Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
176 - 200 of 1103 Matches Previous Page  |  Next Page
Can a CASB Protect You from the 2016 Treacherous 12?
sponsored by Palerra Inc.
WHITE PAPER: Is a Cloud Access Security Broker (CASB) solution ideal for your enterprise's cloud security needs? Discover how CASBs provide a variety of advantages, uncover a step-by-step comparison of a CASB solution to the "Treacherous 12" threats identified by the Cloud Security Alliance, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

Palerra Inc.

Ansible In Depth: A Playbook for Complex IT Orchestration
sponsored by Red Hat
WHITE PAPER: Discover in this white paper an in-depth overview of IT configuration management, deployment, and orchestration tool Ansible, accessible for all skill levels and purpose-built for easily deploying workloads to public and on premise clouds.
Posted: 08 Jul 2016 | Published: 08 Jul 2016

Red Hat

Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
sponsored by OneLogin
WEBCAST: In this webinar Garrett Bekker, Senior Analyst for 451 Research explores the current state of identity management and discusses some of the emerging access control technologies that can help address these challenges.
Posted: 07 Jul 2016 | Premiered: Jun 1, 2016


Reducing Costs with the Right Cloud Connection
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Failing to choose a cost-effective network connection can leave you with poor performance that heavily impacts your use of cloud services. Access this white paper that explains how a cloud connection solution guarantees network security and performance for your business.
Posted: 07 Jul 2016 | Published: 31 Dec 2014

Level 3 Communications, Inc.

5 Signs Your Cloud Connection is Mission Critical Ready
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Is your cloud connection "mission-critical" ready? Access this infographic that provides 5 signs that your cloud connection is "mission-critical" ready and offers complete solutions if it isn't.
Posted: 07 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

10 Reasons You’re Ready for a Managed Cloud
sponsored by Armor
WHITE PAPER: There are many managed cloud services available, but only a small subset of those emphasize security and are, therefore, secure managed cloud services. Access this white paper that details 10 reasons your business is ready to employ a secure managed cloud service.
Posted: 07 Jul 2016 | Published: 01 Jun 2016


Improve Remote Monitoring and Management
sponsored by Autotask Corporation
WHITE PAPER: Discover 5 business advantages that can be obtained when addressing a solution towards remote monitoring and management (RMM) including policy-based management and support, superior cloud-based services, and more.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Autotask Corporation

Cloud-Based Facilities Management: Enhancing Productivity, Operational Efficiency, and Performance
sponsored by Infor
WHITE PAPER: This white paper provides a look at some of the trends effecting facilities management today and how you can become more efficient and dynamic in the face of new challenges. Learn how a cloud solution for facilities management can enable you to collaborate beyond boundaries securely, pull insights from chaotic data, and more.
Posted: 05 Jul 2016 | Published: 05 Jul 2016


Data Security for the Digital Businesses
sponsored by HPE and Intel®
VIDEO: How do you know if your data is secure? Uncover 3 questions that will help you determine the level of protection you need for managing sensitive information in mobile-, social media-, analytics-, and cloud-based environments.
Posted: 01 Jul 2016 | Premiered: 03 Feb 2016

HPE and Intel®

Firewall Deployment for Hybrid Cloud
sponsored by Palo Alto Networks
RESEARCH CONTENT: Your applications and data are an attacker's target, and protecting them in AWS introduces similar security challenges as in your on-premises network. Access this white paper for guidance on how to control and protect your apps with a virtualized firewall for AWS.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Palo Alto Networks

Cloud Agility with Performance
sponsored by Array Networks
WHITE PAPER: As enterprises adopt cloud and virtualization, many will deploy application delivery and security functions in cloud environments. Read this white paper that explains how to successfully deploy models for application delivery controllers and secure access gateways in cloud environments.
Posted: 28 Jun 2016 | Published: 02 May 2016

Array Networks

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Discovering the Private Cloud
sponsored by Stratoscale
EGUIDE: In this expert guide, discover the answer to five common questions most organizations have about the private cloud, including what is private cloud, really, does private cloud guarantee security, how can I optimize private cloud performance, and more.
Posted: 20 Jun 2016 | Published: 16 Jun 2016


Top Benefits of Private Cloud Automation
sponsored by Stratoscale
EGUIDE: In this essential resource, explore the top reasons to implement effective private cloud automation, and explore five automation tips that can ensure private cloud success.
Posted: 20 Jun 2016 | Published: 15 Jun 2016


EnerNOC Gains Visibility into AWS Environment, Turns Data into Real-Time Security Insights
sponsored by Splunk
CASE STUDY: Witness how EnerNOC, an energy intelligence software provider, enabled real-time visibility and security insights across their AWS environments. Discover how they were also able to triage and resolve security issues in real-time, mitigate risk of production outages, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016


New Cloud Networking Provides the Best of Both Worlds
sponsored by AT&T
PRODUCT OVERVIEW: Cloud networking can provide the best of both worlds: performance and security of your MPLS virtual private network coupled with the speed and capabilities. This white paper details how new cloud networking can provide benefits that simplify management, enable bandwidth flexing, and more.
Posted: 01 Jul 2016 | Published: 30 Jun 2016


Maximize Your VPN to Enhance Cloud Connectivity
sponsored by AT&T
WHITE PAPER: This white paper evaluates the impact of cloud on various enterprise applications; which is, in turn, driving the demand for secure private network connectivity to cloud. Also explained are the business benefits of deploying an integrated MPLS VPN and cloud solution.
Posted: 01 Jul 2016 | Published: 31 Mar 2016


Experts Predict Hottest AWS Features and Services For 2016
sponsored by Rackspace
EGUIDE: Some AWS features drew more attention than others in 2015. Customers turned to hybrid and multi-cloud models, cloud providers upped the ante on services, and new features rolled out to address the rising demand in server-less computing. In this e-guide, our experts answer a couple of questions on what to expect from AWS in 2016.
Posted: 30 Jun 2016 | Published: 29 Jun 2016


New AWS Migration Tools Target Big Data Behind a Firewall
sponsored by New Relic
EGUIDE: Amazon Web Services (AWS) recently added a multitude of capabilities to its public cloud that greatly reduce the data migration problem and decrease the fear of data breaches. This expert e-guide highlights all the new features of AWS that could soon be positively impacting your business.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

New Relic

Don't Leave Legacy Apps Behind during an AWS Migration
sponsored by New Relic
EGUIDE: The convenience and potential cost savings of AWS Elastic Compute Cloud is appealing, but the unknowns make many IT pros hesitate. Learn from this expert guide how to construct an AWS migration roadmap, and formulate a blueprint for understanding your apps to identify migration benefits and effect a smooth transition to AWS.
Posted: 22 Jun 2016 | Published: 21 Jun 2016

New Relic

When to Adopt the Lift-and-Shift Cloud Migration Model
sponsored by New Relic
EGUIDE: This e-guide looks at the different ways of migrating apps to the cloud: re-architecting and "lift and shift" and which path an individual apps should take. Not all apps are created the same, and figuring out the correct approach could save an enterprise time and money.
Posted: 22 Jun 2016 | Published: 21 Jun 2016

New Relic

How to Get Everyone On-Board with a Cloud Migration Project
sponsored by New Relic
EGUIDE: In this expert guide, discover five cloud benefits that may prove cloud migration naysayers wrong, including scalability and agility, visibility and governance, cost, and more.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

New Relic

Operational Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand the key security questions and other crucial concerns that'll ensure the select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 16 Jun 2016 | Premiered: May 1, 2016

Intel Security

IBM Security QRadar Incident Forensics
sponsored by IBM
WHITE PAPER: Discover a solution to ensure visibility and clarity into breach-related network activities. Uncover how to investigate malicious actions on your enterprise's network using holistically-drawn data, simplify the query process with a search engine-like interface, build new intelligence by labeling suspected content, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2014

176 - 200 of 1103 Matches Previous Page    6 7 8 9 10 11    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement