Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
151 - 175 of 851 Matches Previous Page  |  Next Page
Case Study: FIS Global Partners with Asigra to Provide Clients Enhanced Secure Data Protection that Meets Compliance Mandates
sponsored by Asigra
WHITE PAPER: For financial services business, it's critical that client data remains accessible and securely stored. As business grows, you will need to upgrade your backup service portfolio with an advanced solution – but there are questions you should ask before choosing.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Asigra

IaaS Public Clouds and the Perceived Security Threat
sponsored by Global Knowledge
WHITE PAPER: This important whitepaper reviews security concerns and discusses how the industry has dealt with them, and then explores how these same concerns can be mitigated with a proper cloud strategy.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

Global Knowledge

Top 5 Reasons to Take Advantage of the Private Cloud Now
sponsored by Dell and Microsoft
WHITE PAPER: In this expert paper, learn about 5 good reasons, from cost efficiencies to data protection, why your company should take advantage of the private cloud now.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Dell and Microsoft

Challenges with Cloud Security?
sponsored by ComputerWeekly.com
RESOURCE: Cloud information security is an issue. Download an exclusive copy of Encryption in the Cloud & see why industry experts say that cloud encryption is the key to making cloud computing more attractive for potential users that are concerned with data security. To access this resource, simply take our brief Cloud Security Survey!
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

Is Your Outdated Contact Center Keeping Customers on Hold?
sponsored by ComputerWeekly.com
RESOURCE: An outdated contact centre could be at fault for providing negative experiences for customers fed up with painful wait times and automated calls—Download this premium copy of Old-Hat Technologies Put a Cap on Customer Care to uncover expert advice on goal-oriented planning to improve your customer experience.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

ComputerWeekly.com

Balancing Flexibility and Security With Cloud Applications
sponsored by BitGlass
WHITE PAPER: In this white paper, discover how a cloud application can have the flexibility of a public cloud app while maintaining the security and compliance of a private cloud.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

BitGlass

Delivering a Secure Foundation for the Cloud with RHEL
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how enterprises and cloud service providers can help resolve related security concerns by using Red Hat Enterprise Linux® as the guest operating system for their cloud workloads and as the underlying platform for their cloud infrastructure.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Red Hat

Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchSecurity.com

Modern Infrastructure – July/August 2014
sponsored by SearchCloudComputing.com
EZINE: Government spying and more mundane security concerns have businesses worrying about cloud data sovereignty.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

SearchCloudComputing.com

Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

ComputerWeekly.com

Craft a security policy for a cloud-based BYOD environment
sponsored by IBM
TECHNICAL ARTICLE: As the bring your own device (BYOD) movement gains popularity in the workplace, new security concerns arise. In this article, learn how to create a thorough, clear security policy for a cloud-based BYOD environment that includes RIM, Android, Apple, and Windows devices.
Posted: 10 Jul 2014 | Published: 10 May 2013

IBM

Chapter 3: Patching Security Holes in Private Clouds
sponsored by Dell and VMware
EZINE: Download chapter 3 of this 4-part expert e-zine to gain advice for patching the security holes in private clouds. Learn more about storage provisioning, perimeter security, data portability and much more.
Posted: 09 Jul 2014 | Published: 06 Jun 2013

Dell and VMware

ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Seven Keys to Securing Your Growing Business
sponsored by Sophos, Inc.
WHITE PAPER: This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.
Posted: 01 Jul 2014 | Published: 01 Oct 2013

Sophos, Inc.

Is There Value to Virtualization and Cloud Computing?
sponsored by Windstream Communications
WHITE PAPER: This informative whitepaper compares three top cloud providers and outlines how you can more effectively implement your cloud computing strategy.
Posted: 26 Jun 2014 | Published: 31 Jul 2013

Windstream Communications

2014 Cloud Guide: Insights for a Great Migration
sponsored by Windstream Communications
RESOURCE: This guide explores some trends in cloud computing and outlines why many businesses are moving to the cloud.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Windstream Communications

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

Secure Your Virtual and Cloud-Based Data Against Today's Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This IDC report shares critical tips on how to secure a blended IT environment featuring physical data centers and cloud computing.
Posted: 20 Jun 2014 | Published: 28 Feb 2014

Fortinet, Inc.

Examining Cloud Computing Threats and Mitigations
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide details the new threats that come with cloud computing and how you should deal with them.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

CenturyLink Technology Solutions

Best Practices for Cloud Computing and BYOD Security
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide details why automation is the key to data security in the world of the cloud and BYOD.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

CenturyLink Technology Solutions

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.
151 - 175 of 851 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement