Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
1 - 25 of 516 Matches Previous Page  |  Next Page
Big Data in the Cloud: Moving at the Pace Your Business Demands
sponsored by IBM
WHITE PAPER: Learn how you can safely and reliably move large files and datasets to, from, and across the cloud at maximum speed. This paper also highlights 5 key technological capabilities that can help you move big data at the speed your business demands.
Posted: 30 Jun 2016 | Published: 31 Jul 2015

IBM

Connected Health Cloud (CHC)
sponsored by CloudMine
WHITE PAPER: In this blog post identify the hurdles and locate solutions to create a truly predictive and personalized patient experience.
Posted: 29 Jun 2016 | Published: 29 Feb 2016


A Case Study For: Rivo Software
sponsored by Rackspace
WHITE PAPER: In order to maximize their AWS investment, Rivo decided to leverage a support partner who could offer agility to experiment while ensuring compliance. Learn how Rivo was able to set their software platform up for success with the partner they chose.
Posted: 24 Jun 2016 | Published: 30 Nov 2015

Rackspace

A Case Study For: Q4 Inc.
sponsored by Rackspace
WHITE PAPER: Find out how Q4 optimized its processes by partnering with an AWS support provider, ultimately ensuring consistent uptime for their platform, data security, compliance, and better engagement with customers while lowering costs.
Posted: 24 Jun 2016 | Published: 24 Jun 2016

Rackspace

Build, Manage, and Secure Your Cloud Infrastructure
sponsored by TechData Corporation
WHITE PAPER: With 81% of US companies already using public cloud services, your business is most likely working with a cloud service or planning on working with a cloud service in the near future. Read this white paper that provides detailed explanations of public cloud services to ensure your business is utilizing the best one.
Posted: 23 Jun 2016 | Published: 02 May 2016

TechData Corporation

Cloud Client Presentation
sponsored by TechData Corporation
WHITE PAPER: With a multitude of hybrid cloud services out there, you want to make sure your business chooses the service that fits for now and the future. Make an informed decision, by reading this white paper that details the advantages of adopting the hybrid cloud as well as new software that it is being paired with for increased functionality.
Posted: 22 Jun 2016 | Published: 31 Dec 2015

TechData Corporation

Database on Cloud: Fast, Simple, Economical, and Secure
sponsored by IBM
WHITE PAPER: This data sheet explores databases available on demand as a cloud service. Designed with security in mind, you'll uncover the variety of advantages from leveraging this nontraditional approach to database management.
Posted: 21 Jun 2016 | Published: 30 Sep 2015

IBM

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Simplify the Move Into Hybrid Cloud
sponsored by Techdata/IBM
WHITE PAPER: Without proper information on hybrid cloud services, you could be choosing a service that barely benefits your business. Read this white paper for detailed information on hybrid cloud services, and how you can simplify the move to the hybrid cloud.
Posted: 21 Jun 2016 | Published: 02 May 2016

Techdata/IBM

IBM Security QRadar Incident Forensics
sponsored by IBM
WHITE PAPER: Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2014

IBM

Cybersecurity Predictions for 2016
sponsored by Global Knowledge
WHITE PAPER: Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Global Knowledge

The State of Dynamic Data Center and Cloud Security in the Modern Enterprise
sponsored by Illumio
WHITE PAPER: In this report, witness key findings drawn from the SANS Dynamic Data Center Survey about modern security concerns with the transition to a hybrid data center environment, dynamically developing security changes, strategies to protect data in a hybrid environment, and more.
Posted: 14 Jun 2016 | Published: 31 Oct 2015

Illumio

How to Build a Private Cloud: A Step-by-Step Guide
sponsored by Stratoscale
WHITE PAPER: Discover a step-by-step guide on how to architect a private cloud for your organization. Read on to ensure your private cloud meshes with existing DevOps automation approaches and build a cloud that meets your specific workload requirements.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Stratoscale

THE FIVE NEW RULES TO SECURE DYNAMIC DATA CENTERS AND CLOUDS
sponsored by Illumio
WHITE PAPER: The current security model for protecting applications in data centers and clouds is broken. We need an approach to security that protects from the inside out, and decouples security from the underlying infrastructure. Discover the 5 new rules to secure dynamic data centers and clouds in this white paper.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

Innovation and Choice for Meditech
sponsored by Pure Storage
WHITE PAPER: Businesses have been stuck in clumsy storage cycle, pushing organizations to check out cloud based options. But these are limited by strict regulations of data security-control. You may need is a cloud-like cost model with the security of an onsite solution. Read this white paper to learn about one such solution.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Pure Storage

2016 Security Buyer's Guide
sponsored by Illumio
WHITE PAPER: Access a step-by-step guide, complete with checklists, for adaptive security buyers in 2016. This guide will allow enterprises to pre assess their security posture, discover gaps, and evolve their strategy to better suit the hybrid-cloud environment.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

Modern Adaptive Security
sponsored by Illumio
WHITE PAPER: Discover how the need for more segmentation, protecting high-value assets, and meeting stricter compliance rules will shift how security budgets are allocated in the near-future.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

An Exclusive Look at How the Top Nine Private Cloud Software Suites Stack Up
sponsored by Red Hat
WHITE PAPER: In this Forrester white paper, examine the top 9 most significant private cloud software providers, and discover the pivotal reasons for increased private cloud adoption in 2016. Read on to see which vendors are leading the pack, and assist your I&O professionals in selecting the optimum solution for your cloud initiative.
Posted: 13 Jun 2016 | Published: 19 Jan 2016

Red Hat

Get the Right Cloud for Your Applications and Deliver Business Results Fast
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: In this white paper, learn how a preconfigured cloud storage option can be tailored to meet your specific strategic performance, capacity, security, and cost requirements. Additionally, explore the technology behind this option, as well as case studies from a variety of organizations who have already adopted it.
Posted: 08 Jun 2016 | Published: 08 Jun 2016

Dell, Inc. and IntelĀ®

Three Key Considerations in Securing the Software-Defined Data Center (SDDC)
sponsored by Intel Security
WHITE PAPER: The deployment of proven technologies to protect private or hybrid cloud environment and/or a software-defined data center (SDDC) is vital. Discover three critical steps that enterprises can adopt and adhere to ensure both data and the data center are protected from both internal/external threats.
Posted: 08 Jun 2016 | Published: 31 Mar 2015

Intel Security

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

Top 5 Considerations in Transitioning to SDN for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Software-defined networking is an important enabling technology for the digital workplace. By the end of 2020, it is expected to impact about 80% of network purchase decisions. Access this white paper to explore the top five factors you should consider as you transition to SDN.
Posted: 07 Jun 2016 | Published: 07 Jun 2016

Aruba Networks

Agile Security at the Speed of Modern Business
sponsored by CloudPassage
WHITE PAPER: An agile security solution implements orchestration and automation to keep up with diverse, fluid and fast-moving infrastructures. Learn how agile security can empower your CISO and their teams to move at the speed of modern business and become enablers of innovation and growth.
Posted: 07 Jun 2016 | Published: 01 May 2016

CloudPassage

Secure the Network On-Premise, Site-to-Site, and in the Cloud
sponsored by Unisys
WHITE PAPER: Whether on-promise or remote, devices that find their way into your organization's communication paths should be cautiously welcomed at best. Explore micro-segmentation and endpoint protection strategies for cloud-based businesses.
Posted: 05 Jun 2016 | Published: 05 Jun 2016

Unisys
1 - 25 of 516 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement