Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
176 - 200 of 1110 Matches Previous Page  |  Next Page
The Ultimate Guide to Windows Server 2016
sponsored by Microsoft
WHITE PAPER: This is your ultimate guide to Windows Server 2016. Read on to drive your organization forward with new layers of security, data center efficiency, and agility in app development by learning to build cloud-native and hybrid apps, improve server density with software-defined infrastructure, and more.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

Microsoft

Protecting and Empowering your Connected Organization
sponsored by Microsoft
WHITE PAPER: This white paper explores how Microsoft Enterprise Mobility + Security helps protect your data in a cloud-first world. Learn how EMS can help you restrict and monitor user identities, receive security updates with an easy-to-read attack timeline, enable users to update passwords via a single portal, and more.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Microsoft

Enhance AWS Security with Splunk Solutions
sponsored by Splunk
WHITE PAPER: In this white paper, uncover why security should not be amongst chief concerns when adopting cloud services. Read on to find out how when paired with the right analytics tool, cloud services can be the foundation for a relentless defense against the future threat landscape.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

Splunk

How Can You Gain A Real-Time Comprehensive View of your Business Operations?
sponsored by NetSuite
WHITE PAPER: Access this white paper to discover how to gain a comprehensive, real-time view of your business operations. All it takes is a single integrated software platform. You'll learn how to deploy and customize a cloud-based platform, automate processes, and much more.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

NetSuite

The Value of Cloud Applications in Manufacturing
sponsored by Infor
WHITE PAPER: Manufacturers held off on accepting cloud technology as long as they could, but are now adopting it. This vendor-neutral white paper takes a look at how manufacturers are adopting cloud applications, the key business benefits cloud provides, the challenges being faced, and more.
Posted: 12 Oct 2016 | Published: 29 Jul 2016

Infor

IT Relations: HR Manager
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: HR and IT departments have begun to work closely together over the last few years. While HR historically has often received limited attention, companies now understand the key role the department plays in the business. Consequently, companies are heavily investing in HR technology, particularly by moving their HR systems to the cloud.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

ComputerWeekly.com

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

Staying Secure in the Cloud Is a Shared Responsibility
sponsored by evident.io
ANALYST REPORT: The increasing popularity of public clouds requires CISOs to develop effective security strategies to ensure proper levels of security for enterprise operations within the public cloud. This Gartner report provides clear guidelines for defining and allocating responsibility for security planning and operations in IaaS, PaaS and SaaS environments.
Posted: 03 Oct 2016 | Published: 07 Apr 2016

evident.io

Data Warehousing in the Cloud: An Essential Adoption Checklist
sponsored by IBM
RESOURCE: Discover how to glean greater business value from your data by utilizing a cloud-based data warehouse. Uncover a 7-point checklist that will facilitate easy adoption, including instructions on how to meet consistent performance requirements and proactively manage data connectivity.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

IBM

How healthcare benefits from cloud-delivered security
sponsored by Cisco Umbrella
WHITE PAPER: By utilizing the cloud for healthcare, you can enhance security today while ensuring scalability into the future. Learn how to combat malware, ransomware and other threats that impact patient well-being and best come into regulatory compliance with the cloud.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Cisco Umbrella

Live Webinar: Cloud Management Platforms-The State of the Market in 2016 and Beyond
sponsored by Embotics
WEBCAST: In this upcoming webinar the VP of 451 Research and the EVP of Products at Embotics dissect the findings of 451's cloud management platform (CMP) market study of technology buyers at 166 US enterprise. Learn the growing need for a CMP, factors to consider when deciding to move to a CMP, and how to ensure successful deployment in your organization.
Posted: 28 Sep 2016 | Premiered: Oct 5, 2016

Embotics

Enterprise Cloud for Dummies
sponsored by Nutanix
EBOOK: This "For Dummies" e-book explores the concept of enterprise cloud – which carries public cloud support and characteristics – to meet critical business needs. Find out how to implement a powerful strategy to create frictionless IT and enable end users to gain the benefits of the public cloud without assuming the associated level of risk.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Nutanix

Securing Traditional and Cloud-based Data Centers with Next-gen Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Analysts Reveal how to Secure SaaS
sponsored by Palo Alto Networks
WHITE PAPER: This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Cloud Migration Checklist: The Enterprise Guide
sponsored by Attenda
EGUIDE: Migrating an enterprise's data and applications to the cloud includes a laundry list of considerations – from tools and costs to security. Learn six tasks that should be included on your checklist to ensure a successful cloud migration strategy.
Posted: 25 Oct 2016 | Published: 21 Oct 2016

Attenda

Where the 'Edge' and the Cloud Collide: Lessons Learned from Public Cloud Deployment and IoT
sponsored by Hewlett Packard Enterprise
EGUIDE: As lock-in concerns become less prevalent, public cloud adoption continues to rise; however, organizations find that some workloads are best left in-house. Discover the boons and challenges associated with public cloud deployment, and additionally learn how to leverage it to eliminate latency and increase response times for IoT apps.
Posted: 24 Oct 2016 | Published: 19 Oct 2016

Hewlett Packard Enterprise

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware

How to Segment Cloud Workloads for Better Security
sponsored by IBM
EGUIDE: Enterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

Getting a Grip on Content: Empowered Content Collaboration in the Cloud
sponsored by IBM
RESOURCE: Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.
Posted: 19 Oct 2016 | Published: 31 Dec 2015

IBM

DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE: In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

Radware

Masergy's Unified Enterprise Security Solution
sponsored by MASERGY
WHITE PAPER: This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

MASERGY

The Rise of Cloud-based Application Security Vulnerabilities
sponsored by Symantec + Blue Coat
EGUIDE: While it can be beneficial to store app data in the cloud, it's causing many security concerns because of the sensitive nature of the information. Explore this e-guide to learn common vulnerabilities in cloud-based apps and best practices for properly protecting app data.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

Symantec + Blue Coat

How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE: Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

Dell Software

How to Mitigate Shadow Cloud Services Security Risks
sponsored by IBM
EGUIDE: Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Which Cloud Security Certifications Should Providers Have?
sponsored by Hewlett Packard Enterprise
EGUIDE: With numerous security standards and certifications available, evaluating a cloud provider can be tricky. In this e-guide, IT author and systems architect Dan Sullivan explains what to look for during evaluation and how specific certifications can meet your overall security portfolio.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Hewlett Packard Enterprise
176 - 200 of 1110 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement