Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
201 - 225 of 978 Matches Previous Page  |  Next Page
The secure use of cloud-based services
sponsored by ComputerWeekly.com
ANALYST REPORT: Attitudes to cloud-based services vary, but over time there has been increasing uptake as the benefits are recognised by more and more businesses. Those in the vanguard recognise that there is ground work to do; certain security measures must be put in place to enable safe use of cloud-based platforms and applications.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

ComputerWeekly.com

Four characteristics of top-notch big data cloud solutions
sponsored by IBM
WHITE PAPER: This white paper describes 4 characteristics of successful cloud-based, data-driven applications and explores the ways leading companies are gaining real-time insights from cloud technology and big data.
Posted: 31 Aug 2015 | Published: 31 Mar 2014

IBM

Accelerate Business Transformation Through IT Innovation: The IT Mandate
sponsored by Dimension Data
WHITE PAPER: This report serves as a comprehensive guide to examine how well enterprise-level companies are embracing a new model of business-responsive data centers and networks to support their innovation.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Dimension Data

10 Ways Cloud is Changing the World
sponsored by Global Knowledge
WHITE PAPER: The cloud revolution is truly a revolution - the way we work, learn and even play is very different now than it was just 10 or 15 years and will probably be a lot more different in 10 or 15 years. With this in mind, let's look at 10 ways the cloud will (and to a large degree already has) changed the world.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, you will discover the growing importance of data sovereignty and jurisdiction, how governments are responding to the questions of data privacy and what you must do to address regulatory requirements in your organization.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the complex issue of achieving data sovereignty without sacrificing the benefits of the cloud.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

IntraLinks, Inc

Developing, Deploying, and Monitoring Mobile Apps with the Cloud
sponsored by Oracle Corporation
WHITE PAPER: This white paper explores how you can streamline mobile application development with cloud services. Discover how to extend and secure your mobile apps, connect new mobile apps to existing integration and security services, deploy apps in the cloud while diagnosing performance and usage, and more.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Lab Validation Report: Cloud NAS for the Distributed Enterprise
sponsored by Nasuni Corporation
WHITE PAPER: This exclusive report tests a cloud NAS system and assesses its file data access and control, unlimited scalability, and built-in data protection and security. Read on to discover how NAS can synchronize your data files across multiple locations and streamline the infrastructure required to manage your enterprise's unstructured data at scale.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Nasuni Corporation

Getting to know you
sponsored by ComputerWeekly.com
ANALYST REPORT: The pressing need to effectively engage with outsiders has turned identity and access management (IAM) into a business priority, say analysts Bob Tarzey and Rob Bamford.
Posted: 10 Aug 2015 | Published: 10 Aug 2015

ComputerWeekly.com

How to Secure Your Ecosystem of Cloud-Based Apps
sponsored by MobileIron
WHITE PAPER: Most large organizations deploy or intend to deploy a broad range of mobile apps to their employees. This white paper reviews one app security model and how it can be leveraged to secure cloud-based productivity suites on mobile devices.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

MobileIron

Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015

CloudPassage

Don't Let Manual Processes Hold Up Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER: This white paper explores the challenges of cloud compliance and gives advice for meeting these challenges. Learn how you can make compliance simple, even in cloud and virtual environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Perimeter Security Can’t Protect Your Cloud Workloads
sponsored by CloudPassage
WHITE PAPER: Find out how you can avoid risk and gain complete visibility, no matter which cloud or virtual infrastructure you are using: public, private, hybrid, multi-cloud or virtualized data center. Learn how you can automate security and compliance for your infrastructure and feel confident you critical assets are protected.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Take Back Control with Centralized Cloud Management
sponsored by Dimension Data
WHITE PAPER: This expert white paper examines how IT can help organizations take back control of the cloud by aggregating multiple cloud solutions and centralizing cloud management.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

Dimension Data

How to Virtualize Disaster Recovery with Cloud Computing
sponsored by IBM
WHITE PAPER: This white paper outlines how your business can grow securely and thrive in the expanding data universe, bolstered by one enterprise-grade, cloud-enabled disaster planning platform. Access this white paper to learn more about how cloud-based business resilience can provide an alternative to traditional disaster recovery.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Leverage the Cloud to Lower Risk and Downtime
sponsored by IBM
WHITE PAPER: This white paper explores cloud strategies that can help you dramatically reduce risk and downtime. Learn how cloud resilience can ease the restoration of servers, apps and data, improve the security of data, and more.
Posted: 04 Sep 2015 | Published: 30 Sep 2014

IBM

An Integrated System for Your Business Needs
sponsored by IBM
WHITE PAPER: You need a strategy that integrates several business demands into one solution. Access this comprehensive white paper to learn about a tool that helps you achieve effective business process management, targeted analytics, high-quality mobile apps, and more.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

IBM

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Okta

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS

The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Addressing Remote and Endpoint Backup Challenges with the Cloud
sponsored by SearchDataBackup.com
EBOOK: This handbook provides you with an overview of challenges associated with remote data protection and the products available today to address them. Read on now to address your endpoint data protection concerns, as well as how to choose the right cloud endpoint backup products for your organization.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SearchDataBackup.com

Storage Magazine, August 2015
sponsored by SearchStorage.com
EZINE: Storage magazine's August 2015 issue explores building an on-prem cloud, looks at today's backup applications, and shares ways to improve the disaster recovery planning process.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchStorage.com

Learn How to Make File Sync and Share Fit Your Enterprise
sponsored by IBM
EBOOK: Download and discover how to evaluate enterprise file sync-and-share options with analyst insight and tips for successful implementation. Read on to learn more about the top five EFSS challenges, why it's time to redefine the market, and more.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

IBM
201 - 225 of 978 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement