Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
1 - 25 of 851 Matches Previous Page  |  Next Page
Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

Own and Manage Your Encryption Keys
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper discusses the importance of data encryption, the vulnerabilities of third-party encryption, the necessity of encryption key ownership, and how all of it affects the security of your company's data stored in the cloud.
Posted: 29 Jan 2015 | Published: 06 Nov 2014

SafeNet, Inc.

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Four steps to improving cloud security and compliance
sponsored by Dimension Data
WHITE PAPER: Access this white paper to find out why a collaborative partnership is the best approach to ensuring security and compliance. Explore four steps to take to improve security governance, risk management, and compliance in the cloud within your own organization.
Posted: 28 Jan 2015 | Published: 31 Dec 2014

Dimension Data

eBook: CIOs Guide to Modern Identity
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper explores five key trends impacting CIOs and security management today, and discusses how focusing on authenticating user identity versus protecting the endpoint can help companies successfully overcome the security challenges presented by these key trends.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Ping Identity Corporation

Preparing For Security Threats in the Age of the Cloud and Mobility
sponsored by Cisco Systems, Inc.
WHITE PAPER: As businesses become increasingly mobile, so does sensitive data. Learn more about the threats to your organisation.
Posted: 28 Jan 2015 | Published: 06 Mar 2014

Cisco Systems, Inc.

The Big Shift to Cloud-Based Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper explains why SMBs are just as vulnerable to cyberattacks as larger corporations, and how cloud-based security can provide them with a stronger network security posture without breaking the bank.
Posted: 28 Jan 2015 | Published: 29 Aug 2014

Qualys

Malware, Zero Day and Advanced Attack Protection Analysis
sponsored by Zscaler
WHITE PAPER: Access this white paper for a side by side comparison of two email security programs.
Posted: 27 Jan 2015 | Published: 10 Dec 2014

Zscaler

Cloud Readiness: Securing Access to Your Private Cloud
sponsored by Ping Identity Corporation
EBOOK: This eBook explains the benefits of moving enterprise applications to the cloud and describes how to keep your applications and data secure during this process.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Ping Identity Corporation

9 Mistakes to Avoid When Migrating from VMware to the Cloud
sponsored by CloudEndure Inc.
WHITE PAPER: Here's a list of nine common mistakes even savvy IT managers make when migrating VMware to the cloud.
Posted: 26 Jan 2015 | Published: 26 Jan 2015


La-Z-Boy Incorporated
sponsored by Zscaler
CASE STUDY: This case study describes how La-Z-Boy partnered with Zscaler to reduce bandwidth costs and complexity while increasing the visibility of web activity.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Zscaler

NetApp Private Storage for Microsoft Azure Solution Brief
sponsored by NetApp
WHITE PAPER: As society becomes more and more mobile, businesses must adapt with a mobile-ready data center. This white paper outlines how businesses can achieve an agile and efficient hybrid cloud storage system.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

NetApp

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Bring Your Own Device: Driving Workforce Productivity with Bring Your Own Device (BYOD)
sponsored by Acronis
WHITE PAPER: In today's mobile world, workers want to work from anywhere- not just in the office. Bring Your Own Device (BYOD) policies increase employee productivity, but can also pose security risks. This white paper details to deploy a BYOD program that keeps information on mobile devices secure.
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Acronis

AWS billing prompts use of third-party cloud cost analysis tools
sponsored by SearchAWS
EGUIDE: This e-guide highlights how companies, such as Cloudyn Ltd., help companies identify spending patterns and create financial forecasts to keep the financial planning process under control. Learn more about how big data analytics can help consolidate AWS billing accounts.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchAWS

Best practices for hybrid cloud management
sponsored by SearchCloudComputing.com
EGUIDE: This e-guide will provide you with a roadmap to help you piece together the hybrid cloud management puzzle. Learn about the keys to a solid hybrid cloud management strategy, how to avoid hybrid cloud security hurdles, cross-platform tools to use, and much more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Cloud app management -- from migration to monitoring
sponsored by SearchCloudComputing.com
EGUIDE: In this e-guide, discover which apps are right for the cloud and the keys to cloud application migration. Also, get an insider's look into the latest cloud application trends that you can capitalize on.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Cloud-based management comes with trade-off
sponsored by SearchCloudComputing.com
EGUIDE: In this e-guide, discover the differences between traditional management tactics and cloud management strategies. Additionally, learn how to integrate another layer of performance data into the central system to deal with the complexity of cloud.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

How should our team manage data stored in the cloud?
sponsored by SearchCloudComputing.com
EGUIDE: This informative e-guide reveals expert tips for cloud managers to ensure that the provider's management tools mesh well with your enterprise's needs. Learn why you should look for management features beyond security controls for effective cloud storage.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Protecting this house: IT's role in cloud security
sponsored by SearchCloudComputing.com
EBOOK: Having a clear-cut cloud governance strategy helps ease administrative issues for IT and allows organizations to proactively protect their data.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Microsoft Case Study on NetApp Private Storage and Azure ExpressRoute
sponsored by NetApp
CASE STUDY: Today, many organizations are moving to the cloud for better flexibility, scalability, and reduced costs. This case study outlines how companies can incorporate public cloud resources into their cloud strategy securely.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

NetApp

An Easy Way to Securely Share, Edit, and Collaborate Microsoft Office Documents
sponsored by Box
DATA SHEET: This white paper examines an easy way to securely access and collaborate on any of your content. Read on to learn how you can allow your users to easily open, share and seamlessly save documents to the cloud directly from desktops.
Posted: 07 Jan 2015 | Published: 07 Jan 2015

Box

Ensuring Security by Centralising Information on a Single Cloud Platform
sponsored by Box
WHITE PAPER: This white paper explores the next generation of secure, enterprise cloud services and methods that are set mitigate security challenges by centralizing information onto a single cloud platform.
Posted: 07 Jan 2015 | Published: 07 Jan 2015

Box

Are You Risking Security With the Cloud?
sponsored by IBM
WHITE PAPER: This e-book will help you learn more about the techniques that are being employed to attack cloud environments.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

IBM

The Cloud Is More Secure Than Traditional IT Systems - Here's Why
sponsored by Dimension Data
EGUIDE: This expert guide explains why when it comes to cloud security, the physical location of your data matters less than the means of access.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Dimension Data
1 - 25 of 851 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement