Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
151 - 175 of 1038 Matches Previous Page  |  Next Page
Improving with Cloud
sponsored by Big Switch Networks
PRODUCT REVIEW: This review showcases how one emerging technology is overcoming many of the bigger challenges facing the future of cloud and network technology.
Posted: 06 Apr 2016 | Published: 26 Aug 2015

Big Switch Networks

Innovative Cloud-Based SIEM Deployment Delivers Actionable Security Intelligence
sponsored by Splunk
CASE STUDY: This case study explores how Equinix, a global cloud interconnection provider, overcame security blind spots and the burden of manually extracting and correlating data by turning to cloud-based SIEM.
Posted: 06 Apr 2016 | Published: 24 Feb 2016

Splunk

A Balanced Approach to Cloud Storage
sponsored by Cloudian
WHITE PAPER: This white paper highlights the advantages of leveraging a hybrid cloud solution that enables enterprises to benefit from the cost-efficiency and capacity of a public cloud and the security of a private cloud. Access now to see how balancing your cloud storage can enable your enterprise to keep the hard and soft costs of cloud under control.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

Cloudian

Cloud Connectivity and Colocation for Your Enterprise Data Center
sponsored by CyrusOne
WHITE PAPER: Discover how to deliver flexible cloud-connectivity service to your data center seamlessly and immediately through a single port, and implement successfully scaled, cloud-enabled colocation.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

CyrusOne

Provide a Unified, Coherent Developer Experience using Cloud-based Identification
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide teaches you about a centralized security tier to enable single sign-on across multiple enterprise, partner and cloud services. Learn how to create a cloud gateway to access applications running across multiple back ends so developers spend less time implementing new security frameworks for each service.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Top 5 Considerations in Transitioning to SDN for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Software-defined networking is an important enabling technology for the digital workplace. By the end of 2020, it is expected to impact about 80% of network purchase decisions. Access this white paper to explore the top five factors you should consider as you transition to SDN.
Posted: 29 Mar 2016 | Published: 23 Mar 2016

Aruba Networks

How to Build a Formal Hybrid Cloud Strategy to Prevent Cloud Chaos
sponsored by Dimension Data
EGUIDE: This e-guide highlights discussions from the 2015 Hybrid Cloud Summit regarding managing, integrating, and securing hybrid cloud infrastructures. Read on to learn how you can build a formal hybrid cloud strategy with governance and management tools, such as API governance tools, provider-native governance and management tools, and more.
Posted: 28 Mar 2016 | Published: 25 Mar 2016

Dimension Data

Locking up the Cloud with IAM
sponsored by SearchCloudSecurity.com
EBOOK: In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
Posted: 25 Mar 2016 | Published: 18 Mar 2016

SearchCloudSecurity.com

Today's Most Valuable Commodity is Located in Cyberspace
sponsored by Digital Guardian
EGUIDE: This e-guide teaches you about current cloud security trends and how hackers are adapting their methods to steal your business data. Continue reading to inform your organization about cloud attacks and adapt countermeasures to respond accordingly.
Posted: 24 Mar 2016 | Published: 22 Mar 2016

Digital Guardian

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 24 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

Cloud: The New Way to Get Things Done
sponsored by Microsoft
WHITE PAPER: Access this comprehensive infographic to explore ways the cloud can help organizations do their best work regardless of location, and make better decisions.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Microsoft

Achieve Compliance and Cost Control
sponsored by Matrix42
WHITE PAPER: Cloud computing, in spite of being only about ten years old, continues to gain market share in the enterprise. Analyst house Market Research Media estimates that the global cloud computing market will grow at a 30% CAGR, reaching $270 billion in 2020.
Posted: 18 Mar 2016 | Published: 29 Dec 2015

Matrix42

Network-based Security: Global Visibility is the Difference
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Point security solutions aren't enough to keep up with increasingly diverse and sophisticated cyberthreats. Access this brief resource to learn how a network-based security strategy can detect threats and stop them before they affect your business.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Your Cloud Success Requires Network Strength
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This short resource discusses how you can adapt your network strategy to leverage the strength of hybrid clouds while more effectively protecting your business-critical applications.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Level 3 Communications, Inc.

Experts Weigh in on Network Segmentation Best Practices
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Experts weigh in on the improved security and simplified administration microsegmentation promises in this e-guide. It appears to be the next logical step to securing your data, but will it deliver once the hype dies down?
Posted: 14 Mar 2016 | Published: 29 Feb 2016

NTT Com Security (UK) Ltd

Plugging the Security Gaps of Cloud File Sharing Services
sponsored by Imperva
WHITE PAPER: This paper examines seven items to consider when it comes to security and compliance of cloud file sharing services and how you can mitigate the risks with a Cloud Access Security Broker (CASB) solution.
Posted: 14 Mar 2016 | Published: 17 Feb 2016

Imperva

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015

Imperva

Botnet Research Report
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This research report takes a closer look at botnets that are used to deploy malware, use cases to help you understand what you should expect from your network service providers, and the need for greater levels of partnership and collaboration across the security community to safeguard the Internet more effectively.
Posted: 07 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Backup and Disaster Recovery Plans Get Cloudy
sponsored by Dimension Data
WHITE PAPER: In this resource, you will explore a host of modern approaches to backup and disaster recovery, and learn how to move elements of your environment to the cloud and manage your hybrid IT infrastructure. Read on to gain and maintain visibility of your entire backup and disaster recovery environment.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

Dimension Data

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Top 3 Cloud Trends to Watch in 2016
sponsored by Dimension Data
WHITE PAPER: This brief white paper takes a closer look at the top 3 cloud computing trends to watch in 2016. Access now to see where the cloud market is headed, and learn how you can leverage these trends in your IT infrastructure.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Dimension Data

Greencore Cloud Case Study: Taking a Bite out of Operational Cost & Business Risk
sponsored by Adapt Services
CASE STUDY: In this case study, discover how Greencore decided to outsource its IT infrastructure to Adapt, gained a customized, consistent application ecosystem, and experienced a number of other benefits, including: a 25% reduction in data center costs, increased performance, security, and availability, acquisition-friendly infrastructure, and more.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

Adapt Services

Cloud Security Gateways Rise to the Data Loss Challenge
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine we look at cloud data loss prevention (DLP), the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection for enterprise data.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SearchSecurity.com

Linux and Cloud Transform Business-Critical Application Development
sponsored by IBM
PRODUCT OVERVIEW: In this resource, you will discover how your IT can leverage the LinuxONE platform to deliver unparalleled system uptime, data security, and superior QoS—supporting superior business agility. Read on to glean why this platform is most effective for database and high-I/O workloads.
Posted: 03 Mar 2016 | Published: 31 Aug 2015

IBM

Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE: This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight
151 - 175 of 1038 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement