Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 959 Matches Previous Page  |  Next Page
Cloud Deployment Elucidates Pros and Cons for Legacy Applications
sponsored by Oracle Corporation
EGUIDE: There are many common mistakes organizations make when deploying applications in the cloud—and each differs in severity. Read on to discover several commonplace mistakes made in cloud application deployment, as well as determine the pros and cons of legacy applications that the cloud elucidates.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Oracle Corporation

The Cloud App Visibility Blindspot
sponsored by Imperva
WHITE PAPER: Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."
Posted: 11 Feb 2016 | Published: 16 Sep 2015

Imperva

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This white paper examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Building a Successful Hybrid Cloud Strategy
sponsored by Presidio
EGUIDE: This complimentary e-guide provides expert advice for building a hybrid cloud strategy and discusses the importance of moving applications to the cloud to start off the migration process. Read on to learn what management tools and cloud migration strategies can help your enterprise implement a successful cloud architecture.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Presidio

Transforming the future of cloud adoption
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This study by StratoGen, which questioned 1,000 senior business executives, reveals that more than a third of UK businesses still host fewer than 10% of their IT applications in the cloud.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

ComputerWeekly.com

Predictions 2016: The Cloud Accelerates
sponsored by Hedvig Inc
RESEARCH CONTENT: This report by Forrester outlines 11 factors that will accelerate cloud adoption in 2016. Uncover key developments like: Top vendors gain and others retreat or refocus; automation finally chips away at cloud security fears; and more.
Posted: 10 Feb 2016 | Published: 16 Nov 2015


How to Contain the Cloud, and Other Security Questions
sponsored by SearchCloudSecurity.com
EZINE: This Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.
Posted: 09 Feb 2016 | Published: 10 Feb 2016

SearchCloudSecurity.com

Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016


Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: In this series of brief videos, you will learn how to transform your data into a powerful strategic asset with a holistic data protection platform—enabling you to access all of your data safely from any endpoint. Tune in to ensure your data is accessible, compliant, and ready to share across all lines of your business.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that drives IT risk reduction and operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Read on to discover how this platform can allow your enterprise to protect and manage all your credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

Compensating Security Controls for Windows Server 2003 Security
sponsored by TrendMicro
WHITE PAPER: This white paper shows you a solution while you're in the process of migration. Learn how you can get network, system and anti-malware security controls across physical, virtual and cloud systems running W2K3.
Posted: 04 Feb 2016 | Published: 31 May 2015


Using Trend Micro’s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance
sponsored by TrendMicro
WHITE PAPER: This white paper examines a platform that delivers a comprehensive set of security controls optimized for modern data centers and the cloud.
Posted: 04 Feb 2016 | Published: 30 Apr 2015


Easynet: Securing Customer Data Globally
sponsored by Hewlett-Packard Enterprise
VIDEO: In the following brief, video case study, learn how through the help of HPE Helion, Easynet was able to successfully deliver the flexibility and security needed by their customers worldwide.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Hewlett-Packard Enterprise

Searching for Better Big Data Business Value? Look to the Cloud
sponsored by Oracle Corporation
VIDEO: In this brief video, you will discover a big data cloud service that utilizes the latest advances in big data processing and unifies these processes with Oracle's Big Data SQL. Tune in to access the benefits of cloud-enabled data management.
Posted: 03 Feb 2016 | Premiered: 03 Feb 2016

Oracle Corporation

Virtual Patching in Mixed Environments: How It Works to Protect You
sponsored by TrendMicro
WHITE PAPER: This white paper discusses virtual patching which provides the same functionality as software patches by implementing protective network controls that can shield vulnerable servers from attack.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


The 10 Step Action Plan: Meeting Your Shared Security Responsibility with Microsoft Azure
sponsored by TrendMicro
WHITE PAPER: In this white paper, discover how to address cloud security with comprehensive administrative, physical and logical controls.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


Monitoring that Cloudy Network
sponsored by SearchSecurity.com
EBOOK: Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchSecurity.com

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

Choosing the Right Hybrid Cloud Solution for Microsoft SQL Server
sponsored by Rackspace
RESOURCE CENTER: In this resource, you will discover how to choose the right hybrid cloud solution for Microsoft SQL Server, based on your enterprise workloads. Read on now to gain expert help in leveraging SQL Server for private cloud and learn how to run SQL Server on an Azure VM, and more.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Rackspace

Best Practices For Public Cloud Security
sponsored by TrendMicro
WHITE PAPER: This white paper discusses the need for cloud managers to balance developer time-to-value with security risks and cost.
Posted: 01 Feb 2016 | Published: 04 Feb 2015


The Key to Cloud Security Compliance: Optimizing Cloud Infrastructure Security Programs
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn why SaaS vendors bear a heavy compliance burden for cloud security. Access now to determine which policies and security controls enterprises should include in their cloud infrastructure security program to prevent cloud security compromises.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CloudPassage

Discovering Dedicated Cloud Services for Big Data Management
sponsored by Oracle Corporation
VIDEO: In this video, you will discover a comprehensive and dedicated cloud service that delivers high performance and agility for your big data environment. Tune in now to learn how this service gives you one fast SQL query over all your data, whether it's in Hadoop, NoSQL, or Oracle Database.
Posted: 28 Jan 2016 | Premiered: 10 Aug 2015

Oracle Corporation

The CISO Role and the Ups and Downs of Cloud Compliance
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn about the shifting roles of the chief information security officer (CISO), as well as how to extend cyber and cloud security concerns beyond your IT department to permeate all layers of leadership. Access this guide in addition to see experts highlight the ups and downs of cloud compliance.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

CloudPassage

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Infographic: Safely Adopt Cloud Services Without Sacrificing Security
sponsored by F5 Networks
RESOURCE: In this infographic, learn some common by often overlooked risks that come with cloud application adoption. Additionally, explore the benefits of one security option that can mitigate these risks, including: ease users' password management, multi-factor authentication, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

F5 Networks
1 - 25 of 959 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement