Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
126 - 150 of 537 Matches Previous Page  |  Next Page
Attaining Real Opportunity for MSPs: Cloud Infrastructure as End-to-End systems
sponsored by LogicNow
WHITE PAPER: With more and more clients wanting greater services from their MSPs, providers have real opportunity in managing both on premises and cloud infrastructure as end-to-end systems. This white paper examines how it can be done with the right ecosystem of tools. Read on to find out more.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

LogicNow

Protecting Business Critical Services – Email
sponsored by LogicNow
WHITE PAPER: This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

A Balanced Approach to Cloud Storage
sponsored by Cloudian
WHITE PAPER: This white paper highlights the advantages of leveraging a hybrid cloud solution that enables enterprises to benefit from the cost-efficiency and capacity of a public cloud and the security of a private cloud. Access now to see how balancing your cloud storage can enable your enterprise to keep the hard and soft costs of cloud under control.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

Cloudian

Top 5 Considerations in Transitioning to SDN for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Software-defined networking is an important enabling technology for the digital workplace. By the end of 2020, it is expected to impact about 80% of network purchase decisions. Access this white paper to explore the top five factors you should consider as you transition to SDN.
Posted: 29 Mar 2016 | Published: 23 Mar 2016

Aruba Networks

Achieve Compliance and Cost Control
sponsored by Matrix42
WHITE PAPER: Cloud computing, in spite of being only about ten years old, continues to gain market share in the enterprise. Analyst house Market Research Media estimates that the global cloud computing market will grow at a 30% CAGR, reaching $270 billion in 2020.
Posted: 18 Mar 2016 | Published: 29 Dec 2015

Matrix42

Network-based Security: Global Visibility is the Difference
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Point security solutions aren't enough to keep up with increasingly diverse and sophisticated cyberthreats. Access this brief resource to learn how a network-based security strategy can detect threats and stop them before they affect your business.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Your Cloud Success Requires Network Strength
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This short resource discusses how you can adapt your network strategy to leverage the strength of hybrid clouds while more effectively protecting your business-critical applications.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Level 3 Communications, Inc.

Database on Cloud: Fast, Simple, Economical, and yes, Secure
sponsored by IBM
WHITE PAPER: This data sheet explores databases available on demand as a cloud service. Designed with security in mind, you'll uncover the variety of advantages from leveraging this nontraditional approach to database management.
Posted: 10 Mar 2016 | Published: 30 Sep 2015

IBM

Botnet Research Report
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This research report takes a closer look at botnets that are used to deploy malware, use cases to help you understand what you should expect from your network service providers, and the need for greater levels of partnership and collaboration across the security community to safeguard the Internet more effectively.
Posted: 07 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Backup and Disaster Recovery Plans Get Cloudy
sponsored by Dimension Data
WHITE PAPER: In this resource, you will explore a host of modern approaches to backup and disaster recovery, and learn how to move elements of your environment to the cloud and manage your hybrid IT infrastructure. Read on to gain and maintain visibility of your entire backup and disaster recovery environment.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

Dimension Data

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

Top 3 Cloud Trends to Watch in 2016
sponsored by Dimension Data
WHITE PAPER: This brief white paper takes a closer look at the top 3 cloud computing trends to watch in 2016. Access now to see where the cloud market is headed, and learn how you can leverage these trends in your IT infrastructure.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Dimension Data

The Cloud App Visibility Blindspot
sponsored by Imperva
WHITE PAPER: Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."
Posted: 11 Feb 2016 | Published: 16 Sep 2015

Imperva

Best Practices For Public Cloud Security
sponsored by TrendMicro
WHITE PAPER: This white paper discusses the need for cloud managers to balance developer time-to-value with security risks and cost.
Posted: 01 Feb 2016 | Published: 04 Feb 2015

TrendMicro

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Key Considerations in Choosing a WAF
sponsored by F5 Networks
WHITE PAPER: Attacks are becoming more sophisticated, and keeping up to date on security measures can be challenging. In this detailed white paper, explore both the basic and advanced considerations of selecting a web application firewall today, including performance, high availability, reliability, automatic attack detection, ease of management, and much more.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Vulnerability Scanning Tips and Tricks
sponsored by Alert Logic
WHITE PAPER: This white paper teaches you the importance of performing regular scans to identify and reduce vulnerabilities. This is you guide to ensure your scans successfully complete and report properly.
Posted: 24 Feb 2016 | Published: 20 Aug 2015

Alert Logic

Vulnerability Response Best Practices
sponsored by Alert Logic
WHITE PAPER: This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic

4 Tips to Secure your Saas Environment
sponsored by Alert Logic
WHITE PAPER: This white paper gives you four tips that SaaS providers need to keep in mind at all times to keep their security ahead of the game and make sure your SaaS app delivers the value and safety your customers demand.
Posted: 19 Feb 2016 | Published: 27 Jan 2016

Alert Logic

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

7 Best Practices of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper give you steps you should take and point of interest you should review in your network security.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This commissioned study, conducted by Forrester Research on behalf of Alert Logic, examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that reduces IT risk and drives operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Access now to discover how your enterprise can protect and manage all of its credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.
126 - 150 of 537 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement