Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
1 - 25 of 821 Matches Previous Page  | Next Page
10 Considerations in Moving to the Cloud: Is the Cloud Right for Your Contact Center?
sponsored by Genesys
EBOOK: As more network centers continue to embrace the cloud, there are plenty of service choices - and they can be tricky to choose from.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

Genesys

Cloud computing and security: It’s all about automation
sponsored by CloudPassage
EGUIDE: An API-driven strategy could streamline cloud security and improve security overall. Read how in this expert e-Guide.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

CloudPassage

Cloud IAM catching on in the enterprise
sponsored by IBM
EGUIDE: This expert e-guide explains why the market for cloud-based IAM is growing.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

IBM

Identity and access management (IAM) in the cloud Challenges galore
sponsored by IBM
EGUIDE: This expert e-guide points out challenges surrounding IAM in the cloud that Indian businesses are now dealing with.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

Show Me Simpana - Access
sponsored by CommVault Systems, Inc.
VIDEO: This exclusive video examines a single platform that provides instant, secure anytime anywhere access to your data.
Posted: 10 Sep 2014 | Premiered: 25 Feb 2013

CommVault Systems, Inc.

Affinity Credit Union Chooses HP Fortify On Demand - Cloud-Based Security Assessment Service for Mobile Remote Deposit Capture Application
sponsored by Hewlett-Packard Company
CASE STUDY: In this case study, explore how this company used a cloud-based security assessment service to improve banking applications.
Posted: 10 Sep 2014 | Published: 30 Nov 2013

Hewlett-Packard Company

Achieving PCI DSS Peace of Mind in the Cloud
sponsored by CloudPassage
WHITE PAPER: Access this white paper to learn how you can achieve PCI DSS compliance in the cloud without any hassle or setbacks.
Posted: 09 Sep 2014 | Published: 30 Jun 2014

CloudPassage

Cloud and Compliance in One – Is It Possible?
sponsored by Intel Security
WHITE PAPER: Read this insightful report on an integrated security system that help organization stay protected and compliant in cloud-based environments.
Posted: 09 Sep 2014 | Published: 31 Dec 2013

Intel Security

Citrix ShareFile Cloud for Healthcare: 10 Days to Facilitate HIPAA Compliance
sponsored by CloudPassage
WHITE PAPER: Check out this white paper to find out how one particular company utilized a virtual private cloud to support HIPAA compliance regulations.
Posted: 09 Sep 2014 | Published: 31 Mar 2014

CloudPassage

10 Critical Requirements for Cloud Applications
sponsored by Workday
VIDEO: Uncover the top 10 requirements for cloud applications, and find out what you should be looking for from vendors.
Posted: 08 Sep 2014 | Premiered: 29 Jun 2013

Workday

Carving a path through IaaS security with CloudPassage
sponsored by CloudPassage
WHITE PAPER: Access this white paper to find out about one comprehensive solution that employs threat intelligence within the cloud and uses behavioral analysis to detect anomalies. Don't leave your cloud infrastructure at risk.
Posted: 05 Sep 2014 | Published: 21 Apr 2014

CloudPassage

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Cloud Web Security Alleviates Network Congestion
sponsored by Cisco
CASE STUDY: This case study reveals how building supplies distributor MacArthur Corporation, secured internet use in the cloud in order to relieve network congestion, without adding any bandwidth.
Posted: 03 Sep 2014 | Published: 31 Dec 2012

Cisco

The 10-Minute Guide to Cloud Encryption Gateways
sponsored by CipherCloud
WHITE PAPER: Learn about the innovative solutions that have been developed to address the security concerns regarding business applications in the cloud.
Posted: 03 Sep 2014 | Published: 31 Dec 2013

CipherCloud

Biotechnology Company Automates Compliance, Delivers Cloud Services
sponsored by Hewlett-Packard Company
WHITE PAPER: Reduced provisioning from weeks to minutes.HP cloud and automation solutions helped a biotechnology company achieve a level of control that is unprecedented in its sector. Get the details by downloading and reading the case study.
Posted: 03 Sep 2014 | Published: 30 Jun 2014

Hewlett-Packard Company

Managed Mobility Services: Reduce Your Mobility Risk and Improve Productivity
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces one company's managed mobility services, which provide secure access to mobile applications and data, and the ability to securely store, sync, and share files anytime, anywhere, and from any device.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Limited

The Next Generation of Data-Driven Security
sponsored by MapR Technologies
WHITE PAPER: In this in-depth white paper, get the facts on how new adaptive algorithms like Machine Learning and Big Data can identify security risks that other outdated techniques simply couldn't.
Posted: 02 Sep 2014 | Published: 30 Jun 2014

MapR Technologies

The Changing Face of Disaster Recovery as a Service
sponsored by Dell, Inc.
WEBCAST: This exclusive webcast examines the changes you have to make to your disaster recovery plans as a result of the changes happening in the market.
Posted: 02 Sep 2014 | Premiered: Aug 29, 2014

Dell, Inc.

Securing Data at Rest with Encryption
sponsored by Amazon Web Services and Intel
WHITE PAPER: This white paper provides an overview of various methods for encrypting data at rest in Amazon Web Services (AWS).
Posted: 02 Sep 2014 | Published: 30 Nov 2013

Amazon Web Services and Intel

AWS: How to Choose a Cloud Platform Fit for your Organization
sponsored by Amazon Web Services and Intel
WHITE PAPER: Access this in-depth resource that covers all of the requirements that you can use in your cloud evaluation process. Read on to gain insight into 13 features from Amazon Web Services cloud platform, and discover information about why you might need the capabilities for your organization.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

Amazon Web Services and Intel

AWS Cloud Security
sponsored by CloudPassage
WHITE PAPER: Security and risk professionals should access this Forrester research report to learn about a security solution that provides infrastructure plus a wide set of IT services.
Posted: 29 Aug 2014 | Published: 21 Feb 2014

CloudPassage

Managing Mobile Application Security in the Age of BYOD and the Cloud
sponsored by Bluebox
WHITE PAPER: In this expert guide, get an inside look at how to improve your organization's mobile app security and how to avoid the common pitfalls of cloud-based MAM.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Bluebox

Instant Mobile Device Management
sponsored by Fiberlink
DATA SHEET: The BYOD era has created plenty of management issues, from device diversity to security, there is a lot to think about.  Deploying an easy-to-us cloud platform with complete functionality can allow you to focus on protecting sensitive data, and less time managing it.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Fiberlink

Analyst Report: How 9 Managed Security Service Providers Stack Up
sponsored by IBM
ANALYST REPORT: This Forrester Research, Inc. report identifies 9 managed security services providers (MSSPs) – AT&T, CSC, IBM, and more – that were researched, analyzed, and compared against one another. Explore how each provider stacks up against three categories: current offering, strategy, and market presence.
Posted: 26 Aug 2014 | Published: 26 Mar 2012

IBM

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems
1 - 25 of 821 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement