Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 859 Matches Previous Page  |  Next Page
3 Approaches to Stop DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper examines the threat landscape of DDoS attacks and details the shortcomings of traditional security approaches. You will uncover how to evaluate and craft a new security strategy to mitigate DDoS attacks based on whether you compute on-premises, in the cloud, or in a hybrid environment. View now to learn more.
Posted: 27 Mar 2015 | Published: 04 Mar 2015

Radware

Deep Security AWS Success
sponsored by Trend Micro
CASE STUDY: This case study highlights how one organization integrated a security platform into their virtualized environment to ensure compliance for public cloud and AWS to provide secure gaming, social networking, and e-commerce services to its customers.
Posted: 27 Mar 2015 | Published: 31 Dec 2014

Trend Micro

Generation Now – Pervasive Content Collaboration: Leveraging Cloud with ECM
sponsored by IBM
WHITE PAPER: Upon viewing this white paper, you'll discover how cloud platforms can be leveraged to push applications from a central location, with bi-directional architecture so the platform can be distributed to multiple regions and divisions. Discover top drivers for implementing cloud.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

IBM

Application-Centric Infrastructure Streamlines IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper introduces a network infrastructure that combines most needs into one place for a more efficient and more effective IT.
Posted: 26 Mar 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Preparing for the Hidden Impact of Cloud Solutions
sponsored by IBM
WHITE PAPER: Read this white paper to uncover the benefits of cloud computing. It outlines how to take a holistic approach that encompasses managing governance, organization and services.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

IBM

Securing Applications for a Safer Cloud Environment
sponsored by IBM
WHITE PAPER: View this white paper to learn the five steps to combating application breaches in the cloud. Additionally, explore other protocols to reduce risk.
Posted: 25 Mar 2015 | Published: 09 Jul 2014

IBM

Optimizing the Hybrid Cloud: Extending Your Enterprise WAN to Infrastructure as a Service
sponsored by Silver Peak
WHITE PAPER: Read this white paper to learn more about traffic growth within the hybrid cloud model. Find the answer to the question to how your WAN network is holding up.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Silver Peak

The Rise of the Hybrid WAN: Meeting the Challenge of the Cloud
sponsored by Silver Peak
WHITE PAPER: Read this white paper to learn more about how organizations are embracing the hybrid cloud. They understand the values of both the public and private cloud, and the utmost flexibility that the hybrid cloud offers for business-critical workloads is more essential.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Silver Peak

The normalisation of Cloud in Hybrid Market
sponsored by Vision Solutions
WHITE PAPER: Download this exclusive report to discover how much cloud services can be expected to increase, key impediments to cloud adoption, predictions for cloud computing in 2015, and more.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Vision Solutions

Future Security Fortification - The Road Ahead
sponsored by IBM
WHITE PAPER: In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
Posted: 23 Mar 2015 | Published: 04 Dec 2014

IBM

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

With IoT on the Rise, Feel Secure with APIs and a DLP Strategy
sponsored by Axway
EGUIDE: In this expert guide, you'll learn how to take control of your data security as the Internet of Things ramps up by diving into application programming interfaces (APIs) and data loss prevention (DLP).
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Axway

See clearly in the cloud with threat-aware identity and access management
sponsored by IBM
WHITE PAPER: View this white paper to learn how next-generation cloud security technologies can securely connect people, applications, and devices to cloud environments, eliminating data and application protection concerns.
Posted: 21 Mar 2015 | Published: 31 Oct 2014

IBM

Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
WHITE PAPER: A global 100 manufacturer faced the problem of securing an increasing number of applications. How they solved this problem can provide insights for other large enterprises seeking to do the same.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Veracode, Inc.

ESG: Extending the Data Center to the Cloud
sponsored by NetApp
WHITE PAPER: Access this white paper to learn about a cloud platform that can solve data issues and make your transition to the cloud easier.
Posted: 19 Mar 2015 | Published: 31 Jan 2014

NetApp

A Telecom Business Reinvents Itself for the Cloud Era
sponsored by NetApp
WHITE PAPER: Access this white paper to learn how a telecommunications company adapted and improved its storage services using the cloud and flexible storage provisioning.
Posted: 18 Mar 2015 | Published: 11 Mar 2015

NetApp

Multi-Cloud Private Storage: Take Charge of Your Cloud Data
sponsored by NetApp
WHITE PAPER: Access this white paper to learn about a cloud storage system that provides benefits like big data analytics while still protecting data.
Posted: 17 Mar 2015 | Published: 30 Sep 2014

NetApp

Bridging the data security gap
sponsored by IBM
WHITE PAPER: This white paper describes the four main areas of data security and how to approach each one.
Posted: 16 Mar 2015 | Published: 31 May 2013

IBM

Why Cloud-Based Customer Service Is So Essential Now
sponsored by Oracle Corporation
VIDEO: Access this short video to hear from Vice President of customer experience strategy at Oracle, Brian Curran, on the benefits of using cloud technology to improve customer experience. Watch as he emphasizes key point like agility, quick set up, flexibility, and hybrid capabilities that come with cloud technology.
Posted: 16 Mar 2015 | Premiered: 25 Oct 2012

Oracle Corporation

Desktop SSO: Simple Authentication for Greater Productivity
sponsored by OneLogin
WEBCAST: This webcast introduces a single sign-on (SSO) program that will enable users to access to all their cloud apps with one login.
Posted: 16 Mar 2015 | Premiered: Dec 17, 2014

OneLogin

How to Extend Active Directory to the Cloud
sponsored by OneLogin
WEBCAST: This webcast shows you how to integrate Active Directory and cloud-based apps for better security.
Posted: 16 Mar 2015 | Premiered: Nov 19, 2014

OneLogin

How to Automate User Provisioning
sponsored by OneLogin
WEBCAST: This webcast explores the risk of cloud applications and how you can ensure secure application management for your enterprise.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

OneLogin

Is Mobile Access to Cloud Apps Putting Your Company At Risk?
sponsored by OneLogin
WEBCAST: This webcast discusses the security risks of mobile cloud apps and the best ways to mitigate them.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

OneLogin

Managing the Complexity of Today’s Hybrid IT Environments
sponsored by Kaseya
WHITE PAPER: Fortunately, these challenges no longer have to be costly and time consuming. This white paper describes the key characteristics of the changing environment of IT. You can also discover new choices that IT managers have for meeting the growing set of management challenges.
Posted: 15 Mar 2015 | Published: 15 Mar 2015

Kaseya
1 - 25 of 859 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement