Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
1 - 25 of 422 Matches Previous Page  |  Next Page
Securing the Enterprise: 5 Key IT Challenges
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the five main challenges facing security professionals today. Read on to learn more about the causes of these security problems – and how you can overcome them.
Posted: 21 Jul 2015 | Published: 31 Dec 2013

Symantec Corporation

Strong Authentication without a Password
sponsored by Symantec Corporation
WHITE PAPER: This infographic explains how you can achieve strong authentication that's based on more than a simple password.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

Symantec Corporation

Securing your Enterprise in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper addresses the issue of cloud security and discusses how you can invest in the cloud without putting your business at risk.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Symantec Corporation

Mapping the Cloud Maturity Curve: Adapting to the New Era
sponsored by IBM
WHITE PAPER: The following analysis of cloud maturity is based on findings from 784 surveyed IT leaders around the globe. Access now to unlock five key fundamentals of cloud maturity, from aligned strategy to good governance.
Posted: 17 Jul 2015 | Published: 31 Dec 2015

IBM

Cloud Maturity: Measuring Organizational Excellence in the New Era of IT
sponsored by IBM
WHITE PAPER: This white paper discusses the results of a study showing how cloud maturation can benefit businesses. Read on to learn about what IT departments must do to ensure the security and privacy of the cloud, as well as how to translate the cloud into meaningful innovation.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

IBM

Cloud Computing Security - Public vs. Private Cloud Computing
sponsored by Parallels, Inc.
WHITE PAPER: Access this white paper to learn the differences between the security of private and public cloud environments and how this affects where applications are installed – either locally on a workstation or virtualizing them through the cloud.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Parallels, Inc.

Forrester Market Overview: Solutions for Cloud Security Management
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 16 Jul 2015 | Published: 02 Jun 2015

CloudPassage

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses what the changes in enterprise IT mean for implementing smart authentication practices.
Posted: 16 Jul 2015 | Published: 31 Oct 2013

Symantec Corporation

Cloud Vs. Data Center: Inside Look Into Security
sponsored by CloudPassage
WHITE PAPER: This insightful 35-minute web seminar explores the origin of the myth that data is safer on premise than in the cloud and offers top requirements for security in the cloud.
Posted: 16 Jul 2015 | Published: 31 May 2015

CloudPassage

The Benefits of Cloud-Based Authentication
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper describes the benefits of adopting a cloud-based authentication infrastructure.
Posted: 16 Jul 2015 | Published: 31 Jan 2012

Symantec Corporation

Deployment Practices and Guidelines for NetScaler 10.5 on Amazon Web Services
sponsored by Citrix
WHITE PAPER: This white paper discusses how you can build an AWS infrastructure using NetScaler to maximize your business benefits.
Posted: 16 Jul 2015 | Published: 16 Jul 2015

Citrix

The Identity Imperative in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to discover the importance of identity management in the cloud and to learn how you can maintain security despite the rapidly disappearing network perimeter.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Symantec Corporation

Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: This white paper explains how implementing an automated, cloud-centric security platform can help you keep you cloud infrastructure secure from any threat.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Don’t Let Security Technology Put the Brakes on DevOps
sponsored by CloudPassage
WHITE PAPER: This white paper explains how a cloud-based security and compliance platform can help you maintain strong security without sacrificing DevOps productivity.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

A Case for Chrome in the Enterprise
sponsored by Cloud Sherpas
WHITE PAPER: Access this white paper to learn about Chrome – the operating system designed for the modern internet that resolves issues associated with traditional PC models. Inside you'll discover an introduction to Chrome, including advanced use cases and the changes that have led to Chrome.
Posted: 14 Jul 2015 | Published: 14 Jul 2015

Cloud Sherpas

The Dawn of Hybrid Cloud WAF
sponsored by Radware
WHITE PAPER: This white paper outlines the 3 reasons why most clouds are shifting to a hybrid state, and how to protect them. Read on for important questions to ask during the migration process including, as well at an in-depth look at cloud WAF, application protection, and more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

Radware

Take Back Control with Centralized Cloud Management
sponsored by Dimension Data
WHITE PAPER: This expert white paper examines how IT can help organizations take back control of the cloud by aggregating multiple cloud solutions and centralizing cloud management.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

Dimension Data

Top 4 Security Concerns of the SaaS Delivery Model
sponsored by SAP
WHITE PAPER: This white paper addresses security concerns brought forth by cloud and SaaS models, including identity management, data storage, and data transmission. Learn the imperatives of built-in security features when it comes to your deployment.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

SAP

Hybrid IT: The Cloud of the Future
sponsored by Datapipe
WHITE PAPER: This white paper explores the hybrid cloud model and its advantages over purely private or public approaches.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

Datapipe

A Focus on Cloud Security, So You Can Focus on Business
sponsored by SAP
WHITE PAPER: This white paper stresses the critical importance of information protection in a cloud environment. Discover ways to implement security controls and practices in your SaaS strategy.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

SAP

SMBs: Are You Considering the Cloud for Security?
sponsored by Dell Software
WHITE PAPER: This essential white paper explores how a cloud-based service can provide always up-to-date security for SMBs.
Posted: 06 Jul 2015 | Published: 25 Apr 2015

Dell Software

Is Your Infrastructure Holding You Back?
sponsored by IBM
WHITE PAPER: This expert e-book will help you connect the dots between today's biggest business opportunities and the specific infrastructure technology required to seize them.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

IBM

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 02 Jul 2015 | Published: 28 Feb 2014

Mimecast

Identify, Mitigate Shadow IT with a Cloud Risk Assessment
sponsored by IBM
WHITE PAPER: This 50-attribute evaluation offers a snapshot of your data with insights on your organization's usage of cloud services and the risks associated with each service.
Posted: 29 Jun 2015 | Published: 31 Dec 2014

IBM

What Consumers Believe About Cloud File Sharing & Why That’s a Warning to IT Pros
sponsored by WinMagic
WHITE PAPER: This white paper explores the pros and cons of three file sync and share security strategies. Continue reading to learn the 3 crucial aspects for securing files destined for the cloud and how to appropriately evaluate the risks of cloud file sync and share approaches.
Posted: 26 Jun 2015 | Published: 20 Apr 2015

WinMagic
1 - 25 of 422 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement