Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
151 - 175 of 1074 Matches Previous Page  |  Next Page
Future Proof your Data Storage with the Hybrid Cloud
sponsored by Equinix
WHITE PAPER: This white paper highlights one hybrid cloud platform with customizable end-to-end data center and cloud storage solutions. Read on and discover how this solution can provide your enterprise with secure storage for your mission-critical data and simplified backup and archiving.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Equinix

The Key to Protecting Your Business Amid Cybercrime’s Current Boom
sponsored by CA Technologies
WHITE PAPER: This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

CA Technologies

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

Develop a strong IAM strategy for third-party vendors
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide presents three in-depth looks at managing third-party IAM. You will learn about recent data breaches and how third-parties often prove to be the access point for hackers.
Posted: 12 Apr 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Implementing Multi-Tenanted Storage for Service Providers
sponsored by Cloudian
WHITE PAPER: This white paper highlights a cost-effective, scalable storage platform for cloud storage services. Discover how this platform can enable your organization to deliver a multi-tenant hosting solution with storage provisioning and management capabilities and with the freedom of choice of using hardware that meets your customers' needs.
Posted: 12 Apr 2016 | Published: 31 Dec 2015

Cloudian

Attaining Real Opportunity for MSPs: Cloud Infrastructure as End-to-End systems
sponsored by LogicNow
WHITE PAPER: With more and more clients wanting greater services from their MSPs, providers have real opportunity in managing both on premises and cloud infrastructure as end-to-end systems. This white paper examines how it can be done with the right ecosystem of tools. Read on to find out more.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

LogicNow

Protecting Business Critical Services – Email
sponsored by LogicNow
WHITE PAPER: This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Effectively managing privileged access across your hybrid enteprise is an imperative to reducing security and compliance risks. Discover ways to prevent unauthorized access and minimize the impact of breaches while simplifying compliance.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Secure Data in the Cloud with AWS Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.
Posted: 07 Apr 2016 | Published: 24 Mar 2016

Radiant Logic, Inc.

Enhancing Security and System Functionality with the Cloud
sponsored by Splunk
CASE STUDY: This case study explores how a marketing company leveraged a cloud service to protect their systems from potential brute force attacks, while lowering operational costs and reducing time resolution for errors.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

Splunk

Improving with Cloud
sponsored by Big Switch Networks
PRODUCT REVIEW: This review showcases how one emerging technology is overcoming many of the bigger challenges facing the future of cloud and network technology.
Posted: 06 Apr 2016 | Published: 26 Aug 2015

Big Switch Networks

Innovative Cloud-Based SIEM Deployment Delivers Actionable Security Intelligence
sponsored by Splunk
CASE STUDY: This case study explores how Equinix, a global cloud interconnection provider, overcame network blind spots and manually extracting and correlating data by turning to the cloud.
Posted: 06 Apr 2016 | Published: 24 Feb 2016

Splunk

A Balanced Approach to Cloud Storage
sponsored by Cloudian
WHITE PAPER: This white paper highlights the advantages of leveraging a hybrid cloud solution that enables enterprises to benefit from the cost-efficiency and capacity of a public cloud and the security of a private cloud. Access now to see how balancing your cloud storage can enable your enterprise to keep the hard and soft costs of cloud under control.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

Cloudian

Greencore Cloud Case Study: Taking a Bite out of Operational Cost & Business Risk
sponsored by Adapt Services
CASE STUDY: In this case study, discover how Greencore decided to outsource its IT infrastructure to Adapt, gained a customized, consistent application ecosystem, and experienced a number of other benefits, including: a 25% reduction in data center costs, increased performance, security, and availability, acquisition-friendly infrastructure, and more.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

Adapt Services

Cloud Security Gateways Rise to the Data Loss Challenge
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine we look at cloud data loss prevention (DLP), the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection for enterprise data.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SearchSecurity.com

Overcoming Data Sovereignty and Security Challenges with the Cloud
sponsored by Cogeco PEER 1
WHITE PAPER: Access this valuable resource now and learn how to stay ahead of data residency laws, ensure you are storing data correctly, and safeguard your customer's data and ensure that its sovereignty remains intact.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

Cogeco PEER 1

Cloud Connectivity and Colocation for Your Enterprise Data Center
sponsored by CyrusOne
WHITE PAPER: Discover how to deliver flexible cloud-connectivity service to your data center seamlessly and immediately through a single port, and implement successfully scaled, cloud-enabled colocation.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

CyrusOne

Provide a Unified, Coherent Developer Experience using Cloud-based Identification
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide teaches you about a centralized security tier to enable single sign-on across multiple enterprise, partner and cloud services. Learn how to create a cloud gateway to access applications running across multiple back ends so developers spend less time implementing new security frameworks for each service.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Top 5 Considerations in Transitioning to SDN for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Software-defined networking is an important enabling technology for the digital workplace. By the end of 2020, it is expected to impact about 80% of network purchase decisions. Access this white paper to explore the top five factors you should consider as you transition to SDN.
Posted: 29 Mar 2016 | Published: 23 Mar 2016

Aruba Networks

How to Build a Formal Hybrid Cloud Strategy to Prevent Cloud Chaos
sponsored by Dimension Data
EGUIDE: This e-guide highlights discussions from the 2015 Hybrid Cloud Summit regarding managing, integrating, and securing hybrid cloud infrastructures. Read on to learn how you can build a formal hybrid cloud strategy with governance and management tools, such as API governance tools, provider-native governance and management tools, and more.
Posted: 28 Mar 2016 | Published: 25 Mar 2016

Dimension Data

Locking up the Cloud with IAM
sponsored by SearchCloudSecurity.com
EBOOK: In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
Posted: 25 Mar 2016 | Published: 18 Mar 2016

SearchCloudSecurity.com

Today's Most Valuable Commodity is Located in Cyberspace
sponsored by Digital Guardian
EGUIDE: This e-guide teaches you about current cloud security trends and how hackers are adapting their methods to steal your business data. Continue reading to inform your organization about cloud attacks and adapt countermeasures to respond accordingly.
Posted: 24 Mar 2016 | Published: 22 Mar 2016

Digital Guardian

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 24 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

Cloud: The New Way to Get Things Done
sponsored by Microsoft
WHITE PAPER: Access this comprehensive infographic to explore ways the cloud can help organizations do their best work regardless of location, and make better decisions.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Microsoft

Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies
sponsored by TrendMicro
RESOURCE: A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.
Posted: 23 Mar 2016 | Published: 23 Mar 2016

TrendMicro
151 - 175 of 1074 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement