Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 1079 Matches Previous Page  |  Next Page
Outbound Gateway Protection with UTM on AWS
sponsored by AWS - Sophos
CASE STUDY: AWS is popular for the wealth of benefits it offers users, but a vital component of operating on AWS, however, is ensuring data and workloads hosted on AWS are secure. Access this white paper to learn about protecting your AWS environment with unified threat management.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

AWS - Sophos

Workspaces of the Future
sponsored by Citrix
WHITE PAPER: Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments.
Posted: 19 Jul 2017 | Published: 31 Aug 2016

Citrix

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

Building the Digital Workplace
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how your organization can benefit from a digital workspace with cloud-ready data, unified endpoint management, high quality user experience, improved security, and more.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Case Study: Groundbreaking Workforce Development Enabled by AWS
sponsored by AWS - Sophos
CASE STUDY: The Louisiana Department of Corrections (DOC) needed a secure way to provide online courses for inmates, ensuring that they stayed in the designated virtual environment. Access this case study to see how the DOC was able to launch the secure AWS environments they needed to put inmates on the path to career success.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

AWS - Sophos

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

The Top Cyber Security Trends in ASEAN in 2017
sponsored by ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

DevOps Practices for Automation of AWS Environments
sponsored by Puppet
WHITE PAPER: AWS adoption and optimization can be difficult, but DevOps practices make it easier. This white paper details how to automate management of your AWS cloud environments while providing a consistent and reliable approach to provisioning and configuration management.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Puppet

Managing Cloud Sprawl in the Age of Cloud Services
sponsored by Citrix
WHITE PAPER: The demand for continuous cloud adoption isn't slowing down and neither is the problem...cloud sprawl. Access this infographic to learn how you're employees are creating cloud sprawl and how to prevent it with a unified, secure digital workspace can deliver and integrate services.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Citrix

Cloud Security: 6 Tips to Ensure Critical Data is Secure
sponsored by WinMagic
WHITE PAPER: With new legislation such as the EU's GDPR putting demands on your organization, how can you gain the visibility, efficiency, and real-time control to secure data in the cloud? Uncover 6 tips to improve cloud security and compliance.
Posted: 13 Jul 2017 | Published: 06 Jul 2017

WinMagic

Case Study: Virtual Environments and Endpoints Secured
sponsored by TrendMicro
CASE STUDY: In this case study, discover how Cancer Research UK secured more than 2,000 active users across physical machines, VMware virtual desktops and mobile devices.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TrendMicro

How to Gain Complete Protection for Cloud Workloads
sponsored by TrendMicro
WHITE PAPER: According to the Ponemon Institute, 36% of organizations' total IT and data processing requirements are met using cloud resources. Learn how to gain clear control over your cloud security and complete protection for cloud workloads.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TrendMicro

Protecting Corporate Information in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Leaders need to secure the aspects of the cloud they can control – identity and information – to protect their intellectual property. Access this white paper to learn the three keys to maintaining control of data security in the cloud.
Posted: 13 Jul 2017 | Published: 31 Jul 2015

Symantec & Blue Coat Systems

Deliver Agile Security for the Cloud
sponsored by TrendMicro
WHITE PAPER: Cloud adoption is accelerating rapidly – is your security flexible enough to keep up? Explore an agile security strategy that can seamlessly integrate with cloud services and management tools to prevent data breaches, reduce costs, and more.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

TrendMicro

Protecting Your Servers in the Cloud Era
sponsored by TrendMicro
WHITE PAPER: While virtualization and cloud computing can help your organization achieve significant savings while improving business agility, security in these new environments can be a challenge. Explore how you can protect your servers in the cloud age.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

TrendMicro

Securing Application Traffic on AWS
sponsored by F5 Networks
WHITE PAPER: Securing your applications should be on the top of your to-do list. Read on to learn how to secure your application traffic on AWS by focusing your strategy on three key areas.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

F5 Networks

The Truth Behind 7 Common DaaS Myths
sponsored by Dizzion
WHITE PAPER: Many people have preconceived notions about Desktop as a Service (DaaS), making them miss out on a modern tech solution that can become a key business driver. Download this white paper to uncover seven of the most common concerns about cloud delivered virtual desktops and the truth behind the myths.
Posted: 07 Jul 2017 | Published: 07 Jul 2017

Dizzion

Enabling the Secure Digital Transformation of Enterprise File Services
sponsored by AWS-CTERA
WHITE PAPER: Learn about cloud-enabled storage that combines file sync-and-share software with endpoint and server data protection, all deployed behind a firewall in a private AWS hosted cloud that can give you that mobility a modern business needs. Read on to effectively secure and store your data with this cloud model.
Posted: 06 Jul 2017 | Published: 06 Jul 2017

AWS-CTERA

Easily Connect and Deliver NGFW Services in AWS Multi-VPC Deployments
sponsored by Juniper - AWS
WHITE PAPER: Most organizations want their data centers closer to end users. This white paper discusses the importance of a transit VPC and how it enables you to add next-generation firewall services and connectivity to large multi-VPC AWS deployments.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

Juniper - AWS

Secure ECM in the Cloud – Content Made Simple
sponsored by OnBase by Hyland
WHITE PAPER: With recent strides in cloud security, cloud-based ECM is seeing a rapid rise in adoption across industries. Download this IDG research report to learn more about current cloud consumption patterns and how to find the right ECM provider.
Posted: 30 Jun 2017 | Published: 31 Dec 2016

OnBase by Hyland

vSRX Virtual Firewall-Based AWS Transit VPC
sponsored by Juniper - AWS
WHITE PAPER: Access this white paper to learn about the prerequisites to deploying a virtual firewall as an application instance in the AWS EC2 used as a transit virtual private cloud function. You will also get step-by-step instructions to ensure your AWS security works properly.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

Juniper - AWS

Top 5 Reasons to Deploy Hybrid Cloud on Converged Systems
sponsored by IBM Tectight
RESOURCE: Download now to discover 5 concrete reasons to deploy hybrid cloud on converged infrastructure. Learn how to build a successful scale-out infrastructure as foundation for hybrid cloud, with options to deploy workloads in data center, private, or public cloud environments.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

IBM Tectight

30 Minutes to a More Secure Enterprise
sponsored by Comstor
WHITE PAPER: Traditional defenses are no longer enough as under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Given the strain on your staff and already tight budget, DNS-layer security is becoming more valuable, especially as your first line of defense.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Comstor

Transform Your Business with Cloud-Ready Storage
sponsored by IBM Tectight
PRODUCT OVERVIEW: Illuminated here is an all-flash array that's primed to prepare your enterprise for cloud migration, with integrated software that enables efficient, proven data virtualization. Read on to take advantage of this SSD suited for virtualized environments, and gain the tools needed to treat cloud as a growth engine for business.
Posted: 29 Jun 2017 | Published: 31 Dec 2015

IBM Tectight

6 Best Practices for Securing AWS Environments
sponsored by Centrify Corporation
WHITE PAPER: Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.
Posted: 28 Jun 2017 | Published: 31 Dec 2016

Centrify Corporation
1 - 25 of 1079 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement