Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
51 - 75 of 472 Matches Previous Page  |  Next Page
How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Key Considerations in Choosing a WAF
sponsored by F5 Networks
WHITE PAPER: Attacks are becoming more sophisticated, and keeping up to date on security measures can be challenging. In this detailed white paper, explore both the basic and advanced considerations of selecting a web application firewall today, including performance, high availability, reliability, automatic attack detection, ease of management, and much more.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Forrester Market Overview: Cloud Workload Security Management Solutions - Automate or Die
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 13 Jan 2016 | Published: 02 Jun 2015

CloudPassage

The Perceived Effectiveness of Traditional Security Solutions in the Cloud
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jan 2016 | Published: 30 Jun 2015

CloudPassage

How Enterprises Are Attacking the IT Security Challenge
sponsored by CloudPassage
WHITE PAPER: This white paper will demonstrate the increasing complexity of managing IT security, spending trends, challenges and vulnerabilities.
Posted: 13 Jan 2016 | Published: 04 Sep 2015

CloudPassage

Get the Right Cloud for Your Applications and Deliver Business Results Fast
sponsored by Dell, Inc.
WHITE PAPER: In this white paper, learn how a preconfigured cloud storage option can be tailored to meet your specific strategic performance, capacity, security, and cost requirements. Additionally, explore the technology behind this option, as well as case studies from a variety of organizations who have already adopted it.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

Dell, Inc.

Flipping the Script: Law Firms Hunted by Cybercriminals
sponsored by SurfWatch Labs
WHITE PAPER: This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

SurfWatch Labs

Special Report: The Risks of Shadow Data
sponsored by Elastica
WHITE PAPER: Based on the analysis of over 63 million documents, this report on shadow data provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Elastica

Resiliency in the Cloud
sponsored by IBM
WHITE PAPER: In this white paper, uncover four steps you can take to improve your cloud resiliency. Read on to discover how you can enhance your disaster recovery with successful and efficient cloud resilience.
Posted: 09 Dec 2015 | Published: 24 Jun 2015

IBM

Survey: The State of Wireless Security Today
sponsored by Fortinet, Inc.
WHITE PAPER: Learn more about what your peers are doing – or not doing – to secure the wireless infrastructure. Additional data points covered in this report include plans for cloud-managed WLANs and IT decision-maker confidence in relying on third-party hosted management.
Posted: 09 Dec 2015 | Published: 15 Oct 2015

Fortinet, Inc.

Secure Access Architecture: Complete Security for Network Access
sponsored by Fortinet, Inc.
WHITE PAPER: As companies change to adapt their network architecture to connect end devices and enable business applications, they must reconsider their approach to security and access. Access this comprehensive Solution Guide to explore 3 critical security deployment strategies in both controller-managed and cloud-managed environments.
Posted: 09 Dec 2015 | Published: 09 Oct 2015

Fortinet, Inc.

Best Practices for Securing Workloads in Amazon Web Services
sponsored by evident.io
WHITE PAPER: Access this informative resource to explore best practices for securely deploying enterprise workloads in AWS. You'll also learn how these tips can apply to securing workloads in other IaaS strategies.
Posted: 24 Nov 2015 | Published: 15 Apr 2015

evident.io

Modernizing B2B Integration in the Cloud
sponsored by IBM
WHITE PAPER: In this white paper, take a closer look at how you can modernize your B2B integration with the cloud in order to minimize complexity, cost and risk, all while streamlining global supply networks and strengthening partner relationships.
Posted: 23 Nov 2015 | Published: 31 Oct 2015

IBM

Continuous Security and Reliability in Iterative Development
sponsored by evident.io
WHITE PAPER: Access this white paper to understand the new approaches to security required in a continuous deployment environment.
Posted: 20 Nov 2015 | Published: 31 Dec 2014

evident.io

Case Study: Interactive Game Provider Optimizes Gameplay, Advertising, and Social Operations
sponsored by Rackspace
WHITE PAPER: In this white paper, learn how RockYou took advantage of one cloud option to continue to grow through acquisitions, while also improving security, uptime, and cost-savings along the way. Read on to learn more about the option that RockYou chose.
Posted: 13 Nov 2015 | Published: 13 Nov 2015

Rackspace

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This commissioned study, conducted by Forrester Research on behalf of Alert Logic, examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that reduces IT risk and drives operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Access now to discover how your enterprise can protect and manage all of its credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Blue Coat Systems

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Blue Coat Systems

Leapfrogging Backup with Cloud Snapshots
sponsored by Microsoft
WHITE PAPER: In this white paper, learn about a tool that can replace traditional backup processes with cloud snapshots that automate off-site data protection. Additionally, explore how this option can reduce time spent managing backups, enable easy restoration and access of data on the cloud , and more.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

Microsoft

Rethinking Enterprise Storage: A Hybrid Cloud Model
sponsored by Microsoft
WHITE PAPER: In this extensive resource, explore how hybrid cloud computing can be used both to overcome the challenges of data growth and integrating with the cloud. Additionally, learn about the current possibilities available for migrating from on-premises infrastructure to the cloud, leveraging hybrid cloud storage for disaster recovery, and more.
Posted: 04 Jan 2016 | Published: 31 Dec 2013

Microsoft

Hybrid Cloud Storage Security Brief
sponsored by Microsoft
WHITE PAPER: This brief white paper explores 4 common scenarios of hybrid cloud security concerns for StorSimple hybrid cloud storage solution and how security measures address these scenarios. Read on to learn more.
Posted: 11 Dec 2015 | Published: 31 Mar 2014

Microsoft

The Big Bang – How cloud is changing the face of resiliency
sponsored by IBM
WHITE PAPER: This white paper discusses how the cloud may be the key to robust disaster recovery and mitigating cybersecurity threats and downtime. Read on and discover how implementing the right cloud strategy can help improve your enterprise's business continuity management and ensure stronger data protection.
Posted: 08 Dec 2015 | Published: 31 Dec 2014

IBM

How Can I Become an Always-On Business?
sponsored by IBM
WHITE PAPER: This white paper details the 3 prevailing strategies to being an always-on organization to address security threats and protect data without downtime.
Posted: 07 Dec 2015 | Published: 25 Nov 2015

IBM

The Great Debate: One Integrated Business System vs. Siloed Applications
sponsored by NetSuite
WHITE PAPER: This white paper analyzes the inefficiencies caused by running disparate business applications and systems across your various departments, and demonstrates how a cloud-based software can unify your critical-business processes.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

NetSuite
51 - 75 of 472 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement