Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
151 - 175 of 876 Matches Previous Page  | Next Page
IDC MarketScape: Worldwide Federated Identity Management and Single Sign-in 2014 Vendor Assessment
sponsored by CA Technologies.
ASSESSMENT TOOL: Explore this study conducted by IDC that compares vendors in the IAM market, particularly catering to FSSO programs.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

CA Technologies.

How to Protect Data in the Workplace With Cloud and Mobile Technologies
sponsored by BitGlass
WHITE PAPER: This report explains how deploying security measures within your company and keeping up to date with the latest technologies can help prevent data loss.
Posted: 20 Jun 2014 | Published: 20 Jun 2014


Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014


Secure Mobile and Cloud Technologies Within the Enterprise
sponsored by BitGlass
WHITE PAPER: This resource highlights 5 critical characteristics to have in a unified security solution that will protect mobility and cloud initiatives.
Posted: 19 Jun 2014 | Published: 19 Jun 2014


Examining Cloud Computing Threats and Mitigations
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide details the new threats that come with cloud computing and how you should deal with them.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

CenturyLink Technology Solutions

Information Security in the E-Commerce Sector
sponsored by Alert Logic
WHITE PAPER: This resource looks at information security in the e-commerce sector, and how standards like PCI enforce the strong need to protect consumer personal information.
Posted: 18 Jun 2014 | Published: 28 Feb 2014

Alert Logic

Surprising Research on the Evolving State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This resource aims to break the lingering assumption that the cloud is inherently less secure than an enterprise data center environment.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Alert Logic

Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager
sponsored by Alert Logic
WHITE PAPER: In this white paper we will discuss how vulnerability assessment, network intrusion detection and log management work together to protect your IT assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Alert Logic

Keep in Mind User Privacy With the Cloud and Mobile Devices
sponsored by BitGlass
CASE STUDY: In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014


5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

The Truth About Cloud Security
sponsored by Dropbox for Business
WHITE PAPER: It would make sense that keeping data close to home and on premises would be the most secure route to take, but the truth is, cloud solutions can offer companies real, tangible security advantages over more traditional approaches. Read more to find out the truth about cloud security.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

Dropbox for Business

Security Report: The Evolving State of Cloud Protection
sponsored by NaviSite, Inc.
WHITE PAPER: This in-depth report takes a look at the developments, trends, and other factors that have impacted how IT departments need to think about their cloud-based security.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

NaviSite, Inc.

Solving for "Total Cost" in The Cloud
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This white paper shares tips on how to keep the total cost of ownership low for your business with the addition of cloud applications.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

CenturyLink Technology Solutions

Secure Cloud Applications Without Disrupting Your Enterprise Identity Infrastructure
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features an on-premise federated identity service that helps you extent your existing identity and access management (IAM) infrastructures to the cloud.
Posted: 05 Jun 2014 | Published: 31 Dec 2012

Radiant Logic, Inc.

Cloud Adoption: Multi-Cloud Management Challenges
sponsored by Dell, Inc.
VIDEO: This valuable video details why a multi-cloud environment creates a more complex environment to manage.
Posted: 05 Jun 2014 | Premiered: 05 Jun 2014

Dell, Inc.

CIO's Guide to Managing Cloud Adoption and Risk
sponsored by SkyHigh
WHITE PAPER: This whitepaper details how to handle shadow IT by taking the right approach to risk management in the cloud.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

SkyHigh

Secure Your Virtual and Cloud-Based Data Against Today's Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This IDC report shares critical tips on how to secure a blended IT environment featuring physical data centers and cloud computing.
Posted: 20 Jun 2014 | Published: 28 Feb 2014

Fortinet, Inc.

Best Practices for Cloud Computing and BYOD Security
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide details why automation is the key to data security in the world of the cloud and BYOD.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

CenturyLink Technology Solutions

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

Signed, Sealed, Delivered: Making Cloud-based Email Secure
sponsored by SearchCloudSecurity.com
EBOOK: A cloud-based service provider can save company money but will it compromise security? Learn how to migrate email to the cloud with the fewest risks and most benefits.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

SearchCloudSecurity.com

Anypoint Platform Cloud Security & Compliance
sponsored by MuleSoft
WHITE PAPER: This white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

MuleSoft

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
TRANSCRIPT: This podcast transcript will detail the new security practices you need to put into place when you move to the cloud.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Trend Micro

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

The Insider Threat of Bring Your Own Cloud (BYOC)
sponsored by SkyHigh
WHITE PAPER: This Ponemon study highlights the latest bring-your-own-cloud (BYOC) trend, and names the top risks associated with personal cloud services in the workplace.
Posted: 04 Jun 2014 | Published: 31 Jan 2014

SkyHigh
151 - 175 of 876 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement