Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
126 - 150 of 851 Matches Previous Page  |  Next Page
Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
WEBCAST: In this helpful webcast, learn how your organization can leverage new integrated IT solutions like managed security and cloud services and to improve your business's efficiency and security, and create value for your customers.
Posted: 06 Aug 2014 | Premiered: Aug 1, 2014

NEC Corporation of America

IaaS Public Clouds and the Perceived Security Threat
sponsored by Global Knowledge
WHITE PAPER: This important whitepaper reviews security concerns and discusses how the industry has dealt with them, and then explores how these same concerns can be mitigated with a proper cloud strategy.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

Global Knowledge

Challenges with Cloud Security?
sponsored by ComputerWeekly.com
RESOURCE: Cloud information security is an issue. Download an exclusive copy of Encryption in the Cloud & see why industry experts say that cloud encryption is the key to making cloud computing more attractive for potential users that are concerned with data security. To access this resource, simply take our brief Cloud Security Survey!
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

Is Your Outdated Contact Center Keeping Customers on Hold?
sponsored by ComputerWeekly.com
RESOURCE: An outdated contact centre could be at fault for providing negative experiences for customers fed up with painful wait times and automated calls—Download this premium copy of Old-Hat Technologies Put a Cap on Customer Care to uncover expert advice on goal-oriented planning to improve your customer experience.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

ComputerWeekly.com

Balancing Flexibility and Security With Cloud Applications
sponsored by BitGlass
WHITE PAPER: In this white paper, discover how a cloud application can have the flexibility of a public cloud app while maintaining the security and compliance of a private cloud.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

BitGlass

Leveraging Software Asset Management Tools to Keep Up with Rogue IT
sponsored by CDW Corporation
VIDEO: This exclusive video covers the need for software asset management to control end users during the rise of rogue IT.
Posted: 17 Jul 2014 | Premiered: 18 Apr 2014

CDW Corporation

Modern Infrastructure – July/August 2014
sponsored by SearchCloudComputing.com
EZINE: Government spying and more mundane security concerns have businesses worrying about cloud data sovereignty.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

SearchCloudComputing.com

Cloud-Based Security Software Opens Floodgates for IT Innovation
sponsored by ControlNow
EGUIDE: In this expert e-guide, learn how one IT specialist was able to turn a modest investment in cloud-based security into a secured environment.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

ControlNow

How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

Deliver Secure Service without Sacrificing Mobility or Collaboration
sponsored by Citrix and Microsoft
WHITE PAPER: This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.
Posted: 10 Jul 2014 | Published: 31 Jan 2014

Citrix and Microsoft

Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Insight and Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

Insight and Red Hat

Introduction to ShareFile
sponsored by Citrix and Microsoft
VIDEO: In this short video, learn about a solution that allows you to easily share, sync, and store large files from any device, anywhere. Click through to find out how to be productive on the go safely and securely and also maintain full visibility and access.
Posted: 10 Jul 2014 | Premiered: 06 May 2014

Citrix and Microsoft

Mobilize Enterprise Data with Citrix ShareFile on Microsoft Azure
sponsored by Citrix and Microsoft
WHITE PAPER: To help IT regain control over employee file sharing, organizations are mobilizing enterprise data with a highly secure and validated enterprise file sync and sharing solution with flexible data storage. Access this white paper to find out how you can meet your users' mobility, productivity, and collaboration requirements.
Posted: 09 Jul 2014 | Published: 03 Jul 2014

Citrix and Microsoft

Simple Security Is Better Security
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces an alternative solution to lower complexity—cloud-based endpoint security. Read on to find out how SMBs differ from one another and why it is important to take the time to evaluate each of their needs.
Posted: 09 Jul 2014 | Published: 31 May 2014

Sophos, Inc.

Delivering a Secure Foundation for the Cloud with RHEL
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how enterprises and cloud service providers can help resolve related security concerns by using Red Hat Enterprise Linux® as the guest operating system for their cloud workloads and as the underlying platform for their cloud infrastructure.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Red Hat

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 08 Jul 2014 | Published: 16 Dec 2013

Sophos, Inc.

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

9 Things to Consider Before Choosing a Cloud Phone Provider
sponsored by ShoreTel
WHITE PAPER: Businesses today are turning to cloud phone systems more than ever, but how do you know which one is right for you?
Posted: 11 Aug 2014 | Published: 11 Aug 2014

ShoreTel

Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchSecurity.com

Top 5 Reasons to Take Advantage of the Private Cloud Now
sponsored by Dell, Inc.
WHITE PAPER: In this expert paper, learn about 5 good reasons, from cost efficiencies to data protection, why your company should take advantage of the private cloud now.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Dell, Inc.

Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

ComputerWeekly.com

Craft a security policy for a cloud-based BYOD environment
sponsored by IBM
TECHNICAL ARTICLE: As the bring your own device (BYOD) movement gains popularity in the workplace, new security concerns arise. In this article, learn how to create a thorough, clear security policy for a cloud-based BYOD environment that includes RIM, Android, Apple, and Windows devices.
Posted: 10 Jul 2014 | Published: 10 May 2013

IBM

Chapter 3: Patching Security Holes in Private Clouds
sponsored by Dell and VMware
EZINE: Download chapter 3 of this 4-part expert e-zine to gain advice for patching the security holes in private clouds. Learn more about storage provisioning, perimeter security, data portability and much more.
Posted: 09 Jul 2014 | Published: 06 Jun 2013

Dell and VMware

ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation
126 - 150 of 851 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement