Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 1124 Matches Previous Page  |  Next Page
Dedicated to Information Security: The High-Stakes Role of the CISO
sponsored by SearchSecurity.com
EZINE: Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's elevation and influence on broader security initiatives, plus challenges of the job and the changes ahead.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

SearchSecurity.com

CW ASEAN - December 2016
sponsored by SearchDataCenter.com
EZINE: In this month's CW ASEAN, read how Singapore is setting itself to be a leader in the digital age.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

SearchDataCenter.com

Get Control Over Your Cloud Security
sponsored by LogRhythm, Inc.
WHITE PAPER: You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Devise a Cloud Strategy that Doesn't Cast a Shadow on App Performance
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Download this paper to learn how to devise a cloud strategy that doesn't cast a shadow on, or deter, app performance. Discover several cloud deployment models compared for their visibility and control, including private cloud, SaaS, and 2 more.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Riverbed Technology, Inc.

Facts About the Cloud
sponsored by Sage Live
RESOURCE: By now, everyone should realize that the cloud is an essential part of every businesses strategy and will continue to be as we move forward. Access this infographic for some fast facts about the cloud and what to expect for the future usage of the technology.
Posted: 29 Nov 2016 | Published: 29 Nov 2016

Sage Live

Exchange to Office 365 Migration: The Good, the Bad, and Essentials Tools to Ease the Transition
sponsored by Riverbed Technology, Inc.
EGUIDE: Discover how to set an effective strategy for Office 365 migration in this e-guide. By reading on, learn about the advantages of its advanced content management and collaboration, as well as iron out potential app migration headaches when moving from Exchange and non-Exchange platforms.
Posted: 28 Nov 2016 | Published: 22 Nov 2016

Riverbed Technology, Inc.

Crunching the Costs of Microsoft Exchange On-premises vs. Cloud Services
sponsored by Riverbed Technology, Inc.
EGUIDE: Download this expert guide to learn how to calculate the costs of on-premises Exchange versus those of Office 365's mail service, and from this assessment deduce if the O365 cloud is your enterprise's best option for collaboration. Discover new cost factors such as electricity, bandwidth needs, personnel expenses, and more.
Posted: 28 Nov 2016 | Published: 22 Nov 2016

Riverbed Technology, Inc.

Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

The Evolution of Cloud Security: Perception vs. Reality
sponsored by BitGlass
WHITE PAPER: This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Application Performance Tools for Microsoft Office 365
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Access this resource to discover an app performance tool that will transform Office 365 by leveraging hybrid IT for new forms of operational and network agility. Learn how to enact complete performance awareness of O365 apps and make optimal use of network resources by analyzing design and traffic.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Riverbed Technology, Inc.

How to Facilitate a Successful Transition to Office 365: A Brief Video
sponsored by Riverbed Technology, Inc.
VIDEO: Discover a tool that will identify and mitigate hidden network constraints to ensure a smooth transition to O365. Here, learn how to analyze your network requirements with dependency mapping, capacity planning, and SLA analyses to ensure the best performance for all O365 end users.
Posted: 28 Nov 2016 | Premiered: 16 Sep 2016

Riverbed Technology, Inc.

The Intricacies of a CASB Revealed
sponsored by BitGlass
WEBCAST: This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.
Posted: 23 Nov 2016 | Premiered: Aug 10, 2016

BitGlass

Top 6 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: Discover solutions to your cloud worries and how to maximize the benefits of its adoption. Learn how to overcome: concerns about cloud security, applications that aren't cloud ready, unexpected costs, and more.
Posted: 23 Nov 2016 | Published: 23 Nov 2016

Commvault

Exchange 2016 Upgrade Outlined and Considerations for Your Recovery Plan
sponsored by Riverbed Technology, Inc.
EGUIDE: This expert guide illustrates five migration issues that IT admins must tackle in order to upgrade to Exchange 2016 without adversely affecting end users. Additionally, read on to formulate a recovery plan for Office 365 outages by asking yourself the seven essential questions outlined here.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

Riverbed Technology, Inc.

The Future Of Data Security And Privacy: Growth And Competitive Differentiation
sponsored by Absolute
ANALYST REPORT: Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.
Posted: 22 Nov 2016 | Published: 07 Jul 2016

Absolute

5 Keys to Boosting Cloud Security Confidence
sponsored by BitGlass
WEBCAST: Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.
Posted: 22 Nov 2016 | Premiered: Nov 22, 2016

BitGlass

Market Guide for Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: Learn the intricacies of the Cloud Access Security Brokers (CASBs) market. Discover how they relate and interact with compliance, data security, threat protection, and more.
Posted: 18 Nov 2016 | Published: 24 Oct 2016

BitGlass

Adjusting a Continuous Monitoring Strategy to a Hybrid Era
sponsored by LogRhythm, Inc.
EGUIDE: Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.
Posted: 18 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

Office 365: Enabling More Secure Collaboration
sponsored by VMware
WHITE PAPER: How can you ensure secure collaboration with Office 365? Learn 3 steps to make this possible, as well as 3 stages of adoption for security add-ons for Office 365.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

VMware

Go Beyond Just Securing Your Cloud, Make it Better
sponsored by Intel Security
RESOURCE CENTER: Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Intel Security

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Maintaining Compliance for the Cloud Generation
sponsored by Blue Coat Systems
WHITE PAPER: Learn what regulations govern compliance in the cloud how to maintain them. Access this white paper now to discover the liability companies have from using various cloud apps, what industries are most affected by cloud compliance issues, how to ensure cloud vendors conform to compliance guidelines, and more.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Blue Coat Systems

Comprehensive Protections for Cloud Networks
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Uncover advanced threat prevention security for internal traffic inside a virtual infrastructure. Access now and explore scalability of security that adjusts to dynamic network changes, context-aware security policies that leverage security groups, and more.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Check Point Software Technologies Ltd.

Free Your Files From The Risk Of Ransomware
sponsored by Microsoft
WHITE PAPER: In this white paper discover some helpful tips for choosing a secure file storage program. Learn how a security offering should offer unlimited scalability, eliminate the need for WAN optimization, automatically scan for threats, and more.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Microsoft

Barbarians at the Gate - Shoring Up Web Application Defenses with Client Reputation
sponsored by Akamai
WHITE PAPER: Web application firewalls (WAFs) have become increasingly useful in mitigating cyberthreat risk to online assets for many companies. Learn how this and other cloud security approaches should be used in combination as part of your comprehensive defense strategy.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Akamai
1 - 25 of 1124 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement