Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 821 Matches Previous Page  |  Next Page
Office 365 Email Migration Surprises – Rhetoric vs. Reality
sponsored by Mimecast
WEBCAST: During this 30 minute webinar, Microsoft Office365 MVP J. Peter Bruzzese, will reveal the post migration surprises he's heard most frequently from companies that have already made the move. He'll provide his realistic assessment of what to expect and what to plan for when moving to the cloud.
Posted: 30 Jun 2015 | Premiered: Jun 3, 2015

Mimecast

Best Practices for Securing Your Cloud Email Service
sponsored by McAfee, Inc.
EGUIDE: This exclusive e-guide compares on-premises and cloud-based email security tools.
Posted: 29 Jun 2015 | Published: 24 Jun 2015

McAfee, Inc.

Data Protection in the Cloud: Are you Protecting Customers and Employees
sponsored by SilverSky
WEBCAST: In this webcast, you will learn the 7 questions to ask vendors to know the level of data protection to expect before migrating to the cloud.
Posted: 29 Jun 2015 | Premiered: Nov 20, 2014

SilverSky

Identify, Mitigate Shadow IT with a Cloud Risk Assessment
sponsored by IBM
WHITE PAPER: This 50-attribute evaluation offers a snapshot of your data with insights on your organization's usage of cloud services and the risks associated with each service.
Posted: 29 Jun 2015 | Published: 31 Dec 2014

IBM

What Consumers Believe About Cloud File Sharing & Why That’s a Warning to IT Pros
sponsored by WinMagic
WHITE PAPER: This white paper explores the pros and cons of each of these three strategies from an IT security perspective. Continue reading to learn the 3 crucial aspects for securing files destined for the cloud and how to appropriately evaluate the risks of cloud file sync and share approaches.
Posted: 26 Jun 2015 | Published: 20 Apr 2015

WinMagic

The Truth About Data-At-Rest Encryption & the Cloud
sponsored by FireHost Inc.
WHITE PAPER: This white paper explains why some methods of encryption are weaker than others and suggests ways to implement the strongest encryption standards for your data-at-rest.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

The True Cost of Cloud Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how higher security in the cloud is the ultimate cost savings measure, even if it appears costly up front.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

How Secure Managed Cloud Services Mitigate Threats
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores why secure managed cloud services can mitigate threats more effectively than basic managed cloud providers.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Cloud provider security policies
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: This security classroom looks at cloud security options from a policy driven point of view.
Posted: 17 Jun 2015 | Premiered: 16 Jun 2015

TOPICS:  Cloud Security
SearchCloudSecurity.com

An Introduction to AWS Security
sponsored by Global Knowledge
WHITE PAPER: This white paper explains the most important aspects of AWS security and what that means to the enterprise.
Posted: 17 Jun 2015 | Published: 05 May 2015

Global Knowledge

When Worlds Collide: Networks and the Cloud Converge
sponsored by SearchNetworking.com
EBOOK: As enterprises move more network services to the cloud, IT must develop plans beyond a robust Internet link and consider the virtual WAN and software-defined WAN, and more.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

TOPICS:  Cloud Security | WAN
SearchNetworking.com

In the Cloud Life Sciences Teams Can Confidently Collaborate
sponsored by Verizon
CASE STUDY: This use case shows how secure cloud can be used to safely and quickly access all of your important enterprise information.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Verizon

Transitioning Enterprise Customers to the Cloud in a Secure Environment
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how service providers can deliver a secure cloud access service without sacrificing the user experience customers have come to expect.
Posted: 09 Jun 2015 | Published: 29 Aug 2014

Pulse Secure

The Evolving Role Of Cloud Security: Understanding Why A New Approach Is Needed
sponsored by Cloud Sherpas
WHITE PAPER: The way forward will lead the security industry of tomorrow in one of two very different directions: The top-down approach of IT pushing back against user autonomy, or the opposite approach, where empowerment and user agency are balanced by behavior analytics and risk measurement policy.
Posted: 08 Jun 2015 | Published: 20 May 2015

Cloud Sherpas

How to achieve project success with the private cloud
sponsored by Dell and Microsoft
EGUIDE: This expert e-guide reveals 5 questions that explain what the private cloud really is, if it guarantees security, how to optimize private cloud performance, and much more.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Dell and Microsoft

Important Cloud Concerns That IT Leaders Should Know
sponsored by Data#3
EGUIDE: Explore this expert e-guide that offers insight from cloud experts that CIOs should keep in mind.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Data#3

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Access this resource to learn about a solution to data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

How You Can Deliver Scalable, Graphics-Rich Virtual Desktops
sponsored by NVIDIA
WHITE PAPER: Download and discover how NVIDIA is redefining virtualization by delivering quality interactive visual experiences with a GPU that can be implemented at scale. Read on and learn how you can gain a competitive edge with all the technology you need to fully virtualize enterprise computing.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

NVIDIA

Think You are Safe from DDoS Attacks?
sponsored by Neustar®
WHITE PAPER: This white paper examines the repercussions of relying solely on firewalls and IPS/IDS to attempt blocking DDoS attacks. View now to learn the steps to take to protect sensitive data stored in the cloud.
Posted: 02 Jun 2015 | Published: 06 May 2015

Neustar®

CISOs' Best Practices for Building Cloud Security Strategy with Confidence
sponsored by IBM
RESOURCE: This infographic presents the top 4 cloud security elements you need to include in your strategy. Continue reading to learn how to mitigate risk in your cloud environment whether it's SaaS, IaaS, or PaaS.
Posted: 01 Jun 2015 | Published: 17 Dec 2014

IBM

The Value of Cloud and Data Security
sponsored by Trend Micro
WHITE PAPER: In this white paper, you'll learn about a simple, comprehensive approach to server security that proves serious economic value for any company.
Posted: 22 May 2015 | Published: 22 May 2015

Trend Micro

How to Avoid Cloud-Based Application Security Breaches
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide reveals the 3 key best practices for preventing cloud-app security breaches and patching vulnerabilities. Learn how to use such technoligies as encryption, sandboxing, and log monitoring to ensure data protection.
Posted: 22 May 2015 | Published: 01 Apr 2015

Hewlett-Packard Company

Security, Storage, and Collaboration Gains from Cloud Solutions
sponsored by Box
WHITE PAPER: Access this white paper to learn how Avago Technologies implemented a new cloud file sync and share service, yielding greater business agility, infrastructure cost-savings and simplified management for greater security.
Posted: 21 May 2015 | Published: 31 Jul 2014

Box
1 - 25 of 821 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement