Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityWhite Papers (View All Report Types)
126 - 150 of 360 Matches Previous Page  | Next Page
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

IBM SmartCloud Entry for Power Systems
sponsored by IBM
WHITE PAPER: This informative white paper explores an entry-level, cost-competitive cloud solution that helps speed time to value of your service deployments on your virtualized servers.
Posted: 15 Jul 2013 | Published: 30 Dec 2011

IBM

The Business and Economic Advantages of SmartCloud Entry for Power Systems
sponsored by IBM
WHITE PAPER: This informative resource examines an entry-level cloud solution that enables quick and easy deployment of private clouds.
Posted: 15 Jul 2013 | Published: 28 Jun 2013

IBM

IDEAS International Seeding Clouds on Power Systems with IBM SmartCloud Entry
sponsored by IBM
WHITE PAPER: This white paper explores a cloud solution that leverages the proven capabilities of virtualization software to enable quick and easy deployment of private clouds.
Posted: 15 Jul 2013 | Published: 31 Jan 2012

IBM

What Sets File Sync and Share Apart from Endpoint Backup
sponsored by Code42
WHITE PAPER: This short white paper provides insight into clearing up the confusion between backup and sync/share.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

Code42

ESG: Your Gateway to the Private Cloud
sponsored by NetApp
WHITE PAPER: Check out this white paper to explore a storage system that conquers the challenges of virtualization and cloud computing by utilizing a private cloud.
Posted: 21 Jun 2013 | Published: 31 Oct 2012

NetApp

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 13 Jun 2013 | Published: 13 Jun 2013

Hewlett-Packard Company

What You Need to Know about Cloud Backup: 10 FAQs Answered
sponsored by Asigra
WHITE PAPER: This white paper discusses the ten most common questions that companies are asking about cloud backup.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Asigra

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Consolidated security management for mainframe clouds
sponsored by IBM
WHITE PAPER: This white paper explores how leveraging a mainframe as a security hub for cloud computing can provide benefits such as, increased security, improved reliability and consolidated workloads throughout your cloud infrastructure.
Posted: 13 May 2013 | Published: 29 Feb 2012

IBM

The Essentials of OAuth: Key to BYOD
sponsored by Ping Identity Corporation
WHITE PAPER: Discover how you can create a consistent, flexible identity and policy architecture for web apps, web services, devices, and clients communicating with cloud APIs.
Posted: 13 May 2013 | Published: 28 Feb 2013

Ping Identity Corporation

Leveraging the Cloud for Data Protection and Disaster recovery
sponsored by CA Technologies.
WHITE PAPER: This informative white paper provides insight into how to approach cloud resources for system, application and data protection.
Posted: 30 Jul 2013 | Published: 30 Mar 2012

CA Technologies.

Transitioning to the Private Cloud with Confidence
sponsored by Cisco
WHITE PAPER: Cloud computing may be the future of IT, but it also presents challenges businesses can't afford to overlook. Review the key characteristics, business benefits and barriers when moving to a private cloud.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

Cisco

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

How to Make Your Business More Flexible & Cost Effective?
sponsored by Panda Security
WHITE PAPER: Access this informative paper to learn about a cloud-based network management solution that provides greater control and visibility of your IT environment, detecting problems proactively and increasing efficiency and performance.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Panda Security

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

Panda Cloud Systems Management: Partners and Administrator's Guide
sponsored by Panda Security
WHITE PAPER: This crucial resource takes an in-depth look at a cloud-based remote device monitoring and management solution that offers high-quality service while promoting task automation to increase efficiency.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Panda Security

Panda Cloud Systems Management: Reports Datasheet
sponsored by Panda Security
WHITE PAPER: This crucial paper examines a cloud-based IT management solution that provides detailed and measurable reports to justify time spent and show all of the actions you have taking remotely preventing and managing problems.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Panda Security

Panda Cloud Systems Management: Management Datasheet
sponsored by Panda Security
WHITE PAPER: Access this informative resource to learn about a cloud-based IT management solution that can automate maintenance tasks centrally, saving time and money while improving security, efficiency and productivity.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

Panda Security

Expanding Web Single Sign-On to Cloud and Mobile
sponsored by CA Technologies.
WHITE PAPER: This informative white paper explores security solutions that were built to strike the right balance between data security and user access convenience.
Posted: 11 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Accellion raises the bar in secure cloud-based file sharing
sponsored by Accellion, Inc.
WHITE PAPER: The vendor featured in this whitepaper recently released new tools for collaboration functionality and is eager to prove itself as a strong competitor in the enterprise collaboration market. Read on to learn how they can help your organization adopt truly secure cloud-based file sharing.
Posted: 25 Jun 2013 | Published: 04 Dec 2012

Accellion, Inc.

Cloud security, options and trends
sponsored by CenterBeam
WHITE PAPER: In this brief Q&A, Shahin Pirooz, Chief Technology and Security Officer and Executive Vice president of cloud solutions at CenterBeam, Inc. provides expert analysis of the current state of cloud security. Read now for valuable advice on how you can tailor your cloud infrastructure to meet the needs of your business.
Posted: 28 May 2013 | Published: 28 May 2013

CenterBeam

Clabby: Business analytics buying criteria: The Three Maxims
sponsored by IBM.
WHITE PAPER: View this white paper to learn more about what contributes to an effective business analytics buying criteria. It examines the importance of implementing an integrated infrastructure and its relationship to business analytics.
Posted: 22 May 2013 | Published: 17 May 2013

IBM.

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.
126 - 150 of 360 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement