Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
1 - 25 of 530 Matches Previous Page  |  Next Page
5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.
Posted: 23 Sep 2016 | Published: 31 May 2016

Intel Security

Your Blueprint to Securing Your Public and Hybrid Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.

Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Analysts Reveal how to Secure SaaS
sponsored by Palo Alto Networks
WHITE PAPER: This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

TAG Cyber Report: 2017 Security Annual – Vol. 1
sponsored by Digital Guardian
WHITE PAPER: This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

Digital Guardian

How to Conquer Security on the Public, Private, and Hybrid Clouds
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Fortinet, Inc.

Companies, Digital Transformation and Information Privacy: The Next Steps
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Hewlett Packard Enterprise

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Questions to Ask Your Cloud Service Provider: Know how your Data will be Protected in the Cloud
sponsored by Intel Security
WHITE PAPER: As you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Intel Security

IoT: Internet of Things or Internet of Threats?
sponsored by Radware
WHITE PAPER: This research report aims to convey the challenges, threats, and opportunities that C-level security executives face when it comes to information security. Learn why the IoT is one of today's top concerns, and what organizations can do to ensure security.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Radware

Securing Microsoft Office 365 - The Inside Track To Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: This report explores Office 365 adoption concerns around issues such as threat protection, intelligence and response. Find out what additional security measures your organization can take to securely deploy Office 365 and reap its full benefits.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

Proofpoint, Inc.

How To Easily Start Your Implementation Planning for Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Uncover how to effectively plan for your enterprise's adoption of Office 365, and run through a comprehensive step-by-step to build your cloud "to-do" list.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Blue Coat Systems

Gain Complete Control of Your Digital Ecosystem
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

Can Enterprises Hire Their Way Out of Cloud Security Risks?
sponsored by Palerra Inc.
WHITE PAPER: This white paper explores the essential question: Can enterprises hire their way out of cloud security risks? As more employees connect their personal devices to your cloud environment, the answer to this question becomes even more crucial. Discover what roles hiring and automation are playing in mitigating cloud security risks.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Palerra Inc.

Why Cloud Virtualization Is the Best Fit for Your IT Future
sponsored by VMware
WHITE PAPER: When choosing a virtualization platform, there are 5 boxes you must check off before making a firm investment. Access this paper to discover a platform that keeps pace with all environments—including hybrid cloud—and which encompasses broad OS and app ecosystem support, lowers TCO, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

VMware

HEB Grocery Store Patches Office 365 Security Flaws
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
WHITE PAPER: Learn what IT pros are saying about Microsoft Azure and how it handles identity and access management, network security, data protection, and more. Discover how to gain insight on how your existing environment maps to potential public cloud offerings.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Softchoice Corporation

Deepen Visibility into Cloud and Hybrid IT with Unified Infrastructure Management
sponsored by CA Technologies
WHITE PAPER: Learn why it's recommended your organization extends the visibility of existing infrastructure tools with a unified, hybrid IT monitoring platform—providing visibility into traditional and next-generation technologies. Read on to take a unified approach to IT ops, and monitor all hybrid cloud, software-defined, and converged environments.
Posted: 07 Sep 2016 | Published: 30 Jun 2016

CA Technologies

The New Security Paradigm for Digital Government: Securing Data and Assets within an IT Ecosystem that Extends Beyond Agency Walls
sponsored by Unisys
WHITE PAPER: This white paper details why federal agencies are transitioning to digital environments, the new security risks these environments present, and how to protect sensitive information from unauthorized access.
Posted: 06 Sep 2016 | Published: 30 Jun 2016

Unisys

Transform Your Network. Transform Your Business
sponsored by Juniper Networks, Inc.
WHITE PAPER: Carefully planning your journey to the cloud is essential to your enterprise's continued success. This white paper details how 5 organizations used one unified network platform to easily construct an agile, secure, and cloud-enabled enterprise. Access now to learn about this platform and how it ensures a successful move to the cloud.
Posted: 06 Sep 2016 | Published: 31 May 2016

Juniper Networks, Inc.

Customize Email Security in a Private Cloud
sponsored by Intermedia
WHITE PAPER: Learn what managed public cloud, private cloud and hybrid cloud models can do for your organization's email security – as well as the criteria for choosing the one that's right for you. Access now to specifically uncover the benefits of a Dedicated Hosted Exchange.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Intermedia

Enterprise-grade Cloud Management for Openstack with Red Hat Cloudforms
sponsored by Red Hat
WHITE PAPER: Discover how to supplement OpenStack with essential, enterprise-grade cloud management and automation, thereby accelerating implementation and improving private and hybrid cloud manageability. Read on to find out more about this migration framework that additionally enables bimodal IT.
Posted: 01 Sep 2016 | Published: 31 Dec 2015

Red Hat

How to Secure Cloud Applications & Services
sponsored by Blue Coat Systems
WHITE PAPER: Discover the major points of an enterprise's transition to the cloud, and what they can do to make it a profitable and secure one. Learn about the shift in workloads, the evolution in the security stack, the challenges of deep visibility, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems

Safely Adopting Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to shore up your security measures to cover the gaps left by Office 365. Learn not only about the gaps themselves, but also what their ramifications are on a wider scale, how to take a wide angle viewpoint on the issues, how to stay compliant, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems
1 - 25 of 530 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement