Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
176 - 200 of 1047 Matches Previous Page  |  Next Page
Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015

Imperva

Botnet Research Report
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This research report takes a closer look at botnets that are used to deploy malware, use cases to help you understand what you should expect from your network service providers, and the need for greater levels of partnership and collaboration across the security community to safeguard the Internet more effectively.
Posted: 07 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Backup and Disaster Recovery Plans Get Cloudy
sponsored by Dimension Data
WHITE PAPER: In this resource, you will explore a host of modern approaches to backup and disaster recovery, and learn how to move elements of your environment to the cloud and manage your hybrid IT infrastructure. Read on to gain and maintain visibility of your entire backup and disaster recovery environment.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

Dimension Data

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

Top 3 Cloud Trends to Watch in 2016
sponsored by Dimension Data
WHITE PAPER: This brief white paper takes a closer look at the top 3 cloud computing trends to watch in 2016. Access now to see where the cloud market is headed, and learn how you can leverage these trends in your IT infrastructure.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Dimension Data

What Public and Hybrid Clouds Offer in the Cloud Market
sponsored by SimpliVity
EGUIDE: Public cloud adoption has grown significantly over the past few years, as even the most skeptical IT pros admit the technology is right for certain use cases. This exclusive e-guide details the benefits and drawbacks of both public cloud and hybrid cloud adoption.
Posted: 25 Feb 2016 | Published: 18 Feb 2016

SimpliVity

How to Build a Successful Hybrid Cloud Computing Model
sponsored by SimpliVity
EGUIDE: Hybrid clouds are becoming increasingly popular and projections indicate that many enterprises will be reviewing and/or adopting hybrid cloud deployments this year. Access this guide to learn about three key functions to consider and how to build the most effective hybrid cloud for your enterprise.
Posted: 24 Feb 2016 | Published: 19 Feb 2016

SimpliVity

Linux and Cloud Transform Business-Critical Application Development
sponsored by IBM
PRODUCT OVERVIEW: In this resource, you will discover how your IT can leverage the LinuxONE platform to deliver unparalleled system uptime, data security, and superior QoS—supporting superior business agility. Read on to glean why this platform is most effective for database and high-I/O workloads.
Posted: 03 Mar 2016 | Published: 31 Aug 2015

IBM

Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE: This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight

How to Manage Cloud Resources from the Data Center
sponsored by Rackspace
EGUIDE: This exclusive e-guide provides essential points every hybrid cloud management strategy should follow. Next, learn why hybrid cloud deployments are becoming the future cloud model for enterprises.
Posted: 01 Mar 2016 | Published: 25 Feb 2016

Rackspace

Piecing Together the Hybrid Cloud Management Puzzle
sponsored by Rackspace
EGUIDE: This exclusive e-guide provides a closer look at how you can develop a strong hybrid cloud strategy that accelerates performance and boosts security. Uncover expert answers to common questions on hybrid cloud adoption and management.
Posted: 01 Mar 2016 | Published: 25 Feb 2016

Rackspace

Evaluating the Expanding Cloud Access Security Broker Market
sponsored by Blue Coat Systems
EGUIDE: In this expert e-guide, learn how the CASB market is evolving and what to look for in a CASB. Also inside, discover a helpful evaluation guide and review one platform in particular to find out how it measures up.
Posted: 01 Mar 2016 | Published: 10 Feb 2016

Blue Coat Systems

Vulnerability Scanning Tips and Tricks
sponsored by Alert Logic
WHITE PAPER: This white paper teaches you the importance of performing regular scans to identify and reduce vulnerabilities. This is you guide to ensure your scans successfully complete and report properly.
Posted: 24 Feb 2016 | Published: 20 Aug 2015

Alert Logic

Vulnerability Response Best Practices
sponsored by Alert Logic
WHITE PAPER: This white paper gives you a step-by-step approach in responding to vulnerabilities with examples of breaches throughout. Learn how to prepare you network for an attack and how to lessen the potential for security flaws in your network.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Alert Logic

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic

Understanding Cloud Security: The AWS Shared Responsibility Model
sponsored by Alert Logic
RESOURCE: This white paper discusses the different responsible entities required to maintain strong enterprise cloud security.
Posted: 22 Feb 2016 | Published: 27 Jan 2016

Alert Logic

4 Tips to Secure your Saas Environment
sponsored by Alert Logic
WHITE PAPER: This white paper gives you four tips that SaaS providers need to keep in mind at all times to keep their security ahead of the game and make sure your SaaS app delivers the value and safety your customers demand.
Posted: 19 Feb 2016 | Published: 27 Jan 2016

Alert Logic

The Anatomy of an Attack
sponsored by Alert Logic
RESOURCE: This infographic describes different types of attacks and how exactly they are implemented. Learn how to secure your vulnerabilities and keep a look out for all the described attacks.
Posted: 19 Feb 2016 | Published: 29 Jan 2016

Alert Logic

How to Tackle Hybrid Cloud Challenges and Construct a Solid Governance Strategy
sponsored by Presidio
EGUIDE: This e-guide highlights expert tips on tackling hybrid cloud challenges surrounding security and compliance, account management and billing, and resource provisioning. Read on to learn how your enterprise can take advantage of public cloud by implementing a reliable, compliant hybrid cloud strategy.
Posted: 18 Feb 2016 | Published: 08 Feb 2016

Presidio

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

7 Best Practices of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper give you steps you should take and point of interest you should review in your network security.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Alert Logic

The Need-to-Know of Today's Cloud Security
sponsored by SearchCloudComputing.com
EBOOK: In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

SearchCloudComputing.com

The Making of a Cloud Security Culture
sponsored by TrendMicro
EGUIDE: This e-guide emphasizes the importance of cultivating a cloud security culture and discusses the key benefits and differences between public and hybrid cloud. Access now to learn how your organization can achieve a secure cloud environment.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

TrendMicro

Find the Right EFSS to Secure Employee File Sharing
sponsored by TrendMicro
EGUIDE: This e-guide gives you a way to solve your enterprise file synchronization and sharing needs.
Posted: 16 Feb 2016 | Published: 10 Feb 2016

TrendMicro
176 - 200 of 1047 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement