Ravi Srinivasan.
Posted: 11 Nov 2015 | Premiered: 22 Sep 2015


The New Cloud Security Hero
sponsored by IBM
VIDEO: The following webinar features insights from industry leaders on the latest in cloud security developments. Learn three key ways to address your cloud security issues.
Posted: 10 Nov 2015 | Premiered: 10 Nov 2015


Cloud Data Encryption Made Easy
sponsored by Oracle Corporation
WEBCAST: This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Cloud Risk and Compliance
sponsored by
VIRTUAL ENVIRONMENT: This classroom examines the key cloud concerns and how to work with cloud service providers to ensure the safety of sensitive corporate assets.Moving enterprise workloads and data to the cloud doesn't remove IT's responsibility for security and regulation compliance.
Posted: 05 Nov 2015 | Premiered: 13 Oct 2015

Discovery, SSO, and Policy Enforcement Lets IT Security Say Yes to Cloud Apps
sponsored by IBM
VIDEO: Security-enforcing technology makes protecting the enterprise and providing innovation an achievable balance. Watch this video and discover how to minimize data mining and more effectively detect risks.
Posted: 05 Nov 2015 | Premiered: 22 Sep 2015


Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure
sponsored by Centrify Corporation
WEBCAST: Can workers really use their device of choice while still allowing IT to manage the device and secure the way users access corporate resources and applications? In this webcast, guest speaker IDC analyst Peter Linstrom will explore these needs as well as trends in how the marketplace is addressing these challenges.
Posted: 05 Nov 2015 | Premiered: Apr 2, 2015

Centrify Corporation

Smart Parking and the Evolution of the Hybrid Cloud Service Provider
sponsored by IBM
VIDEO: This video depicts smart parking as an example of cloud services allowing enterprises to access data in real time without having to worry about data protection or management challenges. Watch how hybrid cloud service providers are evolving to providing more services that can make your enterprise's data processes efficient and easy to manage.
Posted: 29 Oct 2015 | Premiered: 09 Jun 2015


Case Study: Using PaaS to Accelerate App Development
sponsored by Oracle Corporation UK Ltd
VIDEO: In this video, a developer of enterprise applications discusses the top challenges his organization faced, and why his IT team selected a Platform as a Service (PaaS) solution to speed app development and simplify management.
Posted: 26 Oct 2015 | Premiered: 29 Sep 2014

Oracle Corporation UK Ltd

The Cloud is Casting a Shadow Over IT
sponsored by Centrify Corporation
WEBCAST: In the following webinar, join Chris Christiansen, Program Vice President for IDC's Security Product and Services Group, and Chris Webber, Security Strategist from Centrify, as they discuss shadow IT and the many problems it can bring to the table. Tune in now and uncover insights into how to overcome these issues.
Posted: 23 Oct 2015 | Premiered: Oct 23, 2015

Centrify Corporation

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015


Shielding Office 365 from Advanced Threats
sponsored by Proofpoint, Inc.
WEBCAST: Office 365 comes with built-in security features, but relying on those alone won't protect your data. In this webinar, learn how to secure your Office 365 environment and defend users and data from advanced threats and phishing attacks.
Posted: 22 Oct 2015 | Premiered: Oct 13, 2015

Proofpoint, Inc.

Cloud IAM is Set to Break the Sound Barrier
sponsored by Centrify Corporation
WEBCAST: Join guest speaker Andras Cser, VP, Principal Analyst serving security and risk professionals from Forrester Research, and Chris Webber, Security Strategist from Centrify, as they walk through key trends and guidance for the Cloud IAM market.
Posted: 20 Oct 2015 | Premiered: Apr 2, 2015

Centrify Corporation

Employing Video Collaboration in the Fight Against Cancer: A Case Study
sponsored by VBrick
WEBCAST: In this webcast, John Maass, Manager of Conferencing Technology IT Infrastructure & Operations at the Moffitt Cancer Center, demonstrates how his team harnessed the power of video and streaming to capture and present their town hall meetings. Learn how to unify and store your enterprise information in the cloud.
Posted: 08 Oct 2015 | Premiered: Oct 8, 2015


Trusted Computing in a Hybrid Cloud Environment
sponsored by Intel and IBM
WEBCAST: In this extensive webcast, learn the 4 challenging questions consumers ask when considering a cloud migration, and how to lay their fears to rest that their data will remain safe. View now to learn how to remain compliant with data privacy laws when data is moved to the cloud.
Posted: 05 Oct 2015 | Premiered: Jun 11, 2015

Intel and IBM

Hybrid Cloud Security
sponsored by
VIRTUAL ENVIRONMENT: The cloud-based security services market is booming, as enterprises adopt email, Web security, and identity and access management SaaS. How can CISOs best combine cloud-based security controls with on-premises security programs? This supercast looks at the latest cloud security services and best practices.
Posted: 24 Sep 2015 | Premiered: 17 Sep 2015

Building an Outcome Based Strategy and the Benefits of Cloud Outsourcing
sponsored by Dell, Inc.
WEBCAST: Guy Currier, Director of Global Cloud Solutions Marketing at Dell, examines the benefits and challenges of cloud outsourcing services, and explains how to build an outcome based strategy for IT organizations. View now to foster greater relationships between your IT and business members.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

Dell, Inc.

Leveraging IT Trends: The Benefits and Challenges of Cloud Outsourcing
sponsored by Dell, Inc.
WEBCAST: In this webcast, Guy Currier, Director of Global Cloud Solutions Marketing at Dell, addresses how to leverage the new IT trends concerning cloud sourcing, and the benefits and challenges contained therein. View now to see why companies are placing a high stake in service-centric automation.
Posted: 21 Sep 2015 | Premiered: Sep 21, 2015

Dell, Inc.
1 - 25 of 128 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement