Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
101 - 125 of 846 Matches Previous Page  |  Next Page
How should our team manage data stored in the cloud?
sponsored by SearchCloudComputing.com
EGUIDE: This informative e-guide reveals expert tips for cloud managers to ensure that the provider's management tools mesh well with your enterprise's needs. Learn why you should look for management features beyond security controls for effective cloud storage.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Protecting this house: IT's role in cloud security
sponsored by SearchCloudComputing.com
EBOOK: Having a clear-cut cloud governance strategy helps ease administrative issues for IT and allows organizations to proactively protect their data.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

The Cloud Is More Secure Than Traditional IT Systems - Here's Why
sponsored by Dimension Data
EGUIDE: This expert guide explains why when it comes to cloud security, the physical location of your data matters less than the means of access.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Dimension Data

Taking the Reigns of Cloud Infrastructure Management
sponsored by CA Technologies.
WHITE PAPER: View this white paper to discover how one cloud provider selected a platform to ensure a unified view into the infrastructure for users. Read on to learn how this infrastructure management tool is right for your organization.
Posted: 23 Dec 2014 | Published: 02 Oct 2014

CA Technologies.

New Possibilities for the Digital Era
sponsored by IBM
EBOOK: As technologies change, database storage must also change with it. The new storage platform needs to be scalable, accessible, and mobile ready.
Posted: 22 Dec 2014 | Published: 22 Dec 2014

IBM

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Forrester: Cloud Without Limits: How To Deliver Hybrid Cloud With Agility, Governance, And Choice
sponsored by Dell, Inc. and Intel
WHITE PAPER: The hybrid cloud offers myriad benefits for organizations – but it's not always understood. Find out more about the hybrid cloud, and learn how it can deliver increased agility and security.
Posted: 01 Dec 2014 | Published: 30 Nov 2014

Dell, Inc. and Intel

Enhanced Security & Compliance for Amazon EC2
sponsored by CloudPassage
WHITE PAPER: Access this brief paper to learn how CloudPassage Halo automates advanced security and compliance for apps and workloads hosted on Amazon EC2 using a highly scalable SaaS architecture that can be deployed in a matter of hours. Read on now to learn about more Halo benefits for Amazon Web Services (AWS).
Posted: 25 Nov 2014 | Published: 31 Jul 2014

CloudPassage

Major Digital Entertainment Business Protects Hundreds of Artist Websites with CloudPassage Halo
sponsored by CloudPassage
CASE STUDY: In this case study, learn how a major digital entertainment business protects hundreds of artist websites with software-defined security delivered in a SaaS model with cost-effective, metered-based pricing.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

Cloud Infrastructure Security: It's Time to Rethink Your Strategy
sponsored by CloudPassage
WHITE PAPER: This white paper discusses why, in order to truly reap the benefits of the cloud, leaders need to rethink their approach to infrastructure security.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

CloudPassage

State of the Market: Enterprise Cloud 2014
sponsored by Verizon
WHITE PAPER: Access this white paper to explore the current state of cloud computing and get insight into the future of the cloud. You'll learn why the debate between public and private models is now moot. You'll also learn how cloud is redefining IT's relevance to the business as well as tips to ensure the security of your cloud deployments.
Posted: 13 Nov 2014 | Published: 31 Oct 2014

Verizon

Implement a More Secure Network to Keep Up with Shadow IT
sponsored by Verizon
WHITE PAPER: This white paper examines the ramifications of the growth of shadow IT and examines how you can protect against potential issues. Read on to learn how you can implement a more secure network to keep up with evolving IT demands.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

Verizon

The PaaS Payoff: Greater Agility, Less Cost
sponsored by Red Hat
WHITE PAPER: This exclusive report points to research from UBM Tech that reveals how many IT decision makers are addressing these challenges with the help of Platform as a Service (PaaS). Learn more about the top reasons why organizations are harnessing PaaS, and why it is becoming the go-to strategy for modern business.
Posted: 07 Nov 2014 | Published: 31 Aug 2014

Red Hat

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Unleashing IT: Application Centric Infrastructure Special Edition
sponsored by Cisco Systems, Inc.
EZINE: In the front page feature, marketing firm Acxiom brought public cloud capabilities into their own data center to cut costs and improve data security with Cisco Application Centric Infrastructure.
Posted: 04 Nov 2014 | Published: 30 Sep 2014

Cisco Systems, Inc.

Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Enterprise Cloud Adoption: Are You Covering Your SaaS?
sponsored by BitGlass
WHITE PAPER: This whitepaper examines the top cloud adoption trends, including which industries are taking the most advantage of the cloud and which are still holding out. You'll also discover what the biggest barriers are when it comes to implementing cloud-based computing systems.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

BitGlass

Cloud Security Services Security School
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: This Cloud Security classroom looks at the most significant developments and discusses the action plans security pros should consider to get the most mileage out of cloud-based security services.
Posted: 09 Oct 2014 | Premiered: 15 Oct 2014

TOPICS:  Cloud Security
SearchCloudSecurity.com

Scale Your Data Center—Right into the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: By utilizing your pre-existing infrastructure, this white paper outlines the benefits of transitioning from data centers to a private cloud and how three top vendors can help.
Posted: 03 Oct 2014 | Published: 31 Oct 2012

Dell, Inc. and Intel®

The adoption of cloud-based services
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the issues around the adoption of cloud-based services, security technology that is being deployed by enthusiasts and looks at the reasons why the avoiders are holding back.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Are You Risking Security With the Cloud?
sponsored by IBM
WHITE PAPER: This e-book will help you learn more about the techniques that are being employed to attack cloud environments.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

IBM

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE: This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

CIO Decisions: Artificial Intelligence in the Enterprise
sponsored by SearchCIO.com
EZINE: AI is not some far-off fantasy. Some experts predict that smart machines and robots will become so intertwined with business operations as to be indispensible—and some enterprises are already reaping the results.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchCIO.com
101 - 125 of 846 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement