Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 822 Matches Previous Page  |  Next Page
Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

Cloud Planning Mistakes You'll Make in 2015
sponsored by Rackspace
EGUIDE: This expert e-guide from SearchCloudComputing.com examines common blunders that most organizations make during a cloud deployment – specifically when it comes to security, governance and performance.
Posted: 26 Feb 2015 | Published: 16 Feb 2015

Rackspace

The Value in Threat Intelligence Information
sponsored by Webroot
EGUIDE: This expert guide describes the pros and cons of threat intelligence and helps you decide if it's right for your company.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Webroot

Protecting your Data Strategy in the Cloud
sponsored by BitGlass
EGUIDE: In this expert e-guide, you will uncover how to adjust your cloud security strategy based on use and the vendor. Read on now to learn about new attack vectors and security complications.
Posted: 20 Feb 2015 | Published: 07 Jan 2015

BitGlass

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper tells you exactly what those precautions are and how to take them when dealing with the cloud.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Rackspace

7 Steps to Securing Healthcare Infrastructures Using a Cloud Security Plan
sponsored by NaviSite
WHITE PAPER: This resource outlines the 7 steps you need to follow in order to secure infrastructures using a cloud security plan. By adhering to the following seven-step plan, you can bank on a proven methodology for cost-effectively and securely leveraging cloud services.
Posted: 19 Feb 2015 | Published: 18 Feb 2015

NaviSite

Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus

In Cloud Storage, Options Abound
sponsored by SearchCloudComputing.com
EBOOK: Examine cloud-based storage in terms of cost, manageability, security and latency/availability.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

SearchCloudComputing.com

Securing Your Cloud Deployment with Today's Top Strategies
sponsored by SearchCloudSecurity.com
EZINE: In this Insider Edition, InfoSec Pros will learn how to achieve better cloud security. It reviews existing cloud security standards and how to assess, and manage, the risk of a cloud deployment.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchCloudSecurity.com

The New Cloud Framework: Best Practices for Enterprise Data
sponsored by Druva Software
WEBCAST: Tune into this webcast to hear from executives at Druva, Okta, Birst, and CipherCloud as they discuss how cloud providers are addressing challenges with innovation, creating a next generation framework for critical data.
Posted: 13 Feb 2015 | Premiered: Feb 13, 2015

Druva Software

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

Your Roadmap to More Effective Endpoint Protection
sponsored by Bit9, Inc.
EGUIDE: This expert guide gives up-to-date information on the best ways to protect your network's endpoints.
Posted: 12 Feb 2015 | Published: 12 Feb 2015

Bit9, Inc.

Power Systems Cloud Infographic
sponsored by IBM
WHITE PAPER: Integrating security into your cloud allows you to deal with only 2% of the intrusions other architectures face. This infographic introduces a virtual server to deploy in the cloud that provides a 50% reduction in operational expenses.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

IBM

Build your services business with Veeam and Microsoft Azure Marketplace
sponsored by Veeam Software
WHITE PAPER: Access this white paper to discover how to build your IT service business using cloud provider programs.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Veeam Software

Webinar: Endpoint Data Privacy in The Cloud
sponsored by Druva Software
WEBCAST: Tune into this webinar to discover an endpoint backup tool for data stored in the cloud.
Posted: 11 Feb 2015 | Premiered: Feb 11, 2015

Druva Software

An Expert Guide on Vulnerability Management Programs
sponsored by Risk IO
EGUIDE: With this helpful e-guide, learn how to best implement authenticated vulnerability scans to make the most of your security practices.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Risk IO

How Multifunction Printers can Create Unexpected Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This analyst brief reveals the consequences of nonsecure MFPs, and offers essential guidance on how to secure them.
Posted: 10 Feb 2015 | Published: 31 Jul 2014

Hewlett-Packard Company

Application Security in the Age of Cloud, BYOD, and SaaS
sponsored by BitGlass
WHITE PAPER: This white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

BitGlass

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

How to Bolster Office 365's Built-In Security Functionality
sponsored by BitGlass
WHITE PAPER: This white paper explains how you can bolster Office 365's built-in security functionality with a comprehensive, in-house security plan, and lists the key areas that your enterprise has to address.
Posted: 04 Feb 2015 | Published: 31 Dec 2014

BitGlass

The Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: This white paper discusses Cloud Access Security Brokers (CASBs) as a potential solution for enterprises looking to safely enable cloud apps and mobile devices.
Posted: 04 Feb 2015 | Published: 29 Aug 2014

BitGlass

Office 365: How Bitglass Restores Visibility and Data Protection to IT
sponsored by BitGlass
WHITE PAPER: This white paper presents a potential solution for the security and compliance issues raised by Office 365, enabling enterprises to secure their data outside of the firewall while maintaining user privacy.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

Does App Security Pay? The Business Impact of Security Tools
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 01 Feb 2015 | Published: 20 Jan 2014

Hewlett-Packard Company

Reducing security risks from open source software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights how your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Posted: 01 Feb 2015 | Published: 01 Oct 2013

Hewlett-Packard Company
1 - 25 of 822 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement