Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
101 - 125 of 1108 Matches Previous Page  |  Next Page
The Cloud Development Potential of DevSecOps
sponsored by BMC
EGUIDE: Cloud computing may make for nimble production, but putting automation aloft turns security teams' stomachs. Discover what Gartner's Neil MacDonald, who coined the term "DevSecOps" back in 2012, has to say about integrating security teams into cloud-focused development cycles.
Posted: 03 Aug 2016 | Published: 31 Jul 2016

BMC

Discover the Keys to Fast App Deployment
sponsored by BT
DATA SHEET: Do your IT professionals find themselves bogged down in an endless cycle of configuration, testing and local rollout? Learn how to increase your agility, and save your IT managers the endless hassle of manual deployment with cloud-based app automation. Download this paper now to get SLA-assured availability and security.
Posted: 02 Aug 2016 | Published: 31 Dec 2014

BT

The Cloud of Clouds: How to Take Advantage of a Cloud Services Integrator
sponsored by BT
VIDEO: 58% of large businesses cited cloud as driving profound change for their organizations, but are lingering doubts stopping you from joining the masses? Tune into this video to learn about a cloud services integrator that can connect you easily and securely to the applications and data you need—all on a global scale.
Posted: 02 Aug 2016 | Premiered: 10 May 2016

BT

Securing DevOps
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

SearchSecurity.com

Piecing Together the Hybrid Cloud Management Puzzle
sponsored by Softchoice Corporation
EGUIDE: Managing the hybrid cloud means covering all of your bases – from having a solid cloud management strategy to security. This e-guide takes a look at fundamental questions to consider before adopting a hybrid cloud.
Posted: 28 Jul 2016 | Published: 27 Jul 2016

Softchoice Corporation

Guide to Making The Cloud Secure
sponsored by BT
WHITE PAPER: Discover the threats every cloud user potentially faces, introductions to advanced security measures to counteract them, and the policies and procedures to help you safeguard your valuable information. You'll also find tips to facilitate the responsibility you must necessarily take for the protection of your own data.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

BT

Sending and Sharing Large Files: Optimizing Existing IP Networks
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this paper an advanced file acceleration protocol that works with your business' existing IP networks to eliminate latency, optimize available bandwidth, and overcome throughput bottlenecks when moving large files over distance, like video and high-resolution images.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Signiant, Inc.

Enterprise cloud applications – can we trust them?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

ComputerWeekly.com

From Why to Why Not: The Top 5 Risks of Delaying a Move to the Cloud
sponsored by Infor
WHITE PAPER: Cost savings are the primary reason that most people are making the switch to cloud, but there are 4 more significant reasons why putting off cloud adoption creates risk for those delaying the inevitable. Access this paper to discover in-depth insight into these top 5 risks.
Posted: 27 Jul 2016 | Published: 31 Dec 2014

Infor

ERP Report: Agility and Communication in the Cloud
sponsored by Infor
ANALYST REPORT: This Aberdeen Group research report illustrates how top performing manufacturers ensure that their ERP strategies remain current to provide essential functionality and support growth. Read on to consider cloud ERP deployment to perform automatic software updates and more.
Posted: 27 Jul 2016 | Published: 31 Dec 2015

Infor

The Cloud: Securing Your Enterprise both Before and After Migration
sponsored by Armor
EGUIDE: In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.
Posted: 26 Jul 2016 | Published: 25 Jul 2016

Armor

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Signiant, Inc.

Tips for Streamlining Financial Processes and Providing Real Time Reporting
sponsored by Infor
WHITE PAPER: Discover how to address the growing gap between what a modern financial department should be able to and what they are actually able to accomplish with their current toolset. See detailed breakdowns of time spent, how to set a strategy, how to banish silos, and how to maximize ROI.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Trustwave Global Security Report
sponsored by Trustwave
WHITE PAPER: Understanding the motivations and resources of professional cybercriminals is key to defending against them. This report gives you an inside look at the business behind malware with stats from breach investigations around the world.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

How Linux Containers Change the Development and Delivery of Applications
sponsored by Red Hat
WHITE PAPER: Discover how to adopt a cloud model for production and consumption of services to facilitate productive DevOps implementation using Linux containers. Read now to deliver the cloud through this container technology, and affect a cost-efficient means of delivering next-gen applications.
Posted: 18 Jul 2016 | Published: 18 Jul 2016

Red Hat

How to Implement Sound Security for VM and Cloud Environments
sponsored by Armor
WHITE PAPER: Explore the advantages of outsourcing VM security control responsibilities to a cloud service provider or MSSP. Learn how this strategy can ensure each VM's contents are safeguarded through a combination of vulnerability mitigation and attack detection methods.
Posted: 14 Jul 2016 | Published: 01 Jun 2016

Armor

Two Approaches to Cloud Security: API vs. Proxy
sponsored by Palerra Inc.
RESOURCE: Uncover the difference between two different Cloud Access Security Broker (CASB) deployment strategies, API and Proxy, and what they can do to provide cloud security for your enterprise. You'll find a comparison of their features, learn how to decipher multimode CASBs, and more.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Palerra Inc.

AWS Cautionary Tales and How to Avoid Becoming One
sponsored by Palerra Inc.
WHITE PAPER: AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Palerra Inc.

Salesforce Shield for Healthcare
sponsored by Salesforce.com
WHITE PAPER: Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Salesforce.com

Unifying Cloud Security Across Infrastructure and Applications
sponsored by Palerra Inc.
WHITE PAPER: The threats that the acceptance of the cloud as an integral part of business cannot readily be understated. Discover the challenges of unifying your enterprise's cloud security across infrastructure and applications, and the critical questions of elasticity and the cost of securing sprawl, visibility while maintaining context, and more.
Posted: 14 Jul 2016 | Published: 31 Dec 2015

Palerra Inc.

Pairing SuccesFactors with a HCM Suite to Introduce Innovation to HR Operations
sponsored by Accenture
WHITE PAPER: Explore how SAP SuccessFactors users can leverage a modern HCM suite to enhance productivity, reduce costs, improve HR operations, transfer data sets securely between systems in the cloud, and more.
Posted: 13 Jul 2016 | Published: 31 Dec 2015

Accenture

Virtual Workspace:Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: This feature white paper expands on some of the questions you may still have about finding the right workspace aggregator. It addresses some of the questions you may have about choosing the right workspace aggregator.
Posted: 12 Jul 2016 | Published: 12 Jul 2015

Matrix42

Secure Hosting Creates Foundation for Innovative Telemedicine
sponsored by BT
CASE STUDY: In this case study, you will learn how to employ a reliable communications service delivery partner that tailors exacting requirements for your data protection. Access now to examine fully redundant configuration that provides fail-safe availability, intrusion detection and prevention, managed backup, and more.
Posted: 29 Jul 2016 | Published: 31 Dec 2014

BT

Security Tips for HIPAA-Compliant Cloud Storage and Texting
sponsored by Optum
EGUIDE: Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
Posted: 13 Jul 2016 | Published: 12 Jul 2016

Optum
101 - 125 of 1108 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement