Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
51 - 75 of 513 Matches Previous Page  |  Next Page
Red Hat CloudForms Unifies and Improves Service Delivery and Management
sponsored by Red Hat
WHITE PAPER: As your infrastructure evolves toward an Infrastructure-as-a-Service model, you need a management platform that follows suit. Download this white paper to simplify hybrid IT management with a platform that evolves to handle all container, virtual, private, and public cloud infrastructures.
Posted: 12 Oct 2016 | Published: 30 Jun 2016

Red Hat

5 Reasons Endpoint Security Must Move to The Cloud
sponsored by CrowdStrike
WHITE PAPER: The mass migration to the cloud is proving a useful tool for expanding organizations who find themselves becoming increasingly exposed to cyberthreats. Discover why the cloud can be an ideal choice when looking to secure endpoints and what benefits it can provide your organization such as cost, flexibility, and agility.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

CrowdStrike

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

How healthcare benefits from cloud-delivered security
sponsored by Cisco
WHITE PAPER: By utilizing the cloud for healthcare, you can enhance security today while ensuring scalability into the future. Learn how to combat malware, ransomware and other threats that impact patient well-being and best come into regulatory compliance with the cloud.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Cisco

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Discover what specific security responsibilities belong to you and your provider, the latest cloud security threats, and 7 cloud security best practices.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Alert Logic

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: This white paper explores both old and new security best practices, as well as how to apply them to cloud-based infrastructures and 5 considerations for securing hybrid clouds. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.
Posted: 23 Sep 2016 | Published: 31 May 2016

Intel Security

Your Blueprint to Securing Your Public and Hybrid Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper and discover how you can securely scale protection to your cloud infrastructure and workloads, and segment both within the cloud and between endpoints, enterprise networks, and the cloud to keep your data safe.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Fortinet, Inc.

TAG Cyber Report: 2017 Security Annual – Vol. 1
sponsored by Digital Guardian
WHITE PAPER: This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.
Posted: 22 Sep 2016 | Published: 31 Aug 2016

Digital Guardian

How to Conquer Security on the Public, Private, and Hybrid Clouds
sponsored by Fortinet, Inc.
WHITE PAPER: Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Fortinet, Inc.

Questions to Ask Your Cloud Service Provider: Know how your Data will be Protected in the Cloud
sponsored by Intel Security
WHITE PAPER: As you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Intel Security

Securing Microsoft Office 365 - The Inside Track To Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: This report explores Office 365 adoption concerns around issues such as threat protection, intelligence and response. Find out what additional security measures your organization can take to securely deploy Office 365 and reap its full benefits.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

Proofpoint, Inc.

How To Easily Start Your Implementation Planning for Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Discover how effective planning can ease your organization's adoption of Office 365. Uncover a comprehensive step-by-step to build your cloud "to-do" list: making sure you address what access controls need to be considered, what service characteristics there will be, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Blue Coat Systems

Essential Security & Enablement for Your Enterprise
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

Case Study: Office 365 Enterprise Strengths
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how H-E-B solved their Office 365 issues by seamlessly implementing a security overlay tool. Learn how to eliminate false positive message classification leading to data loss, unwanted spam, and improve email security in the cloud.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

5 Organizations Harness the Cloud to Transform Their Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Carefully planning your journey to the cloud is essential to your enterprise's continued success. This white paper details how 5 organizations used one unified network platform to easily construct an agile, secure, and cloud-enabled enterprise. Access now to learn about this platform and how it ensures a successful move to the cloud.
Posted: 06 Sep 2016 | Published: 31 May 2016

Juniper Networks, Inc.

Enterprise-grade Cloud Management for Openstack with Red Hat Cloudforms
sponsored by Red Hat
WHITE PAPER: Discover how to supplement OpenStack with essential, enterprise-grade cloud management and automation, thereby accelerating implementation and improving private and hybrid cloud manageability. Read on to find out more about this migration framework that additionally enables bimodal IT.
Posted: 01 Sep 2016 | Published: 31 Dec 2015

Red Hat

How to Secure Cloud Applications & Services
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper uncover everything you need to know to transition to the cloud seamlessly. Learn about the shift in workloads, the evolution in the security stack, the challenges of deep visibility, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems

A Guide to Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: Access this white paper for tips on how you can safely adopt Office 365. Learn where Office 365 fails to protect your organization and how to mitigate those shortcomings to prevent data exposures, safeguard against unauthorized user activity, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Symantec + Blue Coat

The Case for Security Intelligence Services, Hosted from the Cloud
sponsored by IBM
WHITE PAPER: Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.
Posted: 30 Aug 2016 | Published: 01 Apr 2015

IBM

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Blue Coat Systems
WHITE PAPER: This easy-to-follow guide takes you through the 11 steps that enterprises can take in order to learn, not only the benefits, but how to mitigate the dangers, of using cloud services like Box, Dropbox, Office 365, and Salesforce.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Blue Coat Systems

Extend Your Access Management Regime To Office 365
sponsored by IBM
WHITE PAPER: See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise's data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

IBM

Are You Fully Secure? Or Are You Using Weak Authentication Methods?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you the top 5 ways organizations are using authentication to improve secure access and protect valuable data.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Glossary: The Cloud's Compliance Landscape
sponsored by VMware
WHITE PAPER: Discover a comprehensive glossary of compliance standards for the cloud. Learn what your enterprise needs to remain compliant in the following fields: Audit/Assurance, Management, Finance, and more.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

VMware

Deepen Visibility into Cloud and Hybrid IT with Unified Infrastructure Management
sponsored by CA Technologies
WHITE PAPER: Learn why it's recommended your organization extends the visibility of existing infrastructure tools with a unified, hybrid IT monitoring platform—providing visibility into traditional and next-generation technologies. Read on to take a unified approach to IT ops, and monitor all hybrid cloud, software-defined, and converged environments.
Posted: 07 Sep 2016 | Published: 30 Jun 2016

CA Technologies
51 - 75 of 513 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement