Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
151 - 175 of 1064 Matches Previous Page  |  Next Page
What does cloud computing look like in 2016?
sponsored by ComputerWeekly.com
EGUIDE: Through our own research and local interviews this guide uncovers some of the benefits the cloud brings to organisations in Australia/New Zealand.
Posted: 14 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Achieve Secure Wireless Networking in the Classroom
sponsored by Fortinet, Inc.
RESOURCE: Affordable laptops and tablets in the classroom plus ubiquitous Wi-Fi can turn the dream of one-to-one computing into reality, but not without challenges in security and application control. Access this resource now to learn how you can support BYOD, guard against malicious attacks, malware and viruses, and completely control application usage.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Using Hybrid Cloud Strategy to Drive Business Value
sponsored by IBM
WHITE PAPER: 72% of businesses in the United States have adopted a cloud-first approach to new service deployment. This analysis outlines the business value of a hybrid cloud strategies and how advisors can help businesses realize that value. Take a look at the benefit of integrating a hybrid environment in the enterprise and what to look for in a provider.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Hybrid Cloud Is About Choice
sponsored by IBM
RESOURCE: Hybrid cloud computing integrates cloud resources with traditional IT infrastructure to ensure security, high performance, and accelerated application delivery. Discover how you can leverage hybrid cloud to become more agile and support new business models.
Posted: 10 Aug 2016 | Published: 08 Jul 2016

IBM

Accelerated Ingest to Cloud Storage
sponsored by Signiant, Inc.
WHITE PAPER: Discover how you can address bottlenecks, provide industry-leading transfer rates, and gain enhanced scalability, reliability and security with cloud-native upload technology for Amazon S3 and Microsoft Azure.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

Signiant, Inc.

Securing DevOps
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

SearchSecurity.com

Sending and Sharing Large Files: Optimizing Existing IP Networks
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this paper an advanced file acceleration protocol that works with your business' existing IP networks to eliminate latency, optimize available bandwidth, and overcome throughput bottlenecks when moving large files over distance, like video and high-resolution images.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Signiant, Inc.

Enterprise cloud applications – can we trust them?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

ComputerWeekly.com

The Art and Science of Value Realization in the Cloud
sponsored by Infor
WHITE PAPER: Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Accelerated i/O: Move Large Data Sets Into and Out Of the Cloud
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Signiant, Inc.

Tips for Streamlining Financial Processes and Providing Real Time Reporting
sponsored by Infor
WHITE PAPER: Discover how to address the growing gap between what a modern financial department should be able to and what they are actually able to accomplish with their current toolset. See detailed breakdowns of time spent, how to set a strategy, how to banish silos, and how to maximize ROI.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Trustwave Global Security Report
sponsored by Trustwave
WHITE PAPER: Understanding the motivations and resources of professional cybercriminals is key to defending against them. This report gives you an inside look at the business behind malware with stats from breach investigations around the world.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

Salesforce Shield for Healthcare
sponsored by Salesforce.com
WHITE PAPER: Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.
Posted: 14 Jul 2016 | Published: 14 Jul 2016

Salesforce.com

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Cloud Access Security Brokers Fill Critical Enterprise Void
sponsored by Palerra Inc.
EGUIDE: In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Cloud Security Automation: Are We Up To The Task?
sponsored by Palerra Inc.
EGUIDE: In this e-guide, learn how to bridge the divide between DevOps and security. Discover how to fix the security problems encountered when leveraging the agility of the cloud.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Cloud API and DR Questions Answered
sponsored by Hewlett Packard Enterprise
EGUIDE: APIs are the lifeline between enterprise applications within cloud environments and cloud disaster recovery is becoming a popular option as cloud adoption grows. In this e-guide, learn the answers to frequently asked questions about proper API and disaster recovery set up and management.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Hewlett Packard Enterprise

Guide to Common Cloud Computing Questions
sponsored by Hewlett Packard Enterprise
EGUIDE: This eGuide helps you address your organization's security needs and bust the most common cloud computing myths wide open by gaining an understanding of what cloud computing actually is and what it can deliver for your organization.
Posted: 09 Aug 2016 | Published: 08 Aug 2016

Hewlett Packard Enterprise

Unlocking the Hybrid Cloud Management and Security Puzzle
sponsored by BT
EGUIDE: Managing the hybrid cloud means covering all of your bases from having a solid cloud management strategy to security. This is especially important for financial organizations. In this e-guide, find out why a strong cloud security strategy is crucial to financial organizations and fundamentals to consider before adopting a hybrid cloud.
Posted: 04 Aug 2016 | Published: 27 Jul 2016

BT

The Cloud Development Potential of DevSecOps
sponsored by BMC
EGUIDE: Cloud computing may make for nimble production, but putting automation aloft turns security teams' stomachs. Discover what Gartner's Neil MacDonald, who coined the term "DevSecOps" back in 2012, has to say about integrating security teams into cloud-focused development cycles.
Posted: 03 Aug 2016 | Published: 31 Jul 2016

BMC

Secure Hosting Creates Foundation for Innovative Telemedicine
sponsored by BT
CASE STUDY: In this case study, you will learn how to employ a reliable communications service delivery partner that tailors exacting requirements for your data protection. Access now to examine fully redundant configuration that provides fail-safe availability, intrusion detection and prevention, managed backup, and more.
Posted: 29 Jul 2016 | Published: 31 Dec 2014

BT

Piecing Together the Hybrid Cloud Management Puzzle
sponsored by Softchoice Corporation
EGUIDE: Managing the hybrid cloud means covering all of your bases – from having a solid cloud management strategy to security. This e-guide takes a look at fundamental questions to consider before adopting a hybrid cloud.
Posted: 28 Jul 2016 | Published: 27 Jul 2016

Softchoice Corporation

The Cloud: Securing Your Enterprise both Before and After Migration
sponsored by Armor
EGUIDE: In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.
Posted: 26 Jul 2016 | Published: 25 Jul 2016

Armor

Security Tips for HIPAA-Compliant Cloud Storage and Texting
sponsored by Optum
EGUIDE: Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
Posted: 13 Jul 2016 | Published: 12 Jul 2016

Optum
151 - 175 of 1064 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement