Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 824 Matches Previous Page  |  Next Page
SMBs: Are You Considering the Cloud for Security?
sponsored by Dell Software
WHITE PAPER: This white paper explores how a cloud-based service can provide always up-to-date security for SMBs.
Posted: 06 Jul 2015 | Published: 25 Apr 2015

Dell Software

Red Hat Security Infographic
sponsored by Red Hat
RESOURCE: This white paper outlines how open source security can protect a variety of environments, and make the job of a CIO easier. Read on to learn about open source's benefits and deicide if it's right for your business.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

Red Hat

Is Your Infrastructure Holding You Back?
sponsored by IBM
WHITE PAPER: This e-book will help you connect the dots between today's biggest business opportunities and the specific infrastructure technology required to seize them.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

IBM

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control
sponsored by Mimecast
WHITE PAPER: This white paper analyzes the limitations of Office 365 and makes suggestions for overcoming those limitations, particularly in the area of security.
Posted: 02 Jul 2015 | Published: 28 Feb 2014

Mimecast

Ensuring Data Security in the Cloud and on Endpoints
sponsored by WinMagic
WEBCAST: This webcast explores the risks of cloud file sync and share services and how to ensure data protection in the cloud.
Posted: 01 Jul 2015 | Premiered: Jun 3, 2015

WinMagic

Simplify and Automate Cloud Management
sponsored by VMware
WHITE PAPER: This white paper shows how you can improve your adaptation to changing conditions, based on infrastructure performance, application needs, and user demands. Learn how to carefully consider virtual and cloud infrastructure strategies for greater efficiency, increased agility, improved compliance, and more.
Posted: 01 Jul 2015 | Published: 31 Dec 2012

VMware

Office 365 Email Migration Surprises – Rhetoric vs. Reality
sponsored by Mimecast
WEBCAST: During this 30 minute webinar, Microsoft Office365 MVP J. Peter Bruzzese, will reveal the post migration surprises he's heard most frequently from companies that have already made the move. He'll provide his realistic assessment of what to expect and what to plan for when moving to the cloud.
Posted: 30 Jun 2015 | Premiered: Jun 3, 2015

Mimecast

Best Practices for Securing Your Cloud Email Service
sponsored by McAfee, Inc.
EGUIDE: This exclusive e-guide compares on-premises and cloud-based email security tools.
Posted: 29 Jun 2015 | Published: 24 Jun 2015

McAfee, Inc.

Data Protection in the Cloud: Are you Protecting Customers and Employees
sponsored by SilverSky
WEBCAST: In this webcast, you will learn the 7 questions to ask vendors to know the level of data protection to expect before migrating to the cloud.
Posted: 29 Jun 2015 | Premiered: Nov 20, 2014

SilverSky

Identify, Mitigate Shadow IT with a Cloud Risk Assessment
sponsored by IBM
WHITE PAPER: This 50-attribute evaluation offers a snapshot of your data with insights on your organization's usage of cloud services and the risks associated with each service.
Posted: 29 Jun 2015 | Published: 31 Dec 2014

IBM

What Consumers Believe About Cloud File Sharing & Why That’s a Warning to IT Pros
sponsored by WinMagic
WHITE PAPER: This white paper explores the pros and cons of three file sync and share security strategies. Continue reading to learn the 3 crucial aspects for securing files destined for the cloud and how to appropriately evaluate the risks of cloud file sync and share approaches.
Posted: 26 Jun 2015 | Published: 20 Apr 2015

WinMagic

The Truth About Data-At-Rest Encryption & the Cloud
sponsored by FireHost Inc.
WHITE PAPER: This white paper explains why some methods of encryption are weaker than others and suggests ways to implement the strongest encryption standards for your data-at-rest.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

The True Cost of Cloud Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how higher security in the cloud is the ultimate cost savings measure, even if it appears costly up front.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

How Secure Managed Cloud Services Mitigate Threats
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores why secure managed cloud services can mitigate threats more effectively than basic managed cloud providers.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Cloud provider security policies
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: This security classroom looks at cloud security options from a policy driven point of view.
Posted: 17 Jun 2015 | Premiered: 16 Jun 2015

TOPICS:  Cloud Security
SearchCloudSecurity.com

An Introduction to AWS Security
sponsored by Global Knowledge
WHITE PAPER: This white paper explains the most important aspects of AWS security and what that means to the enterprise.
Posted: 17 Jun 2015 | Published: 05 May 2015

Global Knowledge

When Worlds Collide: Networks and the Cloud Converge
sponsored by SearchNetworking.com
EBOOK: As enterprises move more network services to the cloud, IT must develop plans beyond a robust Internet link and consider the virtual WAN and software-defined WAN, and more.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

TOPICS:  Cloud Security | WAN
SearchNetworking.com

In the Cloud Life Sciences Teams Can Confidently Collaborate
sponsored by Verizon
CASE STUDY: This use case shows how secure cloud can be used to safely and quickly access all of your important enterprise information.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Verizon

Transitioning Enterprise Customers to the Cloud in a Secure Environment
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how service providers can deliver a secure cloud access service without sacrificing the user experience customers have come to expect.
Posted: 09 Jun 2015 | Published: 29 Aug 2014

Pulse Secure

The Evolving Role Of Cloud Security: Understanding Why A New Approach Is Needed
sponsored by Cloud Sherpas
WHITE PAPER: The way forward will lead the security industry of tomorrow in one of two very different directions: The top-down approach of IT pushing back against user autonomy, or the opposite approach, where empowerment and user agency are balanced by behavior analytics and risk measurement policy.
Posted: 08 Jun 2015 | Published: 20 May 2015

Cloud Sherpas

How to achieve project success with the private cloud
sponsored by Dell and Microsoft
EGUIDE: This expert e-guide reveals 5 questions that explain what the private cloud really is, if it guarantees security, how to optimize private cloud performance, and much more.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Dell and Microsoft

Important Cloud Concerns That IT Leaders Should Know
sponsored by Data#3
EGUIDE: Explore this expert e-guide that offers insight from cloud experts that CIOs should keep in mind.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Data#3

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Access this resource to learn about a solution to data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault
1 - 25 of 824 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement