Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
101 - 125 of 868 Matches Previous Page  |  Next Page
Managing the Complexity of Today’s Hybrid IT Environments
sponsored by Kaseya
WHITE PAPER: Fortunately, these challenges no longer have to be costly and time consuming. This white paper describes the key characteristics of the changing environment of IT. You can also discover new choices that IT managers have for meeting the growing set of management challenges.
Posted: 15 Mar 2015 | Published: 15 Mar 2015

Kaseya

Case Studies: Hands-on security monitoring delivers peace-of-mind
sponsored by Alert Logic
CASE STUDY: Check out the following brief series of short case studies to learn how Rackspace and Alert Logic helped 3 major companies improve intrusion detection and vulnerability scanning.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Alert Logic

7 Best Practices to Ensure Cloud Security
sponsored by Alert Logic
WHITE PAPER: Read this brief white paper to uncover the 7 best practices for cloud security.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  Cloud Security
Alert Logic

Case Study: A Global 1000 Enterprise Adapts Its Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Managed Cloud Environment Security FAQ
sponsored by Dimension Data
WHITE PAPER: Access this white paper to get answers to how security is maintained in multi-tenanted and dynamic environments.  Read on to explore how to evaluate the security of managed cloud environment providers.
Posted: 03 Mar 2015 | Published: 10 Sep 2014

Dimension Data

Back to Basics: Securing Business Information on the Cloud
sponsored by Box
WHITE PAPER: View this white paper to learn how the cloud can enable us to go back to security basics to manage distributed computing.
Posted: 25 Feb 2015 | Published: 04 Feb 2015

Box

Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

Build your services business with Veeam and Microsoft Azure Marketplace
sponsored by Veeam Software
WHITE PAPER: Access this white paper to discover how to build your IT service business using cloud provider programs.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Veeam Software

IDC Essential Guidance: Securing the Enterprise: Multifunction Printer Risks and Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This analyst brief reveals the consequences of nonsecure MFPs, and offers essential guidance on how to secure them.
Posted: 10 Feb 2015 | Published: 31 Jul 2014

Hewlett-Packard Company

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Reducing Security Risks from Open Source Software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores organizations' growing concerns over open source software. Read now to find out why open source should be on your radar, as well as the detrimental consequences and costs associated with it. Furthermore, you'll uncover 5 steps to obtaining peace of mind when it comes to open source software.
Posted: 01 Feb 2015 | Published: 01 Oct 2013

Hewlett-Packard Company

Four steps to improving cloud security and compliance
sponsored by Dimension Data
WHITE PAPER: Access this white paper to find out why a collaborative partnership is the best approach to ensuring security and compliance. Explore four steps to take to improve security governance, risk management, and compliance in the cloud within your own organization.
Posted: 28 Jan 2015 | Published: 31 Dec 2014

Dimension Data

Go hybrid and get the best of both worlds in the cloud
sponsored by SearchCloudStorage.com
EBOOK: Before taking advantage of hybrid cloud benefits, understand that it takes time and patience, along with knowing which metrics you will use to determine success.
Posted: 20 Jan 2015 | Published: 20 Jan 2015


Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Cloud app management -- from migration to monitoring
sponsored by SearchCloudComputing.com
EGUIDE: In this e-guide, discover which apps are right for the cloud and the keys to cloud application migration. Also, get an insider's look into the latest cloud application trends that you can capitalize on.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Best practices for hybrid cloud management
sponsored by SearchCloudComputing.com
EGUIDE: This e-guide will provide you with a roadmap to help you piece together the hybrid cloud management puzzle. Learn about the keys to a solid hybrid cloud management strategy, how to avoid hybrid cloud security hurdles, cross-platform tools to use, and much more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Cloud-based management comes with trade-off
sponsored by SearchCloudComputing.com
EGUIDE: In this e-guide, discover the differences between traditional management tactics and cloud management strategies. Additionally, learn how to integrate another layer of performance data into the central system to deal with the complexity of cloud.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

How should our team manage data stored in the cloud?
sponsored by SearchCloudComputing.com
EGUIDE: This informative e-guide reveals expert tips for cloud managers to ensure that the provider's management tools mesh well with your enterprise's needs. Learn why you should look for management features beyond security controls for effective cloud storage.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Next-Generation Security in a Mobile Era
sponsored by SearchCIO.com
EBOOK: In this SearchCIO handbook, learn how enterprise mobility management and next-generation security tools can help your enterprise mitigate an ever-growing number of mobile risks.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

SearchCIO.com

In Cloud Storage, Options Abound
sponsored by SearchCloudComputing.com
EBOOK: Examine cloud-based storage in terms of cost, manageability, security and latency/availability.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

SearchCloudComputing.com

Securing Your Cloud Deployment with Today's Top Strategies
sponsored by SearchCloudSecurity.com
EZINE: In this Insider Edition, InfoSec Pros will learn how to achieve better cloud security. It reviews existing cloud security standards and how to assess, and manage, the risk of a cloud deployment.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchCloudSecurity.com

Application Security in the Age of Cloud, BYOD, and SaaS
sponsored by BitGlass
WHITE PAPER: This white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

BitGlass

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

AWS billing prompts use of third-party cloud cost analysis tools
sponsored by SearchAWS
EGUIDE: This e-guide highlights how companies, such as Cloudyn Ltd., help companies identify spending patterns and create financial forecasts to keep the financial planning process under control. Learn more about how big data analytics can help consolidate AWS billing accounts.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchAWS
101 - 125 of 868 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement