Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
176 - 200 of 1124 Matches Previous Page  |  Next Page
What does cloud computing look like in 2016?
sponsored by ComputerWeekly.com
EGUIDE: Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

What does cloud computing look like in 2016?
sponsored by ComputerWeekly.com
EGUIDE: Through our own research and local interviews this guide uncovers some of the benefits the cloud brings to organisations in Australia/New Zealand.
Posted: 14 Aug 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Using Hybrid Cloud Strategy to Drive Business Value
sponsored by IBM
WHITE PAPER: 72% of businesses in the United States have adopted a cloud-first approach to new service deployment. This analysis outlines the business value of a hybrid cloud strategies and how advisors can help businesses realize that value. Take a look at the benefit of integrating a hybrid environment in the enterprise and what to look for in a provider.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Hybrid Cloud Is About Choice
sponsored by IBM
RESOURCE: Hybrid cloud computing integrates cloud resources with traditional IT infrastructure to ensure security, high performance, and accelerated application delivery. Discover how you can leverage hybrid cloud to become more agile and support new business models.
Posted: 10 Aug 2016 | Published: 08 Jul 2016

IBM

Flash-Accelerated and Cloud-Ready: New Storage Requirements for Enterprise Apps
sponsored by NetApp
WHITE PAPER: Hybrid cloud and flash storage is the new power couple in the IT world, but many still have questions regarding their compatibility. Discover Eric Burgener's answers to the top 5 questions posed by those critical of cloud-enabled flash, and learn how to reap the most benefits from this new fusion.
Posted: 10 Aug 2016 | Published: 31 Dec 2015

NetApp

Securing DevOps
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, adopters of DevOps and security, or DevSecOps, share tips on how to defend the cloud's continuous improvement model.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

SearchSecurity.com

Enterprise cloud applications – can we trust them?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

ComputerWeekly.com

Trustwave Global Security Report
sponsored by Trustwave
WHITE PAPER: Understanding the motivations and resources of professional cybercriminals is key to defending against them. This report gives you an inside look at the business behind malware with stats from breach investigations around the world.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

How Linux Containers Change the Development and Delivery of Applications
sponsored by Red Hat
WHITE PAPER: Discover how to adopt a cloud model for production and consumption of services to facilitate productive DevOps implementation using Linux containers. Read now to deliver the cloud through this container technology, and affect a cost-efficient means of delivering next-gen applications.
Posted: 18 Jul 2016 | Published: 18 Jul 2016

Red Hat

Virtual Workspace:Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: This feature white paper expands on some of the questions you may still have about finding the right workspace aggregator. It addresses some of the questions you may have about choosing the right workspace aggregator.
Posted: 12 Jul 2016 | Published: 12 Jul 2015

Matrix42

How to Craft SSO and IAM Strategies on the Cloud
sponsored by OneLogin
EGUIDE: Identity and access management play a critical role in your enterprise cloud security strategy but requirements need to be considered before jumping in. Uncover the requirements needed for a successful defense posture for your cloud security strategy and learn everything you need to know about Single Sign On (SSO) for the cloud.
Posted: 11 Jul 2016 | Published: 05 Jul 2016

OneLogin

Cybersecurity Moves Toward Hybrid Models
sponsored by Dell SecureWorks
WHITE PAPER: Discover why the older "all or nothing" kind of relationship between organizations and information security service providers is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Posted: 11 Jul 2016 | Published: 01 Jun 2016

Dell SecureWorks

Ansible In Depth: A Playbook for Complex IT Orchestration
sponsored by Red Hat
WHITE PAPER: Discover in this white paper an in-depth overview of IT configuration management, deployment, and orchestration tool Ansible, accessible for all skill levels and purpose-built for easily deploying workloads to public and on premise clouds.
Posted: 08 Jul 2016 | Published: 08 Jul 2016

Red Hat

Cloud Access Security Brokers Fill Critical Enterprise Void
sponsored by Palerra Inc.
EGUIDE: In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Cloud Security Automation: Are We Up To The Task?
sponsored by Palerra Inc.
EGUIDE: In this e-guide, learn how to bridge the divide between DevOps and security. Discover how to fix the security problems encountered when leveraging the agility of the cloud.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Cloud API and DR Questions Answered
sponsored by Hewlett Packard Enterprise
EGUIDE: APIs are the lifeline between enterprise applications within cloud environments and cloud disaster recovery is becoming a popular option as cloud adoption grows. In this e-guide, learn the answers to frequently asked questions about proper API and disaster recovery set up and management.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Hewlett Packard Enterprise

Guide to Common Cloud Computing Questions
sponsored by Hewlett Packard Enterprise
EGUIDE: This eGuide helps you address your organization's security needs and bust the most common cloud computing myths wide open by gaining an understanding of what cloud computing actually is and what it can deliver for your organization.
Posted: 09 Aug 2016 | Published: 08 Aug 2016

Hewlett Packard Enterprise

Unlocking the Hybrid Cloud Management and Security Puzzle
sponsored by BT
EGUIDE: Managing the hybrid cloud means covering all of your bases from having a solid cloud management strategy to security. This is especially important for financial organizations. In this e-guide, find out why a strong cloud security strategy is crucial to financial organizations and fundamentals to consider before adopting a hybrid cloud.
Posted: 04 Aug 2016 | Published: 27 Jul 2016

BT

The Cloud Development Potential of DevSecOps
sponsored by BMC
EGUIDE: Cloud computing may make for nimble production, but putting automation aloft turns security teams' stomachs. Discover what Gartner's Neil MacDonald, who coined the term "DevSecOps" back in 2012, has to say about integrating security teams into cloud-focused development cycles.
Posted: 03 Aug 2016 | Published: 31 Jul 2016

BMC

Secure Hosting Creates Foundation for Innovative Telemedicine
sponsored by BT
CASE STUDY: In this case study, you will learn how to employ a reliable communications service delivery partner that tailors exacting requirements for your data protection. Access now to examine fully redundant configuration that provides fail-safe availability, intrusion detection and prevention, managed backup, and more.
Posted: 29 Jul 2016 | Published: 31 Dec 2014

BT

Piecing Together the Hybrid Cloud Management Puzzle
sponsored by Softchoice Corporation
EGUIDE: Managing the hybrid cloud means covering all of your bases – from having a solid cloud management strategy to security. This e-guide takes a look at fundamental questions to consider before adopting a hybrid cloud.
Posted: 28 Jul 2016 | Published: 27 Jul 2016

Softchoice Corporation

The Cloud: Securing Your Enterprise both Before and After Migration
sponsored by Armor
EGUIDE: In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.
Posted: 26 Jul 2016 | Published: 25 Jul 2016

Armor

Security Tips for HIPAA-Compliant Cloud Storage and Texting
sponsored by Optum
EGUIDE: Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
Posted: 13 Jul 2016 | Published: 12 Jul 2016

Optum
176 - 200 of 1124 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement