Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
151 - 175 of 890 Matches Previous Page  | Next Page
Challenges with Cloud Security?
sponsored by ComputerWeekly.com
RESOURCE: Cloud information security is an issue. Download an exclusive copy of Encryption in the Cloud & see why industry experts say that cloud encryption is the key to making cloud computing more attractive for potential users that are concerned with data security. To access this resource, simply take our brief Cloud Security Survey!
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

Is Your Outdated Contact Center Keeping Customers on Hold?
sponsored by ComputerWeekly.com
RESOURCE: An outdated contact centre could be at fault for providing negative experiences for customers fed up with painful wait times and automated calls—Download this premium copy of Old-Hat Technologies Put a Cap on Customer Care to uncover expert advice on goal-oriented planning to improve your customer experience.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

ComputerWeekly.com

Use Software Asset Management to Prevent the Rise of Rogue IT
sponsored by CDW Corporation
VIDEO: This exclusive video covers the need for software asset management to control end users during the rise of rogue IT.
Posted: 17 Jul 2014 | Premiered: 18 Apr 2014

CDW Corporation

The Pros and Cons of Mobile Application Management
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: MAM technologies come with challenges and are not always the perfect solution for every app and IT department. Learn how to weigh the pros and cons of MAM technologies and decide if it is right for your company.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


Modern Infrastructure – July/August 2014
sponsored by SearchCloudComputing.com
EZINE: Government spying and more mundane security concerns have businesses worrying about cloud data sovereignty.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

SearchCloudComputing.com

Compliance in the Cloud
sponsored by Alert Logic
EGUIDE: This expert e-guide introduces 5 simple tips to help improve your enterprise's threat and vulnerability management program.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Alert Logic

How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

Deliver Secure Service without Sacrificing Mobility or Collaboration
sponsored by Citrix and Microsoft
WHITE PAPER: This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.
Posted: 10 Jul 2014 | Published: 31 Jan 2014

Citrix and Microsoft

Introduction to ShareFile
sponsored by Citrix and Microsoft
VIDEO: In this short video, learn about a solution that allows you to easily share, sync, and store large files from any device, anywhere. Click through to find out how to be productive on the go safely and securely and also maintain full visibility and access.
Posted: 10 Jul 2014 | Premiered: 06 May 2014

Citrix and Microsoft

Mobilize Enterprise Data with Citrix ShareFile on Microsoft Azure
sponsored by Citrix and Microsoft
WHITE PAPER: To help IT regain control over employee file sharing, organizations are mobilizing enterprise data with a highly secure and validated enterprise file sync and sharing solution with flexible data storage. Access this white paper to find out how you can meet your users' mobility, productivity, and collaboration requirements.
Posted: 09 Jul 2014 | Published: 03 Jul 2014

Citrix and Microsoft

Delivering a Secure Foundation for the Cloud with RHEL
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how enterprises and cloud service providers can help resolve related security concerns by using Red Hat Enterprise Linux® as the guest operating system for their cloud workloads and as the underlying platform for their cloud infrastructure.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Red Hat

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

How One Software Solution Will Put Your Security and Restriction Concerns to Rest
sponsored by NetApp
WHITE PAPER: There is software that offers a single storage and data management platform enabling unrestricted and secure data movement across public and private clouds. Read this white paper for a more in depth look at the benefits that come with this software, including universal data platform, dynamic data portability, extensive customer choice, and more.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

NetApp

IDC MarketScape: Worldwide Federated Identity Management and Single Sign-in 2014 Vendor Assessment
sponsored by CA Technologies.
ASSESSMENT TOOL: Explore this study conducted by IDC that compares vendors in the IAM market, particularly catering to FSSO programs.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

CA Technologies.

Top 5 Reasons to Take Advantage of the Private Cloud Now
sponsored by Dell, Inc.
WHITE PAPER: In this expert paper, learn about 5 good reasons, from cost efficiencies to data protection, why your company should take advantage of the private cloud now.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Dell, Inc.

Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

ComputerWeekly.com

Craft a security policy for a cloud-based BYOD environment
sponsored by IBM
TECHNICAL ARTICLE: As the bring your own device (BYOD) movement gains popularity in the workplace, new security concerns arise. In this article, learn how to create a thorough, clear security policy for a cloud-based BYOD environment that includes RIM, Android, Apple, and Windows devices.
Posted: 10 Jul 2014 | Published: 10 May 2013

IBM

Chapter 3: Patching Security Holes in Private Clouds
sponsored by Dell and VMware
EZINE: Download chapter 3 of this 4-part expert e-zine to gain advice for patching the security holes in private clouds. Learn more about storage provisioning, perimeter security, data portability and much more.
Posted: 09 Jul 2014 | Published: 06 Jun 2013

Dell and VMware

ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Is There Value to Virtualization and Cloud Computing?
sponsored by Windstream Communications
WHITE PAPER: This informative whitepaper compares three top cloud providers and outlines how you can more effectively implement your cloud computing strategy.
Posted: 26 Jun 2014 | Published: 31 Jul 2013

Windstream Communications

2014 Cloud Guide: Insights for a Great Migration
sponsored by Windstream Communications
RESOURCE: This guide explores some trends in cloud computing and outlines why many businesses are moving to the cloud.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Windstream Communications

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

Secure Your Virtual and Cloud-Based Data Against Today's Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This IDC report shares critical tips on how to secure a blended IT environment featuring physical data centers and cloud computing.
Posted: 20 Jun 2014 | Published: 28 Feb 2014

Fortinet, Inc.
151 - 175 of 890 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement