Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
126 - 150 of 940 Matches Previous Page  |  Next Page
The New Cloud Security Hero
sponsored by IBM
VIDEO: The following webinar features insights from industry leaders on the latest in cloud security developments. Learn three key ways to address your cloud security issues.
Posted: 10 Nov 2015 | Premiered: 10 Nov 2015

IBM

Cloud Data Encryption Made Easy
sponsored by Oracle Corporation
WEBCAST: This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Secure Cloud Infrastructure: Is Private Cloud Data Safe?
sponsored by Oracle Corporation
WHITE PAPER: Explore what security measures are required from a private cloud provider in this white paper. In addition, read on to examine one private cloud platform that can help your organization to meet these security and compliance requirements.
Posted: 06 Nov 2015 | Published: 28 Oct 2015

Oracle Corporation

Security’s Imminent Game Changer: The Cloud Hits a Walk-Off
sponsored by IBM
WHITE PAPER: In the following white paper, learn about a cloud security system that can meet the ever-changing demands of security, even in the midst of evolving cloud and mobility environments. Access now to learn more.
Posted: 06 Nov 2015 | Published: 06 Nov 2015

IBM

Harvard Business Review: Cloud Computing Comes of Age
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, get an in-depth look at industry data about cloud adoption. See why cloud leaders get the most out of cloud use, the top 5 uses for the cloud in enterprises, and more. Also learn the biggest barriers to cloud adoption and how to overcome these challenges.
Posted: 06 Nov 2015 | Published: 06 Nov 2015

Oracle Corporation

Cloud Risk and Compliance
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: This classroom examines the key cloud concerns and how to work with cloud service providers to ensure the safety of sensitive corporate assets.Moving enterprise workloads and data to the cloud doesn't remove IT's responsibility for security and regulation compliance.
Posted: 05 Nov 2015 | Premiered: 13 Oct 2015

SearchCloudSecurity.com

Discovery, SSO, and Policy Enforcement Lets IT Security Say Yes to Cloud Apps
sponsored by IBM
VIDEO: Security-enforcing technology makes protecting the enterprise and providing innovation an achievable balance. Watch this video and discover how to minimize data mining and more effectively detect risks.
Posted: 05 Nov 2015 | Premiered: 22 Sep 2015

IBM

Lab Validation Report: Cloud NAS for the Distributed Enterprise
sponsored by Nasuni Corporation
WHITE PAPER: This exclusive report tests a cloud NAS system and assesses its file data access and control, unlimited scalability, and built-in data protection and security. Read on to discover how NAS can synchronize your data files across multiple locations and streamline the infrastructure required to manage your enterprise's unstructured data at scale.
Posted: 05 Nov 2015 | Published: 13 Aug 2015

Nasuni Corporation

Case Study: Protecting Patient Data in the Public Cloud
sponsored by Alert Logic
WHITE PAPER: Access this case study to learn how a health organization secured delicate genomic data in a public cloud environment.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Alert Logic

Case Study: Using PaaS to Accelerate App Development
sponsored by Oracle Corporation UK Ltd
VIDEO: In this video, a developer of enterprise applications discusses the top challenges his organization faced, and why his IT team selected a Platform as a Service (PaaS) solution to speed app development and simplify management.
Posted: 26 Oct 2015 | Premiered: 29 Sep 2014

Oracle Corporation UK Ltd

The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

10 Things You Need to Know About Hybrid IT Strategies
sponsored by NaviSite, Inc.
WHITE PAPER: In the following exclusive white paper, learn about the top 10 things you need to think about as you consider a hybrid IT strategy for your organization. Read on now to discover the importance of utilizing a hybrid cloud, and more.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

NaviSite, Inc.

Protecting Traditional and Cloud Data Centers with Security Intelligence
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper discusses the need for a high level of security in both traditional and cloud data centers and offers solutions to common challenges that can arise, such as security inefficacy or insufficient firewall performance. Access now to learn how security intelligence services can provide your enterprise with many benefits.
Posted: 26 Oct 2015 | Published: 31 Oct 2014

Juniper Networks, Inc.

It's Not You, It's Me: Understand the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Review the top 3 threats to public cloud environments in order to craft your security strategy to mitigate malware. Explore the shared security responsibility model to learn what steps you need to take to avoid falling victim to data breaches.
Posted: 26 Oct 2015 | Published: 11 Feb 2015

Alert Logic

NetApp Data Fabric Fundamentals
sponsored by NetApp
WHITE PAPER: Data Fabric is NetApp's vision for the future of data management. Read this technical report to find out how you can build your own data fabric by using technologies that enable data management and seamless data movement across the hybrid cloud.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

TOPICS:  Cloud Security
NetApp

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015

Mimecast

Shielding Office 365 from Advanced Threats
sponsored by Proofpoint, Inc.
WEBCAST: Office 365 comes with built-in security features, but relying on those alone won't protect your data. In this webinar, learn how to secure your Office 365 environment and defend users and data from advanced threats and phishing attacks.
Posted: 22 Oct 2015 | Premiered: Oct 13, 2015

Proofpoint, Inc.

Overcome the Complexity of Managing Cloud Apps in the Enterprise
sponsored by BlackBerry
WHITE PAPER: This white paper demonstrates how you can solve IT management challenges with an Enterprise Identity platform, simplifying the management of cloud-based apps with a single point of control. Learn how to enable single sign-on for remote users.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

BlackBerry

Signed, Sealed, Delivered: Making Cloud-based Email Secure
sponsored by SearchCloudSecurity.com
EBOOK: In this Technical Guide, experts examine the security implications and general ins and outs of moving company email to a cloud-based service. Read on to explore 10 useful tips for choosing a cloud email service provider with security in mind.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

SearchCloudSecurity.com

Analyzing the Critical Capabilities of Enterprise Mobility Management
sponsored by VMware, Inc.
ANALYST REPORT: Analyze the top EMM contenders and their positions in the market to learn how one EMM vendor sizes up in its ability to support a wide range of platforms.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

VMware, Inc.

State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

FinalCode

A Comprehensive Guide to Selecting the Right Hosted Communications Solution
sponsored by Cisco
WHITE PAPER: This white paper offers a three-step process that will allow you to make an informed decision on which cloud partner and hosted communications solution you should choose.
Posted: 07 Oct 2015 | Published: 31 Dec 2013

Cisco

IT Infrastructure: How to Achieve 100% Uptime, High Security
sponsored by CyrusOne
CASE STUDY: This case study uncovers the data center colocation provider that a financial document storage service company leveraged to meet its requirements of 100% uptime and safety compliance.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

CyrusOne

Enterprise Security in Asia 2015: The Ugly, The Bad & The Good
sponsored by F5 Networks
WHITE PAPER: This white paper reveals the truth about cybersecurity in Asia including a 52% surge in breaches and the emerging sophisticated schemes from hackers. View now to learn which attacks are most popular and how to avoid being the next data breach victim.
Posted: 01 Oct 2015 | Published: 13 Jan 2015

F5 Networks

Computer Weekly – 27 October 2015: Blockchain Sparks Change in Banking Industry
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, find out why blockchain, the technology that underpins bitcoin, is making waves in the banking sector. Also learn why EasyJet says digital is increasingly important for airlines, and take a look at the forces driving digital disruption and why some sectors are changing faster than others.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

ComputerWeekly.com
126 - 150 of 940 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement