Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
101 - 125 of 974 Matches Previous Page  |  Next Page
Building a Successful Hybrid Cloud Strategy
sponsored by Presidio
EGUIDE: This complimentary e-guide provides expert advice for building a hybrid cloud strategy and discusses the importance of moving applications to the cloud to start off the migration process. Read on to learn what management tools and cloud migration strategies can help your enterprise implement a successful cloud architecture.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Presidio

Transforming the future of cloud adoption
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This study by StratoGen, which questioned 1,000 senior business executives, reveals that more than a third of UK businesses still host fewer than 10% of their IT applications in the cloud.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

ComputerWeekly.com

How to Contain the Cloud and Other Security Questions
sponsored by SearchCloudSecurity.com
EZINE: This Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.
Posted: 09 Feb 2016 | Published: 10 Feb 2016

SearchCloudSecurity.com

CW Europe – Forecast: Cloudy with Dry Spells
sponsored by ComputerWeekly.com
EZINE: In Europe cloud is restricted and hybrid setups make use of local compute and storage.
Posted: 09 Feb 2016 | Published: 08 Feb 2016

ComputerWeekly.com

Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: Check out this incredible online resource center that's packed with proven best practices focused on how to transform your data into a powerful strategic asset with a holistic data protection plan—enabling you to access all of your data safely from any endpoint.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

Securing Customers Data with the Cloud
sponsored by Hewlett-Packard Enterprise
VIDEO: In the following case study, learn how Easynet, a managed service provider, was able to achieve flexible and reliable security that they can offer to customers quickly and effectively.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Hewlett-Packard Enterprise

Searching for Better Big Data Business Value? Look to the Cloud
sponsored by Oracle Corporation
VIDEO: In this brief video, you will discover a big data cloud service that utilizes the latest advances in big data processing and unifies these processes with Oracle's Big Data SQL. Tune in to access the benefits of cloud-enabled data management.
Posted: 03 Feb 2016 | Premiered: 03 Feb 2016

Oracle Corporation

Monitoring that Cloudy Network
sponsored by SearchSecurity.com
EBOOK: Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchSecurity.com

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

The Key to Cloud Security Compliance: Optimizing Cloud Infrastructure Security Programs
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn why SaaS vendors bear a heavy compliance burden for cloud security. Access now to determine which policies and security controls you should include in your cloud infrastructure security program to prevent cloud security compromises.
Posted: 29 Jan 2016 | Published: 29 Jan 2016

CloudPassage

Discovering Dedicated Cloud Services for Big Data Management
sponsored by Oracle Corporation
VIDEO: In this video, you will discover a comprehensive and dedicated cloud service that delivers high performance and agility for your big data environment. Tune in now to learn how this service gives you one fast SQL query over all your data, whether it's in Hadoop, NoSQL, or Oracle Database.
Posted: 28 Jan 2016 | Premiered: 10 Aug 2015

Oracle Corporation

The CISO Role and the Ups and Downs of Cloud Compliance
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn about the shifting roles of the chief information security officer (CISO), as well as how to extend cyber and cloud security concerns beyond your IT department to permeate all layers of leadership. Access this guide in addition to see experts highlight the ups and downs of cloud compliance.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

CloudPassage

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Key Considerations in Choosing a WAF
sponsored by F5 Networks
WHITE PAPER: Attacks are becoming more sophisticated, and keeping up to date on security measures can be challenging. In this detailed white paper, explore both the basic and advanced considerations of selecting a web application firewall today, including performance, high availability, reliability, automatic attack detection, ease of management, and much more.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

F5 Networks

E-Commerce Infographic: 3 Factors That Can Enable or Hinder Growth
sponsored by Oracle Corporation
RESOURCE: In this infographic, explore three factors that can enable or hinder e-commerce growth. Find out why agility is a competitive advantage for e-commerce growth, how performance can effect site abandonment rates, security caveats and more.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Oracle Corporation

The Expansion of the IPS Appliance Market and Intrusion Prevention Systems Assessment
sponsored by IBM
RESOURCE: In this report, you will evaluate several best-in-class intrusion prevention systems, and determine which stand-alone IPS appliances offer the functionality needed in your enterprise. Read on to learn which vendors offer IPS and IDS functionality to provide control over public cloud workloads.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

IBM

You Can’t Secure What You Can’t See: 7 Rules to Achieve Visibility in Virtual Infrastructure
sponsored by CloudPassage
RESOURCE: This blog post outlines 7 tips for increasing visibility in virtual environments for better security. Read on to learn about how to gain continuous visibility with comprehensive security functions.
Posted: 20 Jan 2016 | Published: 22 Sep 2015

CloudPassage

Containers and the Cloud: Overcoming Security Concerns
sponsored by CloudPassage
WEBCAST: This webcast contains a discussion of a cloud security innovation, containerization.
Posted: 19 Jan 2016 | Premiered: Dec 31, 2015

CloudPassage

How Enterprises Are Attacking the Cloud Security Challenge
sponsored by CloudPassage
WEBCAST: The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.
Posted: 15 Jan 2016 | Premiered: Dec 23, 2015

CloudPassage

Best Practices for Securing AWS Instances
sponsored by CloudPassage
WEBCAST: In this webcast, security pros will explore the security challenges AWS computing presents and offer 7 best practices to secure your cloud environments faster. Watch now to learn more.
Posted: 15 Jan 2016 | Premiered: Dec 4, 2015

CloudPassage

Forrester Market Overview: Cloud Workload Security Management Solutions - Automate or Die
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 13 Jan 2016 | Published: 02 Jun 2015

CloudPassage

The Perceived Effectiveness of Traditional Security Solutions in the Cloud
sponsored by CloudPassage
WHITE PAPER: The report presents research from a survey of high-level security professionals at major North American organizations on their attitudes toward cloud security, key adoption drivers, and the effectiveness of traditional security solutions in cloud environments.
Posted: 13 Jan 2016 | Published: 30 Jun 2015

CloudPassage

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This commissioned study, conducted by Forrester Research on behalf of Alert Logic, examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Predictions 2016: The Cloud Accelerates
sponsored by Hedvig Inc
RESEARCH CONTENT: This report by Forrester outlines 11 factors that will accelerate cloud adoption in 2016. Uncover key developments like: Top vendors gain and others retreat or refocus; automation finally chips away at cloud security fears; and more.
Posted: 10 Feb 2016 | Published: 16 Nov 2015


Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that reduces IT risk and drives operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Access now to discover how your enterprise can protect and manage all of its credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.
101 - 125 of 974 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement