Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 846 Matches Previous Page  |  Next Page
Critical Factors to Endpoint Security
sponsored by Dell India
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell India

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Device and Data Protection - Part 2
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Device and Data Protection - Part 1
sponsored by Dell, Inc. and Intel®
WEBCAST: Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

The State of Cloud Security: 2015 Survey Results
sponsored by CloudPassage
VIDEO: Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.
Posted: 23 Apr 2015 | Premiered: 31 Mar 2015

CloudPassage

Cloud Security Survey Report 2015
sponsored by CloudPassage
ANALYST REPORT: This comprehensive survey details what information security professionals believe is the current state of cloud security.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

CloudPassage

Enterprise Development in the Cloud: Top Benefits, Drivers, and Concerns
sponsored by Red Hat
WHITE PAPER: According to a survey of 408 enterprise IT software development professionals, enterprises using the cloud see improvements in time to market as well as higher productivity. Read this white paper for key findings from this survey regarding enterprise development in the cloud.
Posted: 21 Apr 2015 | Published: 17 Jun 2014

Red Hat

Monitoring Security In Cloud Environments
sponsored by CloudPassage
ANALYST REPORT: In this Dark Reading report, examine tools and practices that enterprises can use to monitor the security of cloud environments and receive notifications when their data might be at risk.
Posted: 21 Apr 2015 | Published: 31 Mar 2015

CloudPassage

Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 20 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

Navigating the Cloud for MSPS
sponsored by N-able Technologies
EGUIDE: In this E-Guide you will find the synopsis of a MSPAlliance webinar about security risks for your MSP.  Also included is a discussion of five cloud security issues facing MSPs.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

N-able Technologies

Tips for Successful Private Cloud Planning and IP Address Management
sponsored by Infoblox
EGUIDE: This expert e-guide teaches you the five questions to ask to ensure optimal performance and security.  Read on to uncover the answers in this helpful guide.
Posted: 17 Apr 2015 | Published: 14 Jan 2015

Infoblox

Monitoring the Hybrid Cloud: Evolving to the CloudSOC
sponsored by IBM
WHITE PAPER: In this in-depth white paper, find tips for managing all aspects of cloud computing without sacrificing security monitoring.
Posted: 17 Apr 2015 | Published: 07 Jan 2015

IBM

Confident and Careful: The Security Benefits of the Cloud
sponsored by IBM
WHITE PAPER: In this infographic, discover why cloud security services could be the answer to your organization's needs.
Posted: 17 Apr 2015 | Published: 31 Dec 2014

IBM

Reimagining API Performance
sponsored by Mashery
WHITE PAPER: Hightail powers secure business collaboration for more than 600,000 paid subscribers and 40 million registered users. APIs help Hightail maximize the cloud with peerless security and seamlessly connect businesses. Download this case study to learn more.
Posted: 16 Apr 2015 | Published: 31 Jul 2014

Mashery

Connecting the Data-Driven Enterprise
sponsored by Talend
WEBCAST: This webcast describes how you can gain instant, flexible, and secure capacity so IT professionals can shift workloads between local (on-premise) and the cloud. Watch to increase speed, performance, and efficiency, ultimately lowering costs.
Posted: 15 Apr 2015 | Premiered: Apr 15, 2015

Talend

Cloud Endpoint Security: Considerations for Cloud Security Services and Management
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide discusses the advent of cloud endpoint security and analyzes its pros and cons.
Posted: 15 Apr 2015 | Published: 15 Apr 2015

GeoTrust, Inc.

What Exactly Does AWS Security Protect?
sponsored by Trend Micro
EGUIDE: This exclusive e-guide outlines the differences in responsibilities between application architects and developers and AWS security when securing apps on AWS. Discover expert advice for securing business data and applications in the AWS cloud and find out how AWS partners are continuing to adapt to the pace of innovation of AWS.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Trend Micro

Best Practices for Improving AWS Security
sponsored by Trend Micro
EGUIDE: Inside this informative e-guide, discover the best practices for developing a security group policy. Additionally, get an AWS security and Amazon EC2 security tutorial, and find out how using DevOps can improve AWS security.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Trend Micro

Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

Combating Password Sharing and Misuse with IAM
sponsored by SailPoint Technologies
EGUIDE: In this expert eguide, explore the staggering statistics of irresponsible password use and how IAM can save your organization from being in the next breach headline.
Posted: 06 Apr 2015 | Published: 11 Mar 2015

SailPoint Technologies

BYOD and Mobile Computing: Keep Data Secure and IT Sane
sponsored by Veracode, Inc.
WHITE PAPER: Access this informative fact sheet to learn about cloud-based solutions that evaluate all mobile applications on enterprise-managed devices. Discover how the service taps information about hundreds of thousands of mobile applications, using behavioral analysis technology.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

Security Vs. Innovation: Do CIOs have to choose?
sponsored by Red Hat
WHITE PAPER: This article shows how you can balance your need for business innovation and security by introducing a secure datacenter that allows for secure BYOD, cloud computing and more.
Posted: 03 Apr 2015 | Published: 31 Dec 2014

Red Hat

Understanding Today’s Global Privacy Requirements for Data Protection in the Cloud
sponsored by Druva Software
WEBCAST: Access this webinar to learn about changes in data privacy laws.
Posted: 02 Apr 2015 | Premiered: Apr 2, 2015

Druva Software

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper tells you exactly what security precautions need to be taken when using cloud services.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

Rackspace

How to Drive Your Cloud Strategy with Private Network Solutions
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper highlights cloud challenges, bridging clouds and networks together, the shared responsibility of security, and more.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Level 3 Communications, Inc.
1 - 25 of 846 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement