Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
101 - 125 of 702 Matches Previous Page  | Next Page
How to Navigate the File-Sharing and Synchronization Market
sponsored by ownCloud
WHITE PAPER: This whitepaper covers the file-sharing and synchronization market while giving recommendations on how to handle the problems associated with the technology.
Posted: 06 Feb 2014 | Published: 14 Feb 2013

ownCloud

2013 State of Cloud Infrastructure
sponsored by TechTarget
RESOURCE: There are a number of issues related to the cloud today among IT shops, even though the market continues to create new products that are gaining the trust of many CIOs and IT pros. Find out all the latest adoption plans, usage trends and technical challenges in our 2013 State of the Cloud Infrastructure report by completing this short survey!
Posted: 05 Feb 2014 | Published: 05 Feb 2014

TechTarget

Cloud Security Certification Guide
sponsored by TechTarget
RESOURCE: Which certifications could help improve your skill set and better prepare you to handle today's cloud security pain-points? Take our 2 min cloud security challenges survey and gain access to an exclusive reference guide designed to help you understand which certification is most beneficial for your career!
Posted: 05 Feb 2014 | Published: 05 Feb 2014

TechTarget

Keep Data Safe From Breeches With a File Sync and Share Solution
sponsored by ownCloud
WHITE PAPER: This exclusive whitepaper offers a file sync and share solution that will keep your data safe and your employees productive.
Posted: 05 Feb 2014 | Published: 05 Feb 2014

ownCloud

Why Choice and Control are Critical to a Successful Cloud Strategy
sponsored by IBM
WHITE PAPER: This whitepaper covers the reasons why some are hesitant to adopt the cloud and offers four tips for an effective cloud strategy.
Posted: 04 Feb 2014 | Published: 13 Jun 2012

IBM

Enable Anytime, Anywhere Access Without Exposing Your Data
sponsored by ownCloud
WHITE PAPER: This exclusive whitepaper covers a solution that help you deal with security risks that come from users syncing sensitive data to their home devices.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

ownCloud

Corporate Data in the Consumer Cloud, Chapter 4
sponsored by SearchConsumerization.com
EGUIDE: IT shouldn't leave mobile devices and consumer cloud-based services to user control. In addition to cloud-based file sharing, businesses should consider on-premises and hybrid file sharing, as well as security.
Posted: 28 Jan 2014 | Published: 28 Jan 2014


Cloud Solutions: Three Critical Rules for Retail
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper is a retailer's guide to the cloud, including information on the 3 most common types of services, the major benefits of cloud adoption, and key guidelines for transitioning to  this type of environment.
Posted: 27 Jan 2014 | Published: 31 Jan 2013

Hewlett-Packard Company

Does Application Security Pay? Measuring the Business Impact of Software Security Assurance Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Good Shepherd Medical Center
sponsored by INHS
WHITE PAPER: Review this case study on Good Shepherd Medical Center's experience implementing a cloud-enabled backup and archive solution that offered improved patient data visibility on- and off-site with continuous server image capture and disaster recovery features.
Posted: 10 Jan 2014 | Published: 27 Dec 2013

INHS

Lower the Pressure of Data on Your Hospital With Cloud Storage
sponsored by BridgeHead Software
WHITE PAPER: In this white paper, uncover a cloud-enabled data management solution that can handle the explosive growth in healthcare data, and in turn, provides robust disaster recovery. In addition, healthcare organizations can virtualize their EMR applications to free up floor space and stay on par with meeting ACO and MU requirements.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

BridgeHead Software

Cloud and ICT adoption by MSBs in the UK, France and Netherlands
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the Centre for Economics and Business Research and Cordys, assesses the business potential of cloud services for medium sized companies.
Posted: 20 Dec 2013 | Published: 08 Aug 2013

ComputerWeekly.com

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Sophos, Inc.

CW Special Report: Amazon Web Services (AWS)
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report gives you the key facts on Amazon Web Services (AWS), its cloud services, financial performance and strategy.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

ComputerWeekly.com

Making Sure Your Cloud Storage Strategy is HIPAA Compliant
sponsored by INHS
EGUIDE: Access this expert e-guide to uncover the pros and cons and key factors to consider when moving medical imaging storage from on-premise servers to the cloud.
Posted: 11 Dec 2013 | Published: 11 Dec 2013

INHS

DNS in the Cloud: Building a Secure DNS Architecture
sponsored by F5 Networks
EGUIDE: Access this expert e-guide about DNS in the cloud to unveil the suggested tactics to improve DNS architectures and security, including DNSSEC signed zones.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

F5 Networks

Assuaging Concerns about Public Cloud Services And APM: Expert Roadmap
sponsored by XO Communications
EGUIDE: In this e-guide, cloud networking expert Amy Larsen DiCarlo shares her insight on the public cloud, with emphasis on use cases, common concerns, and how to choose the right provider. Click through to also find 5 FAQs about network-based application performance management (APM) to ensure your business stays up-to-speed.
Posted: 21 Jan 2014 | Published: 21 Jan 2014

XO Communications

Cloud Integration and Big Data: Expert Best Practices and Emerging Trends
sponsored by Treasure Data
EGUIDE: In this expert e-guide, senior vice president at Cloud Technology Partners and cloud computing thought leader, David Linthicum, discusses three key topics: integration, the cloud and "big data." The discussion ranges from cloud integration to security issues in the cloud and the workings of Hadoop.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Treasure Data

Seeding Clouds on Power Systems with IBM SmartCloud Entry - Executive Summary
sponsored by IBM
WHITE PAPER: As cloud computing continues to grow, businesses are looking to decide which strategy is best for them. This guide explores a range of cloud services and how it will fit in with your system.
Posted: 23 Dec 2013 | Published: 31 Jan 2012

IBM

How to Create a Quality Cloud Security Solution
sponsored by XO Communications
WHITE PAPER: In this exclusive resource, find out how you can build a safe and effective cloud security strategy to ensure that your sensitive data stays in the right hands while utilizing the cloud.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

XO Communications

Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers
sponsored by Trend Micro
WHITE PAPER: In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Trend Micro

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Cloud Computing: Risks and Backup/Recovery Requirements
sponsored by Spanning Cloud Apps
EGUIDE: In this exclusive e-guide, learn the importance of backing up and protecting your documents in Gmail and other Google applications. Also, learn more from Dave Russell and other experts about cloud-to-cloud backup and how it is becoming increasingly popular (and necessary) in today's IT market.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Spanning Cloud Apps

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Trend Micro
101 - 125 of 702 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement