Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
101 - 125 of 824 Matches Previous Page  |  Next Page
Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 08 Oct 2014 | Published: 10 Jul 2014

Red Hat

The adoption of cloud-based services
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the issues around the adoption of cloud-based services, security technology that is being deployed by enthusiasts and looks at the reasons why the avoiders are holding back.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Cloud-based Identity and Access Management Security School
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn about the advantages of a cloud-centric identity and access management (IAM).
Posted: 25 Sep 2014 | Premiered: 25 Sep 2014

TOPICS:  Cloud Security
SearchCloudSecurity.com

Plan Your Path to a Virtual Private Cloud
sponsored by Juniper Networks, Inc.
WEBCAST: This exclusive webcast will help you create a sound strategy for migrating to the private cloud.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014

Juniper Networks, Inc.

10 Critical Requirements for Cloud Applications
sponsored by Workday
VIDEO: Uncover the top 10 requirements for cloud applications, and find out what you should be looking for from vendors.
Posted: 08 Sep 2014 | Premiered: 29 Jun 2013

Workday

Inform e-Book Summer 2014
sponsored by Hewlett-Packard Company
WHITE PAPER: This extensive resource examines the latest and greatest in the world of IT security, including in-depth reports on advanced malware, security case studies, industry insider interviews, and more.
Posted: 26 Aug 2014 | Published: 31 Jul 2014

Hewlett-Packard Company

Choosing the Right API Management Solution for the Enterprise User
sponsored by CA Technologies.
WHITE PAPER: Publishing application programming interfaces (APIs) to an external developer community introduces a number of challenges and risks for the enterprise. This informative whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery.
Posted: 22 Aug 2014 | Published: 31 Dec 2013

CA Technologies.

Building a Microsoft Windows Based Private Cloud
sponsored by Dell and Microsoft
WHITE PAPER: Explore this brief paper that explains the evolution to the private cloud, the importance that consolidation plays in cloud adoption, and essential Windows components needed to simplify management in your cloud.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

Creating Efficiency through Private Cloud
sponsored by Dell and Microsoft
RESOURCE: Explore this step-by-step guide to your private cloud foundation that will help your organization improve visibility and reporting of resources, ensure security, access and governance, and more.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

Cost effective cloud backup and recovery model
sponsored by Asigra
WEBCAST: There's been a lot of talk about the recently launched Recovery License Model (RLM), but how does it work?  What does it mean to someone in the backup and recovery industry?
Posted: 11 Aug 2014 | Premiered: Dec 2, 2013

Asigra

9 Things to Consider Before Choosing a Cloud Phone Provider
sponsored by ShoreTel
WHITE PAPER: Businesses today are turning to cloud phone systems more than ever, but how do you know which one is right for you?
Posted: 11 Aug 2014 | Published: 11 Aug 2014

ShoreTel

Case Study: FIS Global Partners with Asigra to Provide Clients Enhanced Secure Data Protection that Meets Compliance Mandates
sponsored by Asigra
WHITE PAPER: For financial services business, it's critical that client data remains accessible and securely stored. As business grows, you will need to upgrade your backup service portfolio with an advanced solution – but there are questions you should ask before choosing.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Asigra

IaaS Public Clouds and the Perceived Security Threat
sponsored by Global Knowledge
WHITE PAPER: This important whitepaper reviews security concerns and discusses how the industry has dealt with them, and then explores how these same concerns can be mitigated with a proper cloud strategy.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

Global Knowledge

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

The Changing Face of Disaster Recovery as a Service
sponsored by Dell, Inc.
WEBCAST: This exclusive webcast examines the changes you have to make to your disaster recovery plans as a result of the changes happening in the market.
Posted: 02 Sep 2014 | Premiered: Aug 29, 2014

Dell, Inc.

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

Expert Tips for Compliance and Managing Employee Data
sponsored by IBM
EGUIDE: This expert e-guide covers the key drivers behind the move to Software-as-a-Service (SaaS) and cloud-based applications, as well as important considerations to keep in mind when evaluating your choices. As you read, learn how to craft a comprehensive request for proposal (RFP) and overcome ongoing compliance and management challenges.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Security for a Faster World
sponsored by Hewlett-Packard Company
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett-Packard Company

HP Fortify on Demand
sponsored by Hewlett-Packard Company
DATA SHEET: Access this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
Posted: 18 Aug 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com
101 - 125 of 824 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement