Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
126 - 150 of 1078 Matches Previous Page  |  Next Page
Cloud Migrations
sponsored by Red Hat
DATA SHEET: The name of the game is delivery the highest quality at the lowest price. Many are seeing a cloud migration as the best game plan, but are unsure about how to get there. Read on to learn about a consulting service that guides you every step of the way in your migration to the cloud.
Posted: 05 May 2016 | Published: 31 Dec 2015

Red Hat

Enterprise Campus Architectures—Transformed
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this resource the benefits of collapsing your entire enterprise network into a single platform—including guarantees of increased agility and improved user satisfaction. Read now to deploy cloud network architecture that accommodates your unending need for more bandwidth.
Posted: 05 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Discover the Best Ways to Manage Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Should you eliminate, coexist with, or embrace shadow IT? Access this guide to discover the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

Cloud Disaster Recovery: Is Your Organization Ready?
sponsored by Iron Mountain
EGUIDE: As cloud adoption grows, cloud computing is becoming one of the most popular enterprise options for disaster recovery. This e-guide provides guidance for deciding if cloud DR is right for your business and how you can set up a successful cloud DR strategy.
Posted: 04 May 2016 | Published: 28 Apr 2016

Iron Mountain

Cloud Solutions Customers Will Buy: File Sync and Share, Cloud Storage, and e-Discovery in the Cloud
sponsored by Acronis
EBOOK: This e-book outlines 5 benefits of buying cloud solutions for vendors and describes three of these cloud solutions: file sync and share in the cloud, cloud storage, and e-discovery in the cloud. Discover how these cloud solutions can enable your enterprise to stay ahead of competitors by increasing your value and saving you money.
Posted: 04 May 2016 | Published: 31 Jan 2016

Acronis

Top 3 Reasons Your Enterprise Network Matters More in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Traditional networks simply can't handle all the implications of the cloud. Explore the top 3 IT trends that will impact your cloud networking strategy, and learn how to build a network that's 100% cloud-ready.
Posted: 04 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Gartner Magic Quadrant for Intrusion Prevention Systems
sponsored by Intel Security
WHITE PAPER: This Magic Quadrant report direct from Gartner ranks the best (and worst) network intrusion prevention system vendors.. Plus you find out why the network IPS market continues being absorbed by next-generation firewall placements at the perimeter. (Hint: they offer some of the best protection with advanced threat defense solutions now in place.)
Posted: 04 May 2016 | Published: 16 Nov 2015

Intel Security

Top 3 Ways to Modernize Your Enterprise Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: When your organization moves to cloud-driven business models, you must decide upon the right technologies and partners to facilitate a successful transition. Read this white paper that examines the most important considerations when deciding upon a vendor to help you modernize and secure your enterprise campus and branch network infrastructure.
Posted: 04 May 2016 | Published: 04 May 2016

Juniper Networks, Inc.

Private Cloud in the Hybrid Cloud Era: Driving Better Business Value and Agility
sponsored by IBM
WHITE PAPER: Whether it's a private, public, or hybrid cloud, cloud computing is changing the way businesses carry out their IT services and expand their network reach. In this informative white paper, assess the role of your private cloud in the hybrid cloud era – and access strategies for increased cloud service agility and performance.
Posted: 04 May 2016 | Published: 31 Dec 2013

IBM

Cloud computing storage key management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 04 May 2016 | Published: 04 May 2016

ComputerWeekly.com

Data Centers at the Edge
sponsored by Schneider Electric
WEBCAST: In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.
Posted: 02 May 2016 | Premiered: May 2, 2016

Schneider Electric

Why extending Your VPN to the cloud will bring better performance and security
sponsored by AT&T
WHITE PAPER: As more applications get delivered through cloud models, IT must ensure maximum performance and availability. Why should you look to extend the capabilities of a VPN that is already in place? Learn the benefits of VPN-based connectivity for the cloud inside.
Posted: 29 Apr 2016 | Published: 20 Apr 2016

AT&T

Maximize Efficiency by Simplifying Your Network Management
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this paper how to leverage a next-generation cloud infrastructure that builds on advances in virtualization and automation to deliver greater agility, cost savings and enhanced security to your enterprise network.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Top Cloud Storage Considerations for CIOs
sponsored by Commvault
RESOURCE: Discover in this infographic how to increase IT agility and innovation, and create seamless access to your critical data and applications, by way of cloud infrastructure implementation. Access now to learn why cloud is quickly becoming the top storage choice for companies worldwide, and take advantage of cloud-run DR.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

Commvault

The Ultimate Guide for Virtual Server Protection
sponsored by Commvault
WHITE PAPER: Are you staying ahead of the tidal wave of consolidation? Read on to discover 4 questions you should be asking about your virtual server data protection. Also, learn how to optimize your storage, cloud or otherwise, to accommodate your rapidly scaled-out virtual infrastructure.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Commvault

IDC-Analyst-Connection-ISFW
sponsored by Fortinet, Inc.
ANALYST REPORT: This report documents security questions and answers from Chris Christiansen, program vice president for IDC's Security Products and Services group. Access now to learn the latest on perimeter defense and how Christiansen believe organizations can better protect their increasing databases.
Posted: 28 Apr 2016 | Published: 01 Jul 2015

Fortinet, Inc.

Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: What steps should you take to best protect your virtualized cloud data? Find out inside.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.
Posted: 22 Apr 2016 | Published: 29 May 2015

Citrix

Governing in the Cloud
sponsored by EMC
RESOURCE: The cloud is transforming IT and data storage, but government and large public organizations have obvious restrictions on how they can use the public cloud to store data. Access this microsite to how the government is benefiting from on-premise object storage.
Posted: 21 Apr 2016 | Published: 06 Apr 2016

EMC

Gain Secure Cloud Benefits with On-Premise Object Storage
sponsored by EMC
RESOURCE: This resource discusses how healthcare organizations can reap the benefits of cloud without relinquishing control over data with an on-premise object storage solution. Read on to see how this scalable, object storage platform can efficiently store and secure your unstructured data.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

EMC

Analyst Perspective: How Smart Businesses Use the Cloud
sponsored by Commvault
VIDEO: In this webcast, expert analyst Lauren Nelson discusses the rise of cloud adoption. Discover how cloud and virtualization can enable your enterprise to implement a holistic data protection and disaster recovery approach that can enable you to secure all of your applications and data under a single platform.
Posted: 19 Apr 2016 | Premiered: 08 Feb 2016

Commvault

SD-WAN: Application Performance Routing
sponsored by Fatpipe, Inc.
WHITE PAPER: SD-WAN is becoming increasingly vital to everyday operations, especially application functionality. Access this white paper to learn how the need to reduce costs surrounding applications is changing traffic patterns and how SD-WAN is providing solutions.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Fatpipe, Inc.

2016 Security Predictions
sponsored by TrendMicro
ANALYST BRIEF: As the threats continue to mount, understanding and managing cybersecurity risks are becoming top priority for business and government decision makers, and a renewed willingness to invest in security is a notable measure of progress. Is your organization prepared for tomorrow's projected threats?
Posted: 19 Apr 2016 | Published: 15 Oct 2015

TrendMicro

Tracking the Most Significant Cyber Threat
sponsored by OpenDNS
WEBCAST: Discover steps you can take to best protect your data from ransomware and infections as well as best practices to protect sensitive data overall.
Posted: 18 Apr 2016 | Premiered: Mar 30, 2016

OpenDNS

Securing Mobility Management in the Cloud
sponsored by BlackBerry
WHITE PAPER: Discover how to securely manage mobile devices and other endpoints across different operating systems ownership models. Learn how to manage your mobile workers' access to apps, data and content, all from a single, easy-to-use console.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

BlackBerry
126 - 150 of 1078 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement