Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
176 - 200 of 1225 Matches Previous Page  |  Next Page
Enable Visibility and Protection in the Cloud-Connected Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: How can you close visibility gaps in the cloud? Explore two cloud security strategies that can provide the visibility to help you block threats earlier, extend threat protection, and more.
Posted: 31 Jul 2017 | Published: 31 Jul 2017

Cisco Umbrella

Extend Your Threat Protection Beyond the Network Perimeter
sponsored by Cisco Umbrella
WHITE PAPER: Many security appliances can protect your employee devices from threats on the corporate network, but fall short when it comes to protecting employees working off the network. Learn about a cloud-based security platform that can uncover current and emerging internet threats everywhere your employees work.
Posted: 31 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Securing OUSD's Cloud Mission: Enabling Digital Citizenship and Compliance
sponsored by Cisco Cloudlock
CASE STUDY: The Oakland Unified School District (OUSD) wanted to use the cloud to provide the best possible educational experiences to their students. Find out how they overcame 4 primary cloud cybersecurity challenges to create access to key cloud-based educational apps.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Cisco Cloudlock

Case Study: How AMAG Pharmaceuticals Uses Cisco Cloudlock for Access Management
sponsored by Cisco Cloudlock
CASE STUDY: AMAG Pharmaceuticals, Inc., a publicly traded biopharmaceutical company, faced compliance and security challenges surrounding the company's IP. In this case study, learn how the IT team at AMAG implemented Cisco Cloudlock to protect their documents via access management, and improve upon compliance.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Cisco Cloudlock

SiliconANGLE Spotlight: HyTrust
sponsored by HyTrust
VIDEO: Join Eric Chiu, the founder and president of HyTrust, a security, compliance and control IT infrastructure company, to learn how this enterprise was founded, what it specializes in, and why you should care.
Posted: 27 Jul 2017 | Premiered: 27 Jul 2017

HyTrust

The state of DaaS in recent years: Challenges and use cases
sponsored by Nerdio
EGUIDE: In this e-guide, independent industry analysts Jack Madden and Gabe Knuth, discuss the state of the DaaS industry in recent years and examine how the technology has matured. They dive into the challenges and benefits of DaaS, as well as common use cases.
Posted: 26 Jul 2017 | Published: 21 Jul 2017

Nerdio

Tool Overview: HyTrust Multi-Cloud Security and Automated Compliance
sponsored by HyTrust
PRODUCT OVERVIEW: In this technology brief, learn about HyTrust Multi-Cloud Security and Automated Compliance, security software for a multi-cloud infrastructure. Discover key features and benefits, and how you can implement this tool for your own enterprise security.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Growing Up Hybrid: Accelerating Digital Transformation
sponsored by IBM
WHITE PAPER: Discover why comprehensive hybrid cloud integration forms the foundation on which digital business differentiation rests. Read on to learn to establish a firm presence in your industry, by developing a hybrid strategy that takes advantage of existing infrastructure investments and the flexibility of cloud.
Posted: 26 Jul 2017 | Published: 29 Feb 2016

IBM

A Buyer's Guide to Cloud Access Security Brokers
sponsored by Cisco Cloudlock
WHITE PAPER: Uncover a detailed examination of CASBs and 7 essential features to look for. Also learn about the current cloud threat landscape, 6 challenges to proxy-based CASB tools, and more.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

Cisco Cloudlock

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World
sponsored by HyTrust
WHITE PAPER: Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future?
Posted: 25 Jul 2017 | Published: 25 Jul 2017

HyTrust

The Explosion of Third-Party Apps: 27% are Risky
sponsored by Cisco Cloudlock
RESEARCH CONTENT: Of all the apps granted access to corporate systems last year, 27% of third-party apps were classified as high-risk. Learn more about the impact of Shadow IT, third-party apps, and cloud on security. Plus, uncover the top 10 risky apps and the top 10 most trusted ones.
Posted: 24 Jul 2017 | Published: 30 Jun 2016

Cisco Cloudlock

Secure Google Doc Sharing: Guardian News and Media Selects Cisco Cloudlock
sponsored by Cisco Cloudlock
CASE STUDY: Explore how the security team over at The Guardian mitigated the risk of sharing documents outside their domain and storing sensitive content in the cloud. Discover how they were able to enhance visibility into document sharing in Google Docs, control document permissions, receive exposure alerts, and more.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Cloudlock

The Rise Of The Secure Internet Gateway
sponsored by Cisco Umbrella
WHITE PAPER: The integration of cloud apps into the everyday business environment has made securing web access more difficult than ever. Click inside to find out how a Secure Internet Gateway (SIG), can help modern businesses secure user information across public and private cloud environments.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cisco Umbrella

Workspaces of the Future
sponsored by Citrix
WHITE PAPER: Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments.
Posted: 19 Jul 2017 | Published: 31 Aug 2016

Citrix

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

Building the Digital Workplace
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how your organization can benefit from a digital workspace with cloud-ready data, unified endpoint management, high quality user experience, improved security, and more.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

The Top Cyber Security Trends in ASEAN in 2017
sponsored by ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

Cloud Security: 6 Tips to Ensure Critical Data is Secure
sponsored by WinMagic
WHITE PAPER: With new legislation such as the EU's GDPR putting demands on your organization, how can you gain the visibility, efficiency, and real-time control to secure data in the cloud? Uncover 6 tips to improve cloud security and compliance.
Posted: 13 Jul 2017 | Published: 06 Jul 2017

WinMagic

Case Study: Virtual Environments and Endpoints Secured
sponsored by TrendMicro
CASE STUDY: In this case study, discover how Cancer Research UK secured more than 2,000 active users across physical machines, VMware virtual desktops and mobile devices.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TrendMicro

How to Gain Complete Protection for Cloud Workloads
sponsored by TrendMicro
WHITE PAPER: According to the Ponemon Institute, 36% of organizations' total IT and data processing requirements are met using cloud resources. Learn how to gain clear control over your cloud security and complete protection for cloud workloads.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TrendMicro

Protecting Corporate Information in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Leaders need to secure the aspects of the cloud they can control – identity and information – to protect their intellectual property. Access this white paper to learn the three keys to maintaining control of data security in the cloud.
Posted: 13 Jul 2017 | Published: 31 Jul 2015

Symantec & Blue Coat Systems

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.
176 - 200 of 1225 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement