Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
51 - 75 of 568 Matches Previous Page  |  Next Page
Cloudforms Management for Google CloudPlatform
sponsored by Red Hat
WHITE PAPER: In this white paper, learn how Red Hat Cloudforms can provide your organization with the visibility and control you need to make the switch to the public cloud.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Red Hat

Uncovered: IDC Explores the Benefits of Cloud-based Vulnerability Management
sponsored by Tenable, Inc.
WHITE PAPER: The shift to public cloud, along with mobile and DevOps, comes with an abundance of new assets for security pros to control and contain. How can you manage new vulnerabilities that result? Explore this IDC tech spotlight to how a cloud-based approach to vulnerability management can help.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Tenable, Inc.

Create More than 55x Faster Hybrid Cloud Solutions with Maximum Security, Availability and Elasticity
sponsored by Digital Realty
WHITE PAPER: Download this white paper to discover technology designed to deliver maximum storage and compute capacity for enterprises, with massive data stores, that need to solve business problems fast without compromising the security of user information.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Digital Realty

5 Immutable Laws for Storing All Your Data in the Cloud
sponsored by Wasabi
WHITE PAPER: Read on to view a new method of cloud storage that will cost-effectively meet the needs of nearly every of your applications. You'll learn the essentials of this service, as well as 5 principles to keep in mind when storing all your data in the cloud.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

Wasabi

Whitepaper: Intro to Continuous Security on AWS
sponsored by Stelligent
WHITE PAPER: Moving to the cloud increases the velocity and agility with which you can deploy infrastructure. In order to sacrifice neither speed nor safety, learn how to implement continuous security, and allow your cloud security to scale across the organization.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

TOPICS:  Cloud Security
Stelligent

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by CyberArk Software, Inc
WHITE PAPER: According to CyberArk Software, total worldwide spending on cloud services will reach $266 billion by 2021 and SaaS will consume nearly 60% of cloud spending by then. Explore this white paper to gain insight into how you can ensure your cloud workloads and infrastructures are secure.
Posted: 26 Oct 2017 | Published: 26 Oct 2017

CyberArk Software, Inc

Private Cloud: Move at the Speed of Business
sponsored by F5 Networks
WHITE PAPER: In this paper, you'll be introduced to the private cloud essentials. Read on to see how private cloud app provisioning compares to that of traditional data centers, how to choose the right private cloud for your organization, and more.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

F5 Networks

Data Immutability Provides Ultimate Protection
sponsored by Wasabi
WHITE PAPER: This white paper explores a universal cloud object storage service that protects against accidental or malicious data destruction, so you can avoid data erasure, combat ransomware and viruses, and more.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Wasabi

SIEM Analyst Research Bundle
sponsored by AlienVault
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AlienVault

A Minute in the Life of Google's Security Infrastructure
sponsored by Google Cloud
WHITE PAPER: Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Google Cloud

Virtualization's Next Phase: Unleashing Innovation by Extending VMware into the Cloud
sponsored by Rackspace
WHITE PAPER: Read this IDC white paper to examine six steps that will pave the way toward an effective and efficient private cloud environment. Inside, you'll discover the boons of moving VMware workloads to a private cloud, guidance on which workloads you should move, and more.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Rackspace

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

The 4 Critical Areas You Must Address for Cloud Security
sponsored by Symantec
WHITE PAPER: As companies grapple with the demands imposed by this shifting security landscape, it's critically important to consider the best risk mitigation steps to take. Dive into this white paper to uncover the 4 most commonly exposed risk points for cloud security.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Symantec

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec

Symantec™ Cloud Generation Malware Analysis
sponsored by Symantec
WHITE PAPER: Hackers continue to show endless ingenuity in penetrating corporate networks with malware, which means organizations need to fight back harder than ever. By reading this white paper, you'll learn more about defeating malware.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec

Extend Your DLP to the Cloud
sponsored by Symantec
WHITE PAPER: With the rise of the cloud, your sensitive and compliance related data is at risk now more than ever. Find out how integrating your on premise Data Loss Prevention with CASB technology can enhance your cloud security.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Symantec

Why You Need to Control Shadow IT, Not Just Discover it
sponsored by Symantec
WHITE PAPER: The rapid, often uncontrolled, growth in the adoption of cloud apps creates a need for improved visibility – it's impossible to control what you cannot see. Read this white paper to uncover how to ensure your organization's safe migration to the cloud.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Symantec

The Cost of Cloud Expertise: Report
sponsored by Rackspace Intel
WHITE PAPER: Is a lack of expertise stifling your investment in cloud computing? In this report, you'll discover the full ramifications the lack of expertise could be costing your business. Read on to see sections on how to overcome multi-cloud complexity, to know when to partner with managed providers, and more.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Rackspace Intel

Citrix Systems, Inc.
sponsored by Symantec
WHITE PAPER: This case study reveals how Citrix Systems, Inc. wanted to move two-factor authentication (2FA) into the cloud to reduce costs and improve flexibility and reliability.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Symantec

Comprehensive Mobile-Cloud Enterprise Security
sponsored by MobileIron
WHITE PAPER: Organizations need a comprehensive, unified platform designed from the ground up to secure mobile apps, devices, and cloud services. Download this white paper to discover a mobile-cloud security platform that can prevent data loss, enhance the UX, and simplify compliance reporting.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

An Overview of the AWS Cloud Adoption Framework
sponsored by Amazon Web Services
WHITE PAPER: Cloud migration offers a lot of strategic advantages, but these can only be leveraged when a team knows what it is doing. AWS cloud adoption framework (AWS CAF) helps organizations understand how cloud adoption transforms the way they work, and it provides structure to identify and address gaps in skills and processes.
Posted: 16 Oct 2017 | Published: 28 Feb 2017

Amazon Web Services

Introduction to AWS Security
sponsored by Amazon Web Services
WHITE PAPER: This document is intended to provide an introduction to AWS's approach to security, including the controls in the AWS environment and some of the products and features that AWS makes available to customers to meet your security objectives.
Posted: 10 Oct 2017 | Published: 31 Jul 2015

Amazon Web Services

AWS Security Checklist
sponsored by Amazon Web Services
WHITE PAPER: Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Amazon Web Services

Cloud Solution Enables Security for Highly Regulated Industries
sponsored by TeraGo Networks
WHITE PAPER: Explore this case study to uncover how Virtual StrongBox was able to implement a technology to revolutionize cloud security and protect its customers.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

TeraGo Networks
51 - 75 of 568 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement