Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
51 - 75 of 502 Matches Previous Page  |  Next Page
Future Proof your Data Storage with the Hybrid Cloud
sponsored by Equinix
WHITE PAPER: This white paper highlights one hybrid cloud platform with customizable end-to-end data center and cloud storage solutions. Read on and discover how this solution can provide your enterprise with secure storage for your mission-critical data and simplified backup and archiving.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Equinix

The Key to Protecting Your Business Amid Cybercrime’s Current Boom
sponsored by CA Technologies
WHITE PAPER: This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

CA Technologies

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

Implementing Multi-Tenanted Storage for Service Providers
sponsored by Cloudian
WHITE PAPER: This white paper highlights a cost-effective, scalable storage platform for cloud storage services. Discover how this platform can enable your organization to deliver a multi-tenant hosting solution with storage provisioning and management capabilities and with the freedom of choice of using hardware that meets your customers' needs.
Posted: 12 Apr 2016 | Published: 31 Dec 2015

Cloudian

Attaining Real Opportunity for MSPs: Cloud Infrastructure as End-to-End systems
sponsored by LogicNow
WHITE PAPER: With more and more clients wanting greater services from their MSPs, providers have real opportunity in managing both on premises and cloud infrastructure as end-to-end systems. This white paper examines how it can be done with the right ecosystem of tools. Read on to find out more.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

LogicNow

Protecting Business Critical Services – Email
sponsored by LogicNow
WHITE PAPER: This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

What to Look for in a Cloud Solution Provider
sponsored by Carousel Industries
WHITE PAPER: Experiencing increased pressure to look at cloud solutions when upgrading your voice, video, and unified communication portfolio? Access this white paper to uncover the key features and functions to look for when evaluating a cloud service provider.
Posted: 07 Apr 2016 | Published: 01 Mar 2016

Carousel Industries

A Balanced Approach to Cloud Storage
sponsored by Cloudian
WHITE PAPER: This white paper highlights the advantages of leveraging a hybrid cloud solution that enables enterprises to benefit from the cost-efficiency and capacity of a public cloud and the security of a private cloud. Access now to see how balancing your cloud storage can enable your enterprise to keep the hard and soft costs of cloud under control.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

Cloudian

Overcoming Data Sovereignty and Security Challenges with the Cloud
sponsored by PEER 1
WHITE PAPER: Access this valuable resource now and learn how to stay ahead of data residency laws, ensure you are storing data correctly, and safeguard your customer's data and ensure that its sovereignty remains intact.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

PEER 1

Cloud Connectivity and Colocation for Your Enterprise Data Center
sponsored by CyrusOne
WHITE PAPER: Discover how to deliver flexible cloud-connectivity service to your data center seamlessly and immediately through a single port, and implement successfully scaled, cloud-enabled colocation.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

CyrusOne

Top 5 Considerations in Transitioning to SDN for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Software-defined networking is an important enabling technology for the digital workplace. By the end of 2020, it is expected to impact about 80% of network purchase decisions. Access this white paper to explore the top five factors you should consider as you transition to SDN.
Posted: 29 Mar 2016 | Published: 23 Mar 2016

Aruba Networks

Cloud: The New Way to Get Things Done
sponsored by Microsoft
WHITE PAPER: Access this comprehensive infographic to explore ways the cloud can help organizations do their best work regardless of location, and make better decisions.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Microsoft

Achieve Compliance and Cost Control
sponsored by Matrix42
WHITE PAPER: Cloud computing, in spite of being only about ten years old, continues to gain market share in the enterprise. Analyst house Market Research Media estimates that the global cloud computing market will grow at a 30% CAGR, reaching $270 billion in 2020.
Posted: 18 Mar 2016 | Published: 29 Dec 2015

Matrix42

Securing Data in the Cloud and on the Ground
sponsored by IBM
WHITE PAPER: In this resource, you will discover how to govern and secure your cloud-based data to realize the financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy. Read on to learn the 4 pillars of good hybrid information governance.
Posted: 16 Mar 2016 | Published: 30 Apr 2015

IBM

Extend Performance Management to SaaS and the Public Cloud
sponsored by LiveAction
WHITE PAPER: Enterprises are moving applications to the cloud. Simplicity is a key value proposition for many SaaS providers, so it's quite easy for an enterprise to get a service up and running. It may be simple to get cloud services set up, but IT managers are well aware that managing the performance and availability of those applications is far from easy.
Posted: 16 Mar 2016 | Published: 29 Dec 2015

LiveAction

The truth about information governance and the cloud
sponsored by IBM
WHITE PAPER: Download this white paper now to learn how hybrid cloud environments can result in a better bottom line without jeopardizing your sensitive data.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

IBM

Plugging the Security Gaps of Cloud File Sharing Services
sponsored by Imperva
WHITE PAPER: This paper examines seven items to consider when it comes to security and compliance of cloud file sharing services and how you can mitigate the risks with a Cloud Access Security Broker (CASB) solution.
Posted: 14 Mar 2016 | Published: 17 Feb 2016

Imperva

Database on Cloud: Fast, Simple, Economical, and yes, Secure
sponsored by IBM
WHITE PAPER: This data sheet explores databases available on demand as a cloud service. Designed with security in mind, you'll uncover the variety of advantages from leveraging this nontraditional approach to database management.
Posted: 10 Mar 2016 | Published: 30 Sep 2015

IBM

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015

Imperva

Backup and Disaster Recovery Plans Get Cloudy
sponsored by Dimension Data
WHITE PAPER: In this resource, you will explore a host of modern approaches to backup and disaster recovery, and learn how to move elements of your environment to the cloud and manage your hybrid IT infrastructure. Read on to gain and maintain visibility of your entire backup and disaster recovery environment.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

Dimension Data

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

Top 3 Cloud Trends to Watch in 2016
sponsored by Dimension Data
WHITE PAPER: This brief white paper takes a closer look at the top 3 cloud computing trends to watch in 2016. Access now to see where the cloud market is headed, and learn how you can leverage these trends in your IT infrastructure.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Dimension Data

Vulnerability Scanning Tips and Tricks
sponsored by Alert Logic
WHITE PAPER: This white paper teaches you the importance of performing regular scans to identify and reduce vulnerabilities. This is you guide to ensure your scans successfully complete and report properly.
Posted: 24 Feb 2016 | Published: 20 Aug 2015

Alert Logic
51 - 75 of 502 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement