Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 1227 Matches Previous Page  |  Next Page
Security Orchestration and Micro-Segmentation for Public and Private Cloud
sponsored by Cloudvisory
WHITE PAPER: According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks. Explore this white paper to uncover a cloud security platform that can provide you with protection your organization lacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Cloudvisory

Leaving the Traditional Network WANosaurus Behind with SD-WAN
sponsored by Windstream Communications
WHITE PAPER: The biggest challenge for current networks is the cloud. Explore this white paper to reveal how the SD-WAN technology provides its users with the level of security enterprises demand, while enhancing customer and user experience.
Posted: 22 Sep 2017 | Published: 01 Aug 2017

Windstream Communications

Your Business Apps are Under Attack: Are you really Protected?
sponsored by Alert Logic
VIDEO: Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding business application security and what you can do to protect yourself from cyberattacks.
Posted: 22 Sep 2017 | Premiered: 21 Sep 2017

Alert Logic

Customer Success Story: National Insurance Company
sponsored by J2 Cloud Services
WHITE PAPER: Explore this case study to reveal how a large Fortune 500 insurance company overcame the issue of being at risk for regulatory noncompliance without a secure platform.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

J2 Cloud Services

Cloud Security Report
sponsored by Alert Logic
RESEARCH CONTENT: In this research report conducted by Alert Logic, explore an overview of the different types of attacks and how attackers choose their targets. Then, find out how a security-as-a-service (SaaS) provider can help prevent future security attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Alert Logic

Software-Defined Data Center: Get the Most Out of Today's Infrastructure
sponsored by IBM
RESEARCH CONTENT: This Aberdeen Report outlines the impact of software-defined data centers (SDDC), and the benefits achieved by instituting an SDDC and hybrid cloud in your organization. Read on to take advantage of the agility, automation, and intelligent services the SDDC fosters to gain the most value from both on-premises and cloud infrastructures.
Posted: 22 Sep 2017 | Published: 31 May 2017

IBM

Why Fax over VoIP & SIP is Unreliable and How the Cloud can Help
sponsored by J2 Cloud Services
WHITE PAPER: In this white paper, learn the fundamentals of traditional telecommunications and how enterprises are making the switch to VoIP, SIP, and FoIP protocols and find out the immediate benefits of a cloud-faxing model.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

J2 Cloud Services

Cisco Digital Network Architecture
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper demonstrates how Cisco's Digital Network Architecture (DNA) can help IT professionals learn and implements new techniques to response to changing business conditions faster.
Posted: 21 Sep 2017 | Published: 30 Jun 2017

Cisco Systems, Inc.

Reliability at all Levels
sponsored by Aruba Networks
WEBCAST: In this webinar, listen to Peter Lane, Senior Director of Product Management, ArubaOS answer the common most ask questions about Aruba operating systems and what your organization should consider when evaluating mobility controllers.
Posted: 21 Sep 2017 | Premiered: Jun 8, 2017

Aruba Networks

Using Trend Micro's Hybrid Cloud Security Solution To Meet PCI DSS 3.2 Compliance
sponsored by TrendMicro
WHITE PAPER: After June 30, 2018, all entities must stop use of SSL/early TLS as a security control and use only secure versions of the protocol. Take an in-depth look at this white paper to uncover what you need to know in order to comply with PCI DDS 3.2.
Posted: 21 Sep 2017 | Published: 31 Aug 2017

TrendMicro

The Legal Aid Society of New York Overcomes Effects of Hurricane Sandy with Cloud Services Strategy
sponsored by J2 Cloud Services
CASE STUDY: This case study demonstrates how a cloud faxing model can help improve your everyday business needs with immediate and long-lasting benefits.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

J2 Cloud Services

Enterprise Network Protection Against Cyberattacks Primer: Business Email Compromise
sponsored by TrendMicro
WHITE PAPER: Business email compromise (BEC) schemes have been increasingly successful, as they have become more pervasive. Take a look at this white paper to discover recommendations against BEC.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

TrendMicro

Integrate Cloud Faxing with your Multi-function Printers
sponsored by J2 Cloud Services
WHITE PAPER: This white paper discusses the immediate benefits of a cloud faxing model with the integration of a multi-function printer (MFP).
Posted: 21 Sep 2017 | Published: 21 Sep 2017

J2 Cloud Services

Your Path to the Cloud
sponsored by KCOM
WHITE PAPER: As the future becomes increasingly difficult to predict, more businesses are turning to the cloud for the agility they need to respond swiftly. Discover how to take the first step of the path to cloud adoption. Learn about workload migration, cloud service management, cloud security-as-a-service, and more.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

KCOM

Worldwide Email Security Vendor Assessment
sponsored by TrendMicro
WHITE PAPER: The email security market is a mature market that is experiencing an influx of new features to deal with the adapting threats. Take a look at this white paper to uncover an email security vendor assessment, so that your company can choose which vendor fits your specific needs.
Posted: 21 Sep 2017 | Published: 31 Dec 2016

TrendMicro

Disaster recovery methods: Legacy DR vs. the cloud
sponsored by Colospace Inc.
EGUIDE: When it comes to choosing a disaster recovery method, there's a lot to consider. Cost, RTO and expertise are all important factors to take into account. Download this e-guide to compare legacy DR vs. the cloud and decide which is best for your organization.
Posted: 20 Sep 2017 | Published: 15 Sep 2017

Colospace Inc.

AWS Security Fitness Guide
sponsored by evident.io
WHITE PAPER: Strengthen your cloud and combat the criminals. Read this white paper to reveal how to make your AWS environment less vulnerable to cyberattacks and threats.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

LifeLock Automates Cloud Visibility on AWS with Symantec Cloud Workload Protection
sponsored by AWS - Symantec
CASE STUDY: To keep pace with the increasing demand for their services, LifeLock decided to migrate their on-premises corporate data center to Amazon Web Services (AWS) so they could foster future business growth with the greater scalability and flexibility of the cloud.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

AWS - Symantec

Cloud Workload Protection Automates AWS Cloud Security
sponsored by AWS - Symantec
WHITE PAPER: Deploying the automated Symantec Cloud Workload Protection (CWP) security solution on Amazon Web Services (AWS) can help your organization gain better visibility into your entire cloud environment, which often help business agility, reduces risk, and is cost-effective.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

AWS - Symantec

The 6 Essentials for DevOps Team Excellence
sponsored by evident.io
WHITE PAPER: A recent Enterprise Strategy Group survey found that 45% of organizations currently report having a "problematic shortage" of cybersecurity skills. Take an in-depth look at this white paper to reveal essentials that can help your enterprise form a smart framework for running a secure DevOps organization.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

evident.io

5 Ways to Ensure Digital Business Success
sponsored by Entrust, Inc.
WHITE PAPER: Analysts predict that 40% of all digital initiatives will fail due to mismanagement of identity-related requirements. Read this white paper to uncover 5 ways to ensure stronger authentication and identity management within your business.
Posted: 20 Sep 2017 | Published: 31 Dec 2016

Entrust, Inc.

Trusted Identity:The Foundation forBusiness Transformation
sponsored by Entrust, Inc.
RESOURCE: By 2020, there will be 7.6 billion connected people and 75 billion connected devices. Discover how to securely evolve into a digital and mobile enterprise by using authentication strategies.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Entrust, Inc.

Modernize your Network to Digitize your Business
sponsored by Aruba Networks
RESOURCE CENTER: In this article, learn how the changing network infrastructure and increase of IoT devices motivates organizations to implement new technologies like automation to boost capacity, reliability, and security.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

How A Regional Bank Maintained Information Security with the Cloud
sponsored by J2 Cloud Services
CASE STUDY: In this case study, learn how a regional bank established the cloud faxing model that features redundancy and survivability to help prevent security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

J2 Cloud Services

Enable your Digital Business & Move to the Cloud
sponsored by Entrust, Inc.
RESOURCE: Make sure you are not left behind. Take a look at this infographic to uncover statistics regarding mobile device usage and why you should take the next step and transition to the cloud.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Entrust, Inc.
1 - 25 of 1227 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement