Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 949 Matches Previous Page  |  Next Page
How to Contain the Cloud, and Other Security Questions
sponsored by SearchCloudSecurity.com
EZINE: This Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.
Posted: 09 Feb 2016 | Published: 10 Feb 2016

SearchCloudSecurity.com

Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016


Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: In this series of brief videos, you will learn how to transform your data into a powerful strategic asset with a holistic data protection platform—enabling you to access all of your data safely from any endpoint. Tune in to ensure your data is accessible, compliant, and ready to share across all lines of your business.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that drives IT risk reduction and operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Read on to discover how this platform can allow your enterprise to protect and manage all your credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

Compensating Security Controls for Windows Server 2003 Security
sponsored by TrendMicro
WHITE PAPER: This white paper shows you a solution while you're in the process of migration. Learn how you can get network, system and anti-malware security controls across physical, virtual and cloud systems running W2K3.
Posted: 04 Feb 2016 | Published: 31 May 2015


Using Trend Micro’s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance
sponsored by TrendMicro
WHITE PAPER: This white paper examines a platform that delivers a comprehensive set of security controls optimized for modern data centered and the cloud.
Posted: 04 Feb 2016 | Published: 30 Apr 2015


Easynet: Securing Customer Data Globally
sponsored by Hewlett-Packard Enterprise
VIDEO: In the following brief, video case study, learn how through the help of HPE Helion, Easynet was able to successfully deliver the flexibility and security needed by their customers worldwide.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Hewlett-Packard Enterprise

Searching for Better Big Data Business Value? Look to the Cloud
sponsored by Oracle Corporation
VIDEO: In this brief video, you will discover a big data cloud service that utilizes the latest advances in big data processing and unifies these processes with Oracle's Big Data SQL. Tune in to access the benefits of cloud-enabled data management.
Posted: 03 Feb 2016 | Premiered: 03 Feb 2016

Oracle Corporation

Virtual Patching in Mixed Environments: How It Works to Protect You
sponsored by TrendMicro
WHITE PAPER: This white paper discusses virtual patching which provides the same functionality as software patches by implementing protective network controls that can shield vulnerable servers from attack.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


The 10 Step Action Plan: Meeting Your Shared Security Responsibility with Microsoft Azure
sponsored by TrendMicro
WHITE PAPER: This white paper gives you a solution that addresses cloud security with comprehensive administrative, physical and logical controls.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


Monitoring that Cloudy Network
sponsored by SearchSecurity.com
EBOOK: Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchSecurity.com

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

Choosing the Right Hybrid Cloud Solution for Microsoft SQL Server
sponsored by Rackspace
RESOURCE CENTER: In this resource, you will discover how to choose the right hybrid cloud solution for Microsoft SQL Server, based on your enterprise workloads. Read on now to gain expert help in leveraging SQL Server for private cloud and learn how to run SQL Server on an Azure VM, and more.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Rackspace

Best Practices For Public Cloud Security
sponsored by TrendMicro
WHITE PAPER: This white paper discusses the need for cloud managers to balance developer time-to-value with security risks and cost.
Posted: 01 Feb 2016 | Published: 04 Feb 2015


The Key to Cloud Security Compliance: Optimizing Cloud Infrastructure Security Programs
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn why SaaS vendors bear a heavy compliance burden for cloud security. Access now to determine which policies and security controls enterprises should include in their cloud infrastructure security program to prevent cloud security compromises.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CloudPassage

Discovering Dedicated Cloud Services for Big Data Management
sponsored by Oracle Corporation
VIDEO: In this video, you will discover a comprehensive and dedicated cloud service that delivers high performance and agility for your big data environment. Tune in now to learn how this service gives you one fast SQL query over all your data, whether it's in Hadoop, NoSQL, or Oracle Database.
Posted: 28 Jan 2016 | Premiered: 10 Aug 2015

Oracle Corporation

The CISO Role and the Ups and Downs of Cloud Compliance
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn about the shifting roles of the chief information security officer (CISO), as well as how to extend cyber and cloud security concerns beyond your IT department to permeate all layers of leadership. Access this guide in addition to see experts highlight the ups and downs of cloud compliance.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

CloudPassage

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Infographic: Safely Adopt Cloud Services Without Sacrificing Security
sponsored by F5 Networks
RESOURCE: In this infographic, learn some common by often overlooked risks that come with cloud application adoption. Additionally, explore the benefits of one security option that can mitigate these risks, including: ease users' password management, multi-factor authentication, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

F5 Networks

The Realities of FedRAMP Continuous Monitoring and Penetration Testing Requirements
sponsored by Coalfire
WEBCAST: This webcast explores the requirements that CSPs must meet on monthly, quarterly and an annual basis. Find answers to common FedRAMP questions, solutions for complexities that continuous monitoring can present and lessons learned from the continuous monitoring portion of FedRAMP.
Posted: 26 Jan 2016 | Premiered: Sep 16, 2015

Coalfire

Key Considerations in choosing a WAF
sponsored by F5 Networks
WHITE PAPER: Attacks are becoming more sophisticated, and keeping up to date on security measures can be challenging. In this detailed white paper, explore both the basic and advanced considerations of selecting a web application firewall today, including performance, high availability, reliability, automatic attack detection, ease of management, and much more.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

F5 Networks

FedRAMP for SaaS
sponsored by Coalfire
WEBCAST: Watch this webcast to discover how FedRAMP can increase your confidence in the security of your cloud solutions.
Posted: 26 Jan 2016 | Premiered: Mar 18, 2015

Coalfire

On-Demand Hybrid Cloud for Production Workloads: Storage Consolidation
sponsored by Velostrata
WHITE PAPER: In this white paper, learn about an on-demand hybrid cloud option for production workloads that can be used to consolidate storage and optimize performance. Explore the additional benefits of this option, including: reduced costs by consolidating storage, improved business agility by running compute instances in the cloud as needed, and more.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Velostrata

Eliminating the Drawbacks of Distributed SaaS Provider Identity
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Project Planning for FedRAMP
sponsored by Coalfire
WHITE PAPER: Access this white paper and learn how FedRAMP is intended to improve the security of the cloud implementations that support the operation of the federal government.
Posted: 25 Jan 2016 | Published: 15 Jul 2015

Coalfire
1 - 25 of 949 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement