Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security White Papers (View All Report Types)
76 - 100 of 538 Matches Previous Page  |  Next Page
Is Your Cloud Delivering What Your Customers And Stakeholders Need?
sponsored by Microsoft
WHITE PAPER: A cloud service provider is the way for independent software vendors to differentiate themselves in an increasingly competitive market. This Frost & Sullivan white paper identifies five attributes to look for when evaluating a cloud service provider to support your software development businesses.
Posted: 31 Aug 2017 | Published: 30 Jun 2017

Microsoft

A Guide to Improving Availability and Data Protection in the Hybrid Cloud
sponsored by Veeam Software
WHITE PAPER: The hybrid cloud enables organizations to reduce costs and increase agility – however, you must ensure you are making the shift to the cloud safely, securely, and strategically. Learn how to do so in this white paper.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Veeam Software

7 Steps to Achieve Database Security in the Cloud
sponsored by Trustwave
WHITE PAPER: As organizations increasingly move databases to the cloud to take advantage of the cost savings and flexibility, it's more important than ever to factor in security. Learn 7 steps to cost effective database security in the cloud.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Trustwave

How to Move Data Protection to the Cloud
sponsored by Druva Software
WHITE PAPER: Read this resource to discover 5 considerations for moving your virtual systems data protection to the cloud, including improved business agility, simplified management, and more.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Druva Software

Why In-cloud Data Protection Architecture Matters to a Modern IT Infrastructure
sponsored by Dell EMC and Intel®
WHITE PAPER: ESG evaluates in-cloud data protection in this white paper, which will centralize, automate, and accelerate backup and recovery in your organization. Access now to see, in this vein, an economic analysis of Dell EMC Protection Software, with the storage and compute efficiency of their data protection-optimized cloud storage appliance highlighted.
Posted: 29 Aug 2017 | Published: 30 Jun 2017

Dell EMC and Intel®

Unified Endpoint Management for All Device Types
sponsored by IBM
WHITE PAPER: Organizations are now on the hook to manage virtually every type of end-user device and many security risks come from a mixed-device environment. Inside this white paper, uncover how a unified endpoint management system can help your organization achieve the security and visibility it needs.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

IBM

6 Key Steps to Successful Identity Assurance
sponsored by RSA
WHITE PAPER: Uncover guidance on the six key elements to identity assurance and how to increase security while optimizing the end user's experience. Learn how to deliver access to users that's both convenient and secure.
Posted: 24 Aug 2017 | Published: 24 Aug 2017

RSA

Maximizing Benefits and Controlling Risk in the Cloud
sponsored by Codero
WHITE PAPER: As more organizations shift to the cloud, how can you maximize the return on your investment? What kinds of risks are you going to have to manage? Access this white paper to learn about the concepts and principles underlying success in the cloud through effective resource management.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Codero

Data Loss Prevention – Now with CASB
sponsored by Symantec
WHITE PAPER: Data is often maliciously targeted through cloud applications. This resource will help you determine strategies for using DLP and CASB to protect your company in the cloud.
Posted: 22 Aug 2017 | Published: 31 Dec 2016

Symantec

A Comprehensive Overview of the Hybrid Cloud
sponsored by Codero
WHITE PAPER: You know how hybrid cloud works in theory, but do you know what to look for or what to do when you implement it? Access this hybrid cloud planning guide to learn what to look for in a hybrid cloud platform, what makes a cloud adoption successful, and the benefits of the strategy.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Codero

SafeNet Authentication Service: Affordable, flexible, cloud-based authentication
sponsored by Gemalto
WHITE PAPER: When evaluating authentication tools, the choice is not just about security: deployment, management, and cost considerations are important factors as well. Read this white paper to discover how cloud-based authentication can provide protection while saving you money.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Gemalto

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec

macOS Security Checklist
sponsored by JAMF
WHITE PAPER: The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. Download this white paper to discover how to implement the organizations security recommendations.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

Recovering your Company's PCs Affected by Ransomware
sponsored by Acronis
WHITE PAPER: After a ransomware strike on a PC, your company data is at a serious risk. Read this white paper to learn how to safely protect your company's PCs after a ransomware strike.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Acronis

The New Face of Cloud-Based Access management
sponsored by Gemalto
WHITE PAPER: Each new app added to your cloud environment only enhances cloud and compliance risks. Read on to learn about a system that addresses these challenges by combining the convenience of single sign-on with granular access policies.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Gemalto

Hybrid Active Directory Security and Governance
sponsored by Quest
WHITE PAPER: Discover how to know in real time when suspicious activities occur in the cloud and on your Microsoft Active Directory by improving your security posture.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Quest

A Tactical Guide to Finding the Right IDaaS Provider
sponsored by Simeio
WHITE PAPER: The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This 3-part e-book can answer some of your top questions and help you choose the right IDaaS provider for your organization.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Simeio

4 Steps to Cloud Access Management
sponsored by Gemalto
WHITE PAPER: While more organizations than ever are leveraging cloud-based services, that doesn't reduce security issues, it simply creates new ones. In this white paper, learn 4 easy steps to gain full cloud access control to help you keep your environment safe and profitable.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Gemalto

Cloud Security: 2017 Spotlight Report
sponsored by Quest
WHITE PAPER: Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Quest

10 Steps to Success with Public Cloud Adoption
sponsored by Rackspace Intel
WHITE PAPER: This white paper lays out 10 steps to a successful public cloud adoption. Inside, you will learn everything you need to know to get your public cloud initiative off the ground, from building a business case to executing your migration.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Rackspace Intel

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect

Overcome Security Barriers to the Cloud
sponsored by Commvault
WHITE PAPER: Learn how to enable data security features in the cloud to avoid costly data breaches. As a bonus, discover 4 other barriers to the cloud and how to overcome these challenges.
Posted: 09 Aug 2017 | Published: 31 Dec 2015

Commvault

Rethink Your Strategy to Defeat Evasive Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Malware is rapidly changing, and security policies need to change alongside it. Inside, learn about why implementing an analytics-based threat detection system is your best bet at keeping your network safe.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Palo Alto Networks

The Road to a Secure, Compliant Cloud
sponsored by HyTrust
WHITE PAPER: Corporations must innovate to stay ahead of the competition, deliver new services to attract and keep new customers, and keep their costs low. Uncover how a well-designed virtualized cloud offers businesses a solution, by keeping their crucial data secure while providing agility and adaptability.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

HyTrust

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.
76 - 100 of 538 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement