Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
1 - 25 of 810 Matches Previous Page  | Next Page
Analysit Fact Sheet: Who’s Minding your Cloud?
sponsored by CA Technologies.
ANALYST BRIEF: 46% of companies have stopped or slowed adoption of cloud services due to security concerns. View this analyst fact sheet to learn more about how companies are handling software, application, and cloud security.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

CA Technologies.

Keep your Cloud Infrastructure Safe with a Secure Border Environment
sponsored by Zentera Systems Inc.
WHITE PAPER: Discover how to build a dynamic, flexible yet highly secure infrastructure with Zentera Secure Border Computing.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Zentera Systems Inc.

A Guide to Disaster Recovery in the Cloud
sponsored by Avnet Technology Solutions
WHITE PAPER: Most organizations know they need to protect their business critical information so that downtime is reduced and people can work.  Buti n the event of outages or failures, many are left in the dark.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Avnet Technology Solutions

Expert Tips for Compliance and Managing Employee Data
sponsored by IBM
EGUIDE: This expert e-guide covers the key drivers behind the move to Software-as-a-Service (SaaS) and cloud-based applications, as well as important considerations to keep in mind when evaluating your choices. As you read, learn how to craft a comprehensive request for proposal (RFP) and overcome ongoing compliance and management challenges.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Automating and Securing Healthcare Information with Cloud-Based Fax Messaging
sponsored by OpenText
WHITE PAPER: Learn how this cloud-based fax messaging solution will secure patients' information at a low cost and meets federal regulations.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

How to Secure Content Outside the Data Center
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: This white paper examines the pain points that organizations face when it comes to securing content outside of the data center. It also explores a hybrid clout solution built to deliver the requisite capabilities and experience without sacrificing security.
Posted: 18 Aug 2014 | Published: 30 Jun 2014


Addressing the Scalability Challenge with Cloud-Based Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Ad-hoc application security programs have led to inconsistent policies across businesses, as shown in this startling statistic: 93% of companies suffered a data breach in 2013. This whitepaper considers a software system that focuses on scalability and simplicity.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Research Report: Mobile Security Trends in the Workplace
sponsored by Bluebox
WHITE PAPER: In this informative report, get the facts on enterprise mobility trends and BYOD programs, and discover how organizations should adapt to this changing IT security landscape.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

Bluebox

Building a Microsoft Windows Based Private Cloud
sponsored by Dell and Microsoft
WHITE PAPER: Explore this brief paper that explains the evolution to the private cloud, the importance that consolidation plays in cloud adoption, and essential Windows components needed to simplify management in your cloud.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

Private Cloud Infrastructures: The Basics
sponsored by Dell and Microsoft
WHITE PAPER: In this helpful resource, you'll get the basics on what IT departments need to know about private cloud networks, and how to implement them in your organization.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

Creating Efficiency through Private Cloud
sponsored by Dell and Microsoft
RESOURCE: Explore this step-by-step guide to your private cloud foundation that will help your organization improve visibility and reporting of resources, ensure security, access and governance, and more.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

For your eyes only: Endpoint data privacy in the cloud
sponsored by Druva Software
WEBCAST: This webcast provides encryption key management schemes, designed for the cloud so your organization is ensured endpoint data privacy in the cloud. Watch now and also find out key considerations for selecting cloud backup.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Druva Software

Insights from the 2013 IBM Chief Information Security Officer Assessment
sponsored by IBM
WHITE PAPER: This white paper reveals insights into the practices and behaviors that could best strengthen the role and influence of the modern security leader.
Posted: 14 Aug 2014 | Published: 31 Oct 2013

IBM

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Citrix

Combining Security and the Cloud to Enhance Your Business
sponsored by GFI Cloud
EBOOK: This resource highlights the views of several tech influencers pertaining to security and the cloud. Each person provides valuable insight and explains how to implement them both into your business.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

GFI Cloud

Insights on scaling network efficiency economically
sponsored by HP
WHITE PAPER: Expectations run high in today's bandwidth-intensive, always-on computing world. Users expect instant access to applications, fast-streaming videos, jitter-free voice, and Web pages that load in the blink of an eye. Failing to meet these expectations can have a significant impact.
Posted: 11 Aug 2014 | Published: 31 Dec 2012

HP

Cost effective cloud backup and recovery model
sponsored by Asigra
WEBCAST: There's been a lot of talk about the recently launched Recovery License Model (RLM), but how does it work?  What does it mean to someone in the backup and recovery industry?
Posted: 11 Aug 2014 | Premiered: Dec 2, 2013

Asigra

9 Things to Consider Before Choosing a Cloud Phone Provider
sponsored by Just Media - ShoreTel
WHITE PAPER: Businesses today are turning to cloud phone systems more than ever, but how do you know which one is right for you?
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Just Media - ShoreTel

Case Study: FIS Global Partners with Asigra to Provide Clients Enhanced Secure Data Protection that Meets Compliance Mandates
sponsored by Asigra
WHITE PAPER: For financial services business, it's critical that client data remains accessible and securely stored. As business grows, you will need to upgrade your backup service portfolio with an advanced solution – but there are questions you should ask before choosing.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Asigra

Can Enterprises Count on the Cloud for Data Protection?
sponsored by HP Autonomy
WHITE PAPER: Read on to learn the key requirements of cloud protection for the enterprise.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

HP Autonomy

Shadow IT in the Enterprise
sponsored by Nasuni Corporation
WHITE PAPER: In this report, discover survey results from more than 1,000 enterprise users to give you a better sense of who is using Dropbox and for what purposes. Don't be surprised to learn that smartphone and tablet users are much more likely to use Dropbox – read on to find out more.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

Nasuni Corporation

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
WEBCAST: In this helpful webcast, learn how your organization can leverage new integrated IT solutions like managed security and cloud services and to improve your business's efficiency and security, and create value for your customers.
Posted: 06 Aug 2014 | Premiered: Aug 1, 2014

NEC Corporation of America

IaaS Public Clouds and the Perceived Security Threat
sponsored by Global Knowledge
WHITE PAPER: This important whitepaper reviews security concerns and discusses how the industry has dealt with them, and then explores how these same concerns can be mitigated with a proper cloud strategy.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

Global Knowledge

Confidence in cloud file sharing: How to be protected and productive
sponsored by Dropbox for Business
WEBCAST: Watch this video to find out how your business can be confident that its shared files are consistently protected.
Posted: 31 Jul 2014 | Premiered: Jul 31, 2014

Dropbox for Business

Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchSecurity.com
1 - 25 of 810 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement