Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 855 Matches Previous Page  |  Next Page
Cloud Security through Trend Micro Deep Security
sponsored by Trend Micro
VIDEO: Inside this brief video, learn about a technology that provides organizations with the tools to mitigate security threats built especially for the cloud. Find out how one click can add security to your instances without you having to manage the entire security infrastructure yourself.
Posted: 31 Mar 2015 | Premiered: 18 Dec 2014

Trend Micro

Security Best Practices for Amazon Web Services
sponsored by AlienVault
WHITE PAPER: In this white paper, learn how to be a smart user of AWS with tips for security best practices.
Posted: 31 Mar 2015 | Published: 12 Jan 2015

AlienVault

Deep Security as a Service
sponsored by Trend Micro
DATA SHEET: Access this datasheet to learn about a technology designed specifically for securing cloud workloads by complementing the cloud service provider's security. Find out the key benefits and how it provides 6 key security capabilities.
Posted: 31 Mar 2015 | Published: 31 Dec 2014

Trend Micro

Top 10 Considerations for Securing Private Clouds
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper offers 10 considerations for improving private cloud security to keep cybercriminals out and away from your data.  Access now to learn valuable security insights.
Posted: 30 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

The Cloud is Only as Secure as its Provider
sponsored by QTS
WHITE PAPER: In this white paper, discover the top concerns for CIOs surrounding cloud computing, and explore the challenges many businesses face when moving to cloud.
Posted: 29 Mar 2015 | Published: 29 Mar 2015

QTS

3 Approaches to Stop DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper examines the threat landscape of DDoS attacks and details the shortcomings of traditional security approaches. You will uncover how to evaluate and craft a new security strategy to mitigate DDoS attacks based on whether you compute on-premises, in the cloud, or in a hybrid environment. View now to learn more.
Posted: 27 Mar 2015 | Published: 04 Mar 2015

Radware

Deep Security AWS Success
sponsored by Trend Micro
CASE STUDY: This case study highlights how one organization integrated a security platform into their virtualized environment to ensure compliance for public cloud and AWS to provide secure gaming, social networking, and e-commerce services to its customers.
Posted: 27 Mar 2015 | Published: 31 Dec 2014

Trend Micro

Generation Now – Pervasive Content Collaboration: Leveraging Cloud with ECM
sponsored by IBM
WHITE PAPER: Upon viewing this white paper, you'll discover how cloud platforms can be leveraged to push applications from a central location, with bi-directional architecture so the platform can be distributed to multiple regions and divisions. Discover top drivers for implementing cloud.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

IBM

Common Cloud Pitfalls, and How to Avoid Them
sponsored by QTS
EGUIDE: This expert guide will walk you through everything you need to know to safely migrate to cloud solutions.
Posted: 26 Mar 2015 | Published: 26 Mar 2015

QTS

Application-Centric Infrastructure Streamlines IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper introduces a network infrastructure that combines most needs into one place for a more efficient and more effective IT.
Posted: 26 Mar 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Preparing for the Hidden Impact of Cloud Solutions
sponsored by IBM
WHITE PAPER: Read this white paper to uncover the benefits of cloud computing. It outlines how to take a holistic approach that encompasses managing governance, organization and services.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

IBM

Securing Applications for a Safer Cloud Environment
sponsored by IBM
WHITE PAPER: View this white paper to learn the five steps to combating application breaches in the cloud. Additionally, explore other protocols to reduce risk.
Posted: 25 Mar 2015 | Published: 09 Jul 2014

IBM

Optimizing the Hybrid Cloud: Extending Your Enterprise WAN to Infrastructure as a Service
sponsored by Silver Peak
WHITE PAPER: Read this white paper to learn more about traffic growth within the hybrid cloud model. Find the answer to the question to how your WAN network is holding up.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Silver Peak

The Rise of the Hybrid WAN: Meeting the Challenge of the Cloud
sponsored by Silver Peak
WHITE PAPER: Read this white paper to learn more about how organizations are embracing the hybrid cloud. They understand the values of both the public and private cloud, and the utmost flexibility that the hybrid cloud offers for business-critical workloads is more essential.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Silver Peak

The normalisation of Cloud in Hybrid Market
sponsored by Vision Solutions
WHITE PAPER: Download this exclusive report to discover how much cloud services can be expected to increase, key impediments to cloud adoption, predictions for cloud computing in 2015, and more.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Vision Solutions

Future Security Fortification - The Road Ahead
sponsored by IBM
WHITE PAPER: In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
Posted: 23 Mar 2015 | Published: 04 Dec 2014

IBM

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

With IoT on the Rise, Feel Secure with APIs and a DLP Strategy
sponsored by Axway
EGUIDE: In this expert guide, you'll learn how to take control of your data security as the Internet of Things ramps up by diving into application programming interfaces (APIs) and data loss prevention (DLP).
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Axway

See clearly in the cloud with threat-aware identity and access management
sponsored by IBM
WHITE PAPER: View this white paper to learn how next-generation cloud security technologies can securely connect people, applications, and devices to cloud environments, eliminating data and application protection concerns.
Posted: 21 Mar 2015 | Published: 31 Oct 2014

IBM

Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
WHITE PAPER: A global 100 manufacturer faced the problem of securing an increasing number of applications. How they solved this problem can provide insights for other large enterprises seeking to do the same.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Veracode, Inc.

Extend IT to the Cloud
sponsored by NetApp
WHITE PAPER: Access this white paper to learn about a cloud platform that can solve data issues and make your transition to the cloud easier.
Posted: 19 Mar 2015 | Published: 31 Jan 2014

NetApp

A Telecom Business Reinvents Itself for the Cloud Era
sponsored by NetApp
WHITE PAPER: Access this white paper to learn how a telecommunications company adapted and improved its storage services using the cloud and flexible storage provisioning.
Posted: 18 Mar 2015 | Published: 11 Mar 2015

NetApp

Multi-Cloud Private Storage: Take Charge of Your Cloud Data
sponsored by NetApp
WHITE PAPER: Access this white paper to learn about a cloud storage system that provides benefits like big data analytics while still protecting data.
Posted: 17 Mar 2015 | Published: 30 Sep 2014

NetApp

Protecting Data With Secure Collaboration Solutions
sponsored by Dropbox for Business
WHITE PAPER: Access this white paper to learn how a consulting firm evaluated the balance between security and usability for a popular cloud-based file sharing service.
Posted: 30 Mar 2015 | Published: 30 Jan 2015

Dropbox for Business
1 - 25 of 855 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement