Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
201 - 225 of 1101 Matches Previous Page  |  Next Page
IT Relations: HR Manager
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: HR and IT departments have begun to work closely together over the last few years. While HR historically has often received limited attention, companies now understand the key role the department plays in the business. Consequently, companies are heavily investing in HR technology, particularly by moving their HR systems to the cloud.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

ComputerWeekly.com

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

TDWI Checklist Report: Data Warehousing in the Cloud
sponsored by IBM
RESOURCE: Could you be gaining greater business value from your data by utilizing a cloud-based data warehouse? Uncover a 7-point checklist that will facilitate easy adoption, including instructions on how to meet consistent performance requirements and proactively manage data connectivity.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

IBM

How healthcare benefits from cloud-delivered security
sponsored by Cisco Umbrella
WHITE PAPER: By utilizing the cloud for healthcare, you can enhance security today while ensuring scalability into the future. Learn how to combat malware, ransomware and other threats that impact patient well-being and best come into regulatory compliance with the cloud.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Cisco Umbrella

Embrace risk: secure your hybrid cloud Protected to innovate with the right mix
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to remove the risky barriers to digital innovation by determining the right mix of hybrid cloud for your IT infrastructure strategy. Access the freedom and flexibility cloud offers by learning 3 security-first principles that will ensure your hybrid cloud is as productive as it is secure and compliant.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Hewlett Packard Enterprise

The Right Mix: Developing the Right Hybrid IT Infrastructure
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover how to formulate the right hybrid IT infrastructure to meet the needs of your apps, services, and enterprise. Access now to learn the formula for achieving the optimal mix of traditional IT, private cloud, and public cloud services.
Posted: 26 Sep 2016 | Published: 31 Jul 2016

Hewlett Packard Enterprise

Securing Traditional and Cloud-based Data Centers with Next-gen Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Analysts Reveal how to Secure SaaS
sponsored by Palo Alto Networks
WHITE PAPER: This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Questions to Ask Your Cloud Service Provider: Know how your Data will be Protected in the Cloud
sponsored by McAfee, Inc.
WHITE PAPER: As you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

McAfee, Inc.

Hybrid Cloud workloads: The Essential Guide
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Debate continues to rage within the enterprise about the long-term benefits of adopting a hybrid cloud method of IT consumption. This Essential Guide shows everything the enterprise needs to know.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

ComputerWeekly.com

How To Easily Start Your Implementation Planning for Office 365
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how effective planning can ease your organization's adoption of Office 365. Uncover a comprehensive step-by-step to build your cloud "to-do" list: making sure you address what access controls need to be considered, what service characteristics there will be, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Symantec & Blue Coat Systems

What to Look for in Cloud Access Security Brokers
sponsored by SearchCloudSecurity.com
EBOOK: This guide helps IT professionals choose the best CASB for their enterprise by explaining how CASB technology works, and giving advice on assessing vendor products.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

SearchCloudSecurity.com

Cloud's Role in Developing a Cohesive DevOps Plan
sponsored by SearchITOperations
EBOOK: To achieve continuous delivery, organizations can now incorporate DevOps into a cloud strategy. Access this handbook to get an overview of strategies for establishing a DevOps model and how DevOps differs from the traditional processes of application development.
Posted: 01 Sep 2016 | Published: 01 Sep 2016


How to Secure Cloud Applications & Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: In this executive guide, uncover everything you need to know to transition to the cloud seamlessly. Learn about incident response and threat detection, compliance and data privacy, selecting a CASB solution, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Symantec & Blue Coat Systems

A Guide to Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: Access this white paper for tips on how you can safely adopt Office 365. Learn where Office 365 fails to protect your organization and how to mitigate those shortcomings to prevent data exposures, safeguard against unauthorized user activity, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Symantec + Blue Coat

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This guide takes you through the 11 steps that enterprises can take to optimize the benefits of cloud applications, while mitigating the risks inherent in adoption.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Symantec & Blue Coat Systems

How to Mitigate Shadow Cloud Services Security Risks
sponsored by IBM
EGUIDE: Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Which Cloud Security Certifications Should Providers Have?
sponsored by Hewlett Packard Enterprise
EGUIDE: With numerous security standards and certifications available, evaluating a cloud provider can be tricky. In this e-guide, IT author and systems architect Dan Sullivan explains what to look for during evaluation and how specific certifications can meet your overall security portfolio.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Hewlett Packard Enterprise

Nucleus Research Guidebook: Benefits of Cloud-Based SIEM
sponsored by IBM
RESOURCE: In this Nucleus Research guidebook, learn how deploying a cloud-based security information and event management (SIEM) tool can help you achieve strong security while keeping costs down.
Posted: 19 Sep 2016 | Published: 31 Aug 2016

IBM

The Rise of Cloud-Based Application Security Vulnerabilities
sponsored by Onapsis
EGUIDE: This e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.
Posted: 12 Sep 2016 | Published: 06 Sep 2016

Onapsis

How to Secure Azure and Recover From the Worst Disasters
sponsored by Softchoice Corporation
EGUIDE: In this e-guide, expert Rob Shapland breaks down how two new Microsoft Azure features aim to boost cloud security for enterprises. Learn how to keep Azure secure and keep your business going if disaster strikes and the worst is realized.
Posted: 08 Sep 2016 | Published: 07 Sep 2016

Softchoice Corporation

Deepen Visibility into Cloud and Hybrid IT with Unified Infrastructure Management
sponsored by CA Technologies
WHITE PAPER: Learn why it's recommended your organization extends the visibility of existing infrastructure tools with a unified, hybrid IT monitoring platform—providing visibility into traditional and next-generation technologies. Read on to take a unified approach to IT ops, and monitor all hybrid cloud, software-defined, and converged environments.
Posted: 07 Sep 2016 | Published: 30 Jun 2016

CA Technologies

Cloud Services Take Off, GRC Doesn't
sponsored by SearchSecurity.com
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

SearchSecurity.com

The Case for Security Intelligence Services, Hosted from the Cloud
sponsored by IBM
WHITE PAPER: Discover how to utilize the cloud to automatically detect and respond to threats across your network. Collect, correlate and analyze information from across data silos to give you deep visibility of both cloud and on-premises infrastructure to keep your organization ahead of the latest threats.
Posted: 30 Aug 2016 | Published: 01 Apr 2015

IBM
201 - 225 of 1101 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement