Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
126 - 150 of 1063 Matches Previous Page  |  Next Page
Healthcare & Cloud: How Does The Cloud Apply To Imaging Today?
sponsored by Ambra
EBOOK: Discover how to properly prevent the catastrophic loss of images, and optimize healthcare systems storage capacity, by deploying cloud-based archiving for the PACS infrastructure. Read on to create a highly agile environment for sharing and receiving medical data, and secure all expanding images on-demand.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Ambra

What Trust Can Mean to Your Enterprise's Cloud Policy
sponsored by Entrust, Inc.
ANALYST BRIEF: Uncover the changing nature of trust in business, how it will affect your enterprise, and how to create business value using identity. Learn how to manage identity and access more effectively, saving your team's time, effort, and resources.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Entrust, Inc.

Keeping the Keys to Your Cloud Future Secure
sponsored by Entrust, Inc.
RESOURCE: Discover the key challenge and key enabler of digital business safely migrating to the cloud and ensuring the right people have the right keys, privileges and certificates, while keeping them out of the hands of hackers.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Entrust, Inc.

Gain Complete Control of Your Digital Ecosystem with PKI
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

Bringing Agility & Visibility Together for Cloud Success
sponsored by Splunk
RESOURCE: Learn how AWS and Splunk are working together to optimize end-to-end visibility in AWS cloud environments to make the most of your cloud platform. You'll discover how you can make machine data accessible, usable, and valuable for everyone.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Splunk

5 Organizations Harness the Cloud to Transform Their Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Carefully planning your journey to the cloud is essential to your enterprise's continued success. This white paper details how 5 organizations used one unified network platform to easily construct an agile, secure, and cloud-enabled enterprise. Access now to learn about this platform and how it ensures a successful move to the cloud.
Posted: 06 Sep 2016 | Published: 31 May 2016

Juniper Networks, Inc.

Cloud Services Take Off, GRC Doesn't
sponsored by SearchSecurity.com
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

SearchSecurity.com

How to Secure Cloud Applications & Services
sponsored by Blue Coat Systems
WHITE PAPER: In this executive guide, uncover everything you need to know to transition to the cloud seamlessly. Learn about incident response and threat detection, compliance and data privacy, selecting a CASB solution, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Blue Coat Systems

A Guide to Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: Access this white paper for tips on how you can safely adopt Office 365. Learn where Office 365 fails to protect your organization and how to mitigate those shortcomings to prevent data exposures, safeguard against unauthorized user activity, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Symantec + Blue Coat

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Blue Coat Systems
WHITE PAPER: This guide takes you through the 11 steps that enterprises can take to optimize the benefits of cloud applications, while mitigating the risks inherent in adoption.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Blue Coat Systems

AWS Case Study: Brooks Brothers
sponsored by UXC Oxygen and Amazon Web Services
RESOURCE: To realize agility and cost savings, Brooks Brothers decided to move its SAP HANA platform to the cloud. Discover which platform helped the NYC-based retailer generate new opportunities, and produce new initiatives faster.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

UXC Oxygen and Amazon Web Services

Perspective: The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records savings, workforce hours, and streamlined workloads.
Posted: 17 Aug 2016 | Published: 25 Jul 2016

Infor

Don't Let The Cloud Cast A Shadow On Security
sponsored by Cisco Systems, Inc.
RESOURCE: Discover how cloud adoption is exploding along with risks to enterprise data, and how to protect your organization's livelihood after it migrates to the cloud.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

Cisco Systems, Inc.

Overcome Cloud Security Challenges With These Five Expert Tips
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: Security is the number one concern for enterprise IT when it comes to public cloud. In this exclusive e-guide, explore five tips to determine the security tools and strategies that will work best for you.
Posted: 16 Aug 2016 | Published: 11 Aug 2016

Hewlett Packard - Intel Xeon

What does cloud computing look like in 2016?
sponsored by ComputerWeekly.com
EGUIDE: Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

What does cloud computing look like in 2016?
sponsored by ComputerWeekly.com
EGUIDE: Through our own research and local interviews this guide uncovers some of the benefits the cloud brings to organisations in Australia/New Zealand.
Posted: 14 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

The Rise of Cloud-Based Application Security Vulnerabilities
sponsored by Onapsis
EGUIDE: This e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.
Posted: 12 Sep 2016 | Published: 06 Sep 2016

Onapsis

How to Secure Azure and Recover From the Worst Disasters
sponsored by Softchoice Corporation
EGUIDE: In this e-guide, expert Rob Shapland breaks down how two new Microsoft Azure features aim to boost cloud security for enterprises. Learn how to keep Azure secure and keep your business going if disaster strikes and the worst is realized.
Posted: 08 Sep 2016 | Published: 07 Sep 2016

Softchoice Corporation

Deepen Visibility into Cloud and Hybrid IT with Unified Infrastructure Management
sponsored by CA Technologies
WHITE PAPER: Learn why it's recommended your organization extends the visibility of existing infrastructure tools with a unified, hybrid IT monitoring platform—providing visibility into traditional and next-generation technologies. Read on to take a unified approach to IT ops, and monitor all hybrid cloud, software-defined, and converged environments.
Posted: 07 Sep 2016 | Published: 30 Jun 2016

CA Technologies

What to Look for in Cloud Access Security Brokers
sponsored by SearchCloudSecurity.com
EBOOK: This guide helps IT professionals choose the best CASB for their enterprise by explaining how CASB technology works, and giving advice on assessing vendor products.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

SearchCloudSecurity.com

The Case for Security Intelligence Services, Hosted from the Cloud
sponsored by IBM
WHITE PAPER: Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.
Posted: 30 Aug 2016 | Published: 01 Apr 2015

IBM

Cloud App Development: Finding the Right Mix
sponsored by Velostrata
EGUIDE: In this e-guide, discover what needs to be done internally with your hybrid cloud environment to better suit it for modern, fast app development and testing, such as DevOps and continuous integration.
Posted: 19 Aug 2016 | Published: 16 Aug 2016

Velostrata

Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
sponsored by TrendMicro
EGUIDE: In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.
Posted: 18 Aug 2016 | Published: 11 Aug 2016

TrendMicro

Testing the Cloud: Ensuring Enterprise Data is Secure
sponsored by TrendMicro
EGUIDE: In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.
Posted: 17 Aug 2016 | Published: 11 Aug 2016

TrendMicro

Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms
sponsored by Schneider Electric
WHITE PAPER: This informational white paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. Access this information now to evaluate the merits of remote monitoring vendors and their solutions.
Posted: 16 Aug 2016 | Published: 01 Aug 2016

Schneider Electric
126 - 150 of 1063 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement