Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
1 - 25 of 505 Matches Previous Page  |  Next Page
Maximizing Benefits and Controlling Risk in the Cloud
sponsored by Codero
WHITE PAPER: As more organizations shift to the cloud, how can you maximize the return on your investment? What kinds of risks are you going to have to manage? Access this white paper to learn about the concepts and principles underlying success in the cloud through effective resource management.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Codero

Protecting Data in the Healthcare Industry
sponsored by Mimecast
WHITE PAPER: The healthcare industry finds itself under cyberattack from many vectors, including ransomware, malware and targeted attacks. Read this white paper to determine strategies to secure your data.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Mimecast

Why Taking a Unified Approach is Essential to Hybrid Cloud Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this complimentary white paper to gain a greater understanding of how you can craft a strategy to keep your hybrid cloud secure.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Juniper Networks, Inc.

Data Loss Prevention – Now with CASB
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Data is maliciously targeted through cloud applications. Check out this white paper to determine strategies using DLP and CASB to protect yourself from the cloud.
Posted: 22 Aug 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

A Comprehensive Overview of the Hybrid Cloud
sponsored by Codero
WHITE PAPER: You know how hybrid cloud works in theory, but do you know what to look for or what to do when you implement it? Access this hybrid cloud planning guide to learn what to look for in a hybrid cloud platform, what makes a cloud adoption successful, and the benefits of the strategy.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Codero

SafeNet Authentication Service: Affordable, flexible, cloud-based authentication
sponsored by Gemalto
WHITE PAPER: When evaluating authentication tools, the choice is not just about security: deployment, management, and cost considerations are important factors as well. Read this white paper to discover how cloud-based authentication can provide protection while saving you money.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Gemalto

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec & Blue Coat Systems

macOS Security Checklist
sponsored by JAMF
WHITE PAPER: The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. Download this white paper to discover how to implement the organizations security recommendations.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Why Enterprises Fear Vendor Lock-in And Avoid Running Sensitive Data In The Public Cloud
sponsored by Stratoscale
WHITE PAPER: The biggest concern preventing companies from placing their mission-critical data and apps in the public cloud isn't security, it's vendor lock-in. Access this white paper to learn how to work around these concerns while still benefiting from the cloud.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Stratoscale

Machine Learning in Cyber Security
sponsored by Recorded Future
WHITE PAPER: AI systems are helping security operations centers function quicker and assess problems faster. Read this white paper to discover how your security posture can benefit from predictive analytics and threat intelligence.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

Unified Endpoint Management: Security & Productivity for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: In the era of the evolution of mobile devices and BYOD, client management tools must evolve in order to enhance security platforms. Read this white paper to find out how to provide security to your device's operating system using UEM.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Citrix

The New Face of Cloud-Based Access management
sponsored by Gemalto
WHITE PAPER: Each new app added to your cloud environment only enhances cloud and compliance risks. Read on to learn about a system that addresses these challenges by combining the convenience of single sign-on with granular access policies.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Gemalto

Hybrid Active Directory Security and Governance
sponsored by Quest
WHITE PAPER: Discover how to know in real time when suspicious activities occur in the cloud and on your Microsoft Active Directory by improving your security posture.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Quest

A Tactical Guide to Finding the Right IDaaS Provider
sponsored by Simeio
WHITE PAPER: The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This 3-part e-book can answer some of your top questions and help you choose the right IDaaS provider for your organization.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Simeio

Strengthen Your Defenses Against Cybercrime
sponsored by Mimecast
WHITE PAPER: Despite the fact that email-borne attacks are a real threat, many organizations aren't confident in their ability to spot or stop one. Read this whitepaper to discover how build a cybersecurity plan that will enhance your email security.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Mimecast

4 Steps to Cloud Access Management
sponsored by Gemalto
WHITE PAPER: While more organizations than ever are leveraging cloud-based services, that doesn't reduce security issues, it simply creates new ones. In this white paper, learn 4 easy steps to gain full cloud access control to help you keep your environment safe a profitable.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Gemalto

Accelerate Your Glide Path to AWS Cloud Migration
sponsored by Rackspace
WHITE PAPER: Learn how to take your cloud strategy to the next level in this resource, which will help you plan your AWS cloud migration. By reading on, you'll gain access to advice on app migration paths, improving app security, and when to involve a migration partner.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Rackspace

It's Time to Replace your Antivirus
sponsored by Carbon Black
WHITE PAPER: Discover how the NGAV approach incorporates endpoint security that goes beyond malware to protect its users while integrating features that target tools, techniques, tactics, and procedures.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Carbon Black

Remedying the Email Security Gaps in Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Private Cloud Users Stack Up Third-Party Platform Delivery vs. DIY
sponsored by Red Hat
WHITE PAPER: With so many OpenStack distributions to choose from, do you know which use cases will help you best realize OpenStack success? Read this research paper, in which 2 separate case studies detail the way in which an OpenStack cloud was deployed, the workloads to which that compute power is deployed, and the tools supporting the environment.
Posted: 11 Aug 2017 | Published: 31 Dec 2016

Red Hat

Cloud Security: 2017 Spotlight Report
sponsored by Quest
WHITE PAPER: Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Quest

10 Steps to Success with Public Cloud Adoption
sponsored by Rackspace
WHITE PAPER: This white paper lays out 10 steps to a successful public cloud adoption. Inside, you will learn everything you need to know to get your public cloud initiative off the ground, from building a business case to executing your migration.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Rackspace

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect

Overcome Security Barriers to the Cloud
sponsored by Commvault
WHITE PAPER: Learn how to enable data security features in the cloud to avoid costly data breaches. As a bonus, discover 4 other barriers to the cloud and how to overcome these challenges.
Posted: 09 Aug 2017 | Published: 31 Dec 2015

Commvault
1 - 25 of 505 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement