Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
176 - 200 of 868 Matches Previous Page  |  Next Page
Delivering a Secure Foundation for the Cloud with RHEL
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how enterprises and cloud service providers can help resolve related security concerns by using Red Hat Enterprise Linux® as the guest operating system for their cloud workloads and as the underlying platform for their cloud infrastructure.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Red Hat

How One Software Solution Will Put Your Security and Restriction Concerns to Rest
sponsored by NetApp
WHITE PAPER: There is software that offers a single storage and data management platform enabling unrestricted and secure data movement across public and private clouds. Read this white paper for a more in depth look at the benefits that come with this software, including universal data platform, dynamic data portability, extensive customer choice, and more.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

NetApp

5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER: This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted: 12 Jun 2014 | Published: 31 May 2014

Dropbox for Business

The Truth About Cloud Security
sponsored by Dropbox for Business
WHITE PAPER: This white paper takes a look at a comprehensive approach to evaluating risks and compares the security pros and cons of on-premises and cloud-based file sharing services. Continue reading to learn if the cloud can keep your data safe, or if it's only making lofty promises.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

Dropbox for Business

Ten tips for judging, choosing cloud email service providers
sponsored by SearchCloudSecurity.com
EBOOK: A cloud-based service provider can save company money but will it compromise security? Learn how to migrate email to the cloud with the fewest risks and most benefits.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

SearchCloudSecurity.com

Craft a security policy for a cloud-based BYOD environment
sponsored by IBM
TECHNICAL ARTICLE: As the bring your own device (BYOD) movement gains popularity in the workplace, new security concerns arise. In this article, learn how to create a thorough, clear security policy for a cloud-based BYOD environment that includes RIM, Android, Apple, and Windows devices.
Posted: 10 Jul 2014 | Published: 10 May 2013

IBM

Chapter 3: Patching Security Holes in Private Clouds
sponsored by Dell and VMware
EZINE: Download chapter 3 of this 4-part expert e-zine to gain advice for patching the security holes in private clouds. Learn more about storage provisioning, perimeter security, data portability and much more.
Posted: 09 Jul 2014 | Published: 06 Jun 2013

Dell and VMware

ActivID® Authentication Appliance for Enterprise
sponsored by HID
BROCHURE: In this brochure, discover a solution that puts an end to your identity and authentication worries.
Posted: 07 Jul 2014 | Published: 20 Feb 2013

HID

Network Protection and UTM Buyer's Guide
sponsored by Sophos, Inc.
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Seven Keys to Securing Your Growing Business
sponsored by Sophos, Inc.
WHITE PAPER: This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.
Posted: 01 Jul 2014 | Published: 01 Oct 2013

Sophos, Inc.

Is There Value to Virtualization and Cloud Computing?
sponsored by Windstream Communications
WHITE PAPER: This informative whitepaper compares three top cloud providers and outlines how you can more effectively implement your cloud computing strategy.
Posted: 26 Jun 2014 | Published: 31 Jul 2013

Windstream Communications

2014 Cloud Guide: Insights for a Great Migration
sponsored by Windstream Communications
RESOURCE: This guide explores some trends in cloud computing and outlines why many businesses are moving to the cloud.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Windstream Communications

Respect User Privacy While Securing the Cloud and Mobile Devices
sponsored by BitGlass
WHITE PAPER: This white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

BitGlass

Secure Your Virtual and Cloud-Based Data Against Today's Security Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This IDC report shares critical tips on how to secure a blended IT environment featuring physical data centers and cloud computing.
Posted: 20 Jun 2014 | Published: 28 Feb 2014

Fortinet, Inc.

Examining Cloud Computing Threats and Mitigations
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide details the new threats that come with cloud computing and how you should deal with them.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

CenturyLink Technology Solutions

Best Practices for Cloud Computing and BYOD Security
sponsored by CenturyLink Technology Solutions
EGUIDE: This expert e-guide details why automation is the key to data security in the world of the cloud and BYOD.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

CenturyLink Technology Solutions

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

Strategy and Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This white paper offers key tips on how to extend identity and access management (IAM) to not only keep security consistent across on-premise and cloud environments, but to help reduce costs and improve efficiency as well.
Posted: 13 Jun 2014 | Published: 31 Dec 2013

CA Technologies.

AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
CASE STUDY: In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

BitGlass

Anypoint Platform Cloud Security & Compliance
sponsored by MuleSoft
WHITE PAPER: This white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

MuleSoft

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
TRANSCRIPT: This podcast transcript will detail the new security practices you need to put into place when you move to the cloud.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Trend Micro

Security Report: The Evolving State of Cloud Protection
sponsored by NaviSite, Inc.
WHITE PAPER: This in-depth report takes a look at the developments, trends, and other factors that have impacted how IT departments need to think about their cloud-based security.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

NaviSite, Inc.

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.
176 - 200 of 868 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement