Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
1 - 25 of 702 Matches Previous Page  | Next Page
How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER: This white paper outlines the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

Webroot

Encryption Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Sophos, Inc.

A Security Overview of Adobe Cloud Services
sponsored by CDW Corporation
WHITE PAPER: Explore this informative whitepaper to learn how Adobe designs their cloud services, what they do to keep them secure, and how you can give your team the competitive edge in the workplace by making a leap to the cloud.
Posted: 18 Apr 2014 | Published: 01 Jan 2014

CDW Corporation

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Predictions 2014: Identity and Access Management
sponsored by IBM
ANALYST REPORT: This Gartner report reveals predictions for identity and access management (IAM) tools needed for 2014.
Posted: 17 Apr 2014 | Published: 26 Nov 2013

IBM

Security based on trust not fear
sponsored by Qualys
WHITE PAPER: This paper provides examples of how cloud services can be used to ensure Web applications and websites instill trust and confidence in the minds of customers.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Qualys

Nine Steps to Smart Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper lists 9 steps to achieving smart security for small businesses and focuses on how a cloud security solution can benefit organizations without the resources for traditional security approaches.
Posted: 16 Apr 2014 | Published: 30 Dec 2011

Qualys

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you improve efficiencies, reduce risks, and maximize ROI.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER: This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Webroot

2013 MarketScope Report for Web Access Management
sponsored by IBM
ANALYST REPORT: This Gartner MarketScope report compares the top Web access management (WAM) vendors on the market today to help you decide which product will best fit your business needs.
Posted: 15 Apr 2014 | Published: 15 Nov 2013

IBM

5 Things to Look for in a Cloud Provider When it Comes to Security
sponsored by Oracle Corporation
WHITE PAPER: Many organizations today are moving their business to the cloud to save money and increase efficiency. But, this comes with security and related operational risks. In this white paper, find five important things to look for in a cloud provider, with your cloud's security in mind.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

Oracle Corporation

Encryption in the cloud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Cloud Sourcing - Leveraging the Real Value of Cloud Services Brokerage
sponsored by Dell, Inc.
RESOURCE: This resource details the results of a study that reveals the value of cloud services brokerage and how it can help you meet all of your business requirements.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Dell, Inc.

Cost vs. ROI: Is There Value to Virtualization and Cloud Computing?
sponsored by Windstream Communications
WHITE PAPER: This informative whitepaper takes a look at the costs of cloud computing and what you can expect for a return on investment.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

Windstream Communications

5 Reasons to Consider SaaS for Your Business Applications
sponsored by Oracle Corporation
WHITE PAPER: This paper examines five reasons why LOB managers should consider business applications delivered using the software-as-a-service (SaaS) model, and in particular why they should consider SaaS business applications from Oracle.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Oracle Corporation

IT Leaders Can Be Brokers of Cloud Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Check out this concise webcast to find out what IT leaders need to do to provide top-notch performance, security and control across the cloud infrastructure.
Posted: 08 Apr 2014 | Premiered: Feb 10, 2014

Cisco Systems, Inc.

CA Management Cloud for Mobility
sponsored by CA Technologies.
WEBCAST: This brief webcast highlights a cloud-based management solution from CA that can help organizations manage the BYOD devices of their workforce.
Posted: 07 Apr 2014 | Premiered: Feb 23, 2014

CA Technologies.

HP Fundamentals: Decreasing IT Risk in the age of cloud, big data, and virtualization
sponsored by Hewlett-Packard Company
WEBCAST: Watch this informative webcast to discover how you can lower the risk of adopting more complex IT innovations, such as cloud and virtualization, so your organization can reap the benefits of such technologies without sacrificing security.
Posted: 07 Apr 2014 | Premiered: Apr 2, 2014

Hewlett-Packard Company

Proper Cloud Fraud Detection and Prevention Practices for Cloud Providers
sponsored by ThreatMetrix
EGUIDE: This expert E-Guide discusses how cloud-based fraud occurs and consequences of failure to detect fraud.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

ThreatMetrix

A Computer Weekly buyer’s guide to hybrid cloud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at how to find the best hybrid cloud provider for your organisation, the impact of hybrid cloud on the infrastructure manager and how Microsoft is catching up with the cloud market with Azure.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

ComputerWeekly.com

Data Security Through the Cloud
sponsored by Cisco Systems, Inc.
RESOURCE: The combination of cloud computing and mobility is often the perfect storm for security threats. Check out this blog post to learn about the threats that could be facing your data stored in the cloud, and how to overcome 2014's top cloud security challenges.
Posted: 03 Apr 2014 | Published: 06 Mar 2014

Cisco Systems, Inc.

The Future of IT: Drive New Consumption Model with Cloud and Hybrid IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: Since most businesses that consume cloud services are operating on hybrid models, managing and governing on-premise systems as well as external cloud services is often a struggle. To tackle this task, Gartner Research suggests that large enterprises think of IT as a "service broker."
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Cisco Systems, Inc.
1 - 25 of 702 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement