Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
151 - 175 of 836 Matches Previous Page  |  Next Page
Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Seven Keys to Securing Your Growing Business
sponsored by Sophos, Inc.
WHITE PAPER: This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.
Posted: 01 Jul 2014 | Published: 01 Oct 2013

Sophos, Inc.

Is There Value to Virtualization and Cloud Computing?
sponsored by Windstream Communications
WHITE PAPER: This informative whitepaper compares three top cloud providers and outlines how you can more effectively implement your cloud computing strategy.
Posted: 26 Jun 2014 | Published: 31 Jul 2013

Windstream Communications

2014 Cloud Guide: Insights for a Great Migration
sponsored by Windstream Communications
RESOURCE: This guide explores some trends in cloud computing and outlines why many businesses are moving to the cloud.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Windstream Communications

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

Secure Your Virtual and Cloud-Based Data Against Today's Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This IDC report shares critical tips on how to secure a blended IT environment featuring physical data centers and cloud computing.
Posted: 20 Jun 2014 | Published: 28 Feb 2014

Fortinet, Inc.

Examining Cloud Computing Threats and Mitigations
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide details the new threats that come with cloud computing and how you should deal with them.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

CenturyLink Technology Solutions

Best Practices for Cloud Computing and BYOD Security
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide details why automation is the key to data security in the world of the cloud and BYOD.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

CenturyLink Technology Solutions

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
CASE STUDY: In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

BitGlass

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

The Truth About Cloud Security
sponsored by Dropbox for Business
WHITE PAPER: It would make sense that keeping data close to home and on premises would be the most secure route to take, but the truth is, cloud solutions can offer companies real, tangible security advantages over more traditional approaches. Read more to find out the truth about cloud security.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

Dropbox for Business

Signed, Sealed, Delivered: Making Cloud-based Email Secure
sponsored by SearchCloudSecurity.com
EBOOK: A cloud-based service provider can save company money but will it compromise security? Learn how to migrate email to the cloud with the fewest risks and most benefits.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

SearchCloudSecurity.com

Anypoint Platform Cloud Security & Compliance
sponsored by MuleSoft
WHITE PAPER: This white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

MuleSoft

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
TRANSCRIPT: This podcast transcript will detail the new security practices you need to put into place when you move to the cloud.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Trend Micro

Security Report: The Evolving State of Cloud Protection
sponsored by NaviSite, Inc.
WHITE PAPER: This in-depth report takes a look at the developments, trends, and other factors that have impacted how IT departments need to think about their cloud-based security.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

NaviSite, Inc.

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

The Insider Threat of Bring Your Own Cloud (BYOC)
sponsored by SkyHigh
WHITE PAPER: This Ponemon study highlights the latest bring-your-own-cloud (BYOC) trend, and names the top risks associated with personal cloud services in the workplace.
Posted: 04 Jun 2014 | Published: 31 Jan 2014

SkyHigh

CIO's Guide to Managing Cloud Adoption and Risk
sponsored by SkyHigh
WHITE PAPER: This whitepaper details how to handle shadow IT by taking the right approach to risk management in the cloud.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

SkyHigh

21 Point Checklist for Selecting An Enterprise-Ready Cloud Service
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper details the five categories to analyze in your cloud vendor audit and provides a 21-point checklist for selecting a cloud provider that will bring maximum cloud benefits, with minimal risk.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

SkyHigh

Cloud Adoption & Risk Report
sponsored by SkyHigh
WHITE PAPER: This survey reveals the ongoing struggle with the growing risks in cloud adoption in 2014 to help IT leaders better prepare for future migration projects.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

SkyHigh

Managing Cloud Adoption and Risk
sponsored by SkyHigh
WHITE PAPER: This 12-item checklist is to help IT pros securely fulfill a cloud adoption.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

SkyHigh

Transforming Information Security: Focusing on Strategic Technologies
sponsored by RSA
WHITE PAPER: This in-depth guide outlines the current threat landscape and explores strategic technologies for your information security strategy.
Posted: 29 May 2014 | Published: 29 May 2014

RSA

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh
151 - 175 of 836 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement