Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
151 - 175 of 1169 Matches Previous Page  |  Next Page
Honda Dealer Recovers from Ransomware
sponsored by Acronis
CASE STUDY: Take a look at this Honda dealership case study on how they overcame data loss and malware attacks by leveraging the cloud.
Posted: 16 Aug 2017 | Published: 31 Aug 2016

Acronis

Equinix Delivers Security Intelligence with Cloud-Based SIEM
sponsored by Splunk
CASE STUDY: Read this case study to uncover how Equinix, a large technology company, was able to increase visibility and achieve a 30% faster response to security incidents with Splunk.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Splunk

Private Cloud Users Stack Up Third-Party Platform Delivery vs. DIY
sponsored by Red Hat
WHITE PAPER: With so many OpenStack distributions to choose from, do you know which use cases will help you best realize OpenStack success? Read this research paper, in which 2 separate case studies detail the way in which an OpenStack cloud was deployed, the workloads to which that compute power is deployed, and the tools supporting the environment.
Posted: 11 Aug 2017 | Published: 31 Dec 2016

Red Hat

The Imperative for Hybrid IT: Cloud and Innovation in the Modern Era
sponsored by Red Hat
RESEARCH CONTENT: Today, nearly 90% of enterprises overall use at least one form of cloud. This research report uncovers the what, why and how of the new approaches to IT to understand how companies are coping with public and private cloud.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Red Hat

Overcome Security Barriers to the Cloud
sponsored by Commvault
WHITE PAPER: Learn how to enable data security features in the cloud to avoid costly data breaches. As a bonus, discover 4 other barriers to the cloud and how to overcome these challenges.
Posted: 09 Aug 2017 | Published: 31 Dec 2015

Commvault

Rethink Your Strategy to Defeat Evasive Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Malware is rapidly changing, and security policies need to change alongside it. Inside, learn about why implementing an analytics-based threat detection system is your best bet at keeping your network safe.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Palo Alto Networks

Hybrid Cloud: Avoiding Implementation Mistakes and Re-examining Your Toolset
sponsored by Lenovo and Intel
EGUIDE: In this guide compiled by the editors at SearchCloudComputing.com, you'll discover how to avoid hybrid cloud implementation missteps, with advice on pairing the right type of public cloud with the most appropriate on-prem storage. Download now to gain this, and three additional articles, as well.
Posted: 08 Aug 2017 | Published: 27 Jul 2017

Lenovo and Intel

Mitigate Mobile Cloud App Risks
sponsored by MobileIron
VIDEO: Mobile apps are becoming the number one way employees are accessing cloud services, creating a new threat vector that you need to overcome: mobile app-to-cloud risk. This webcast explores 3 ways employees can introduce vulnerabilities by using cloud apps on mobile devices.
Posted: 07 Aug 2017 | Premiered: 07 Aug 2017

MobileIron

CyberSecurity in 2017: Can Business Really Be Secure?
sponsored by AdvizeX Technologies
RESOURCE: As technology and criminals both advance at lightning speed, can you really be sure that your business is secure? As you introduce tools for productivity, are you also opening yourself to attack? Access this report from cybersecurity expert Sam Cattle.
Posted: 07 Aug 2017 | Published: 09 Feb 2017

AdvizeX Technologies

Key Benefits of Taking Your SIEM To The Cloud
sponsored by Splunk
WHITE PAPER: Explore 5 benefits of taking your SIEM platform to the cloud. As a bonus, uncover two case studies to see how organizations have gained key advantages, like lowering operational costs, increasing focus on strategic initiatives, and more.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Splunk

The Road to a Secure, Compliant Cloud
sponsored by HyTrust
WHITE PAPER: Corporations must innovate to stay ahead of the competition, deliver new services to attract and keep new customers, and keep their costs low. Uncover how a well-designed virtualized cloud offers businesses a solution, by keeping their crucial data secure while providing agility and adaptability.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

HyTrust

SiliconANGLE Spotlight: HyTrust
sponsored by HyTrust
VIDEO: Join Eric Chiu, the founder and president of HyTrust, a security, compliance and control IT infrastructure company, to learn how this enterprise was founded, what it specializes in, and why you should care.
Posted: 27 Jul 2017 | Premiered: 27 Jul 2017

HyTrust

Tool Overview: HyTrust Multi-Cloud Security and Automated Compliance
sponsored by HyTrust
PRODUCT OVERVIEW: In this technology brief, learn about HyTrust Multi-Cloud Security and Automated Compliance, security software for a multi-cloud infrastructure. Discover key features and benefits, and how you can implement this tool for your own enterprise security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World
sponsored by HyTrust
WHITE PAPER: Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future?
Posted: 25 Jul 2017 | Published: 25 Jul 2017

HyTrust

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect

Enterprise Cloud Applications & Services Adoption, Use, and Threats
sponsored by Symantec
RESEARCH CONTENT: This special "Shadow Data Research Report" addresses the challenges faced when securing data in cloud apps and services specific to Shadow. Plus the report covers the potential repercussions of data leakage including compliance and mitigation costs that we guarantee you'll never want to face.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Symantec

Top Insights and Resources from Google Cloud Next '17
sponsored by Google Cloud
EBOOK: Get the low-down on the highlights from Google's marquee cloud conference in San Francisco.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Google Cloud

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

The state of DaaS in recent years: Challenges and use cases
sponsored by Nerdio
EGUIDE: In this e-guide, independent industry analysts Jack Madden and Gabe Knuth, discuss the state of the DaaS industry in recent years and examine how the technology has matured. They dive into the challenges and benefits of DaaS, as well as common use cases.
Posted: 26 Jul 2017 | Published: 21 Jul 2017

Nerdio

A Look at the Shared Responsibility Model for Cloud Providers
sponsored by SolarWinds, Inc.
EGUIDE: Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.

What's New in the World of Managed Security Providers?
sponsored by SolarWinds, Inc.
EGUIDE: Go inside this expert guide to explore the 2 major ways managed security service providers have changed in recent years.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.

Will MSPs Answer the Call for Cybersecurity Services?
sponsored by SolarWinds, Inc.
EGUIDE: Many customers today are looking for security offerings from their service providers, but is this the right direction to take your business? Read this guide to learn what concerns providers must be able to address, and how you could begin to integrate security services into your enterprise.
Posted: 25 Jul 2017 | Published: 20 Jul 2017

SolarWinds, Inc.
151 - 175 of 1169 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement