Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
201 - 225 of 1063 Matches Previous Page  |  Next Page
Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.

How to Build a Private Cloud: A Step-by-Step Guide
sponsored by Stratoscale
WHITE PAPER: Discover a step-by-step guide on how to architect a private cloud for your organization. Read on to ensure your private cloud meshes with existing DevOps automation approaches and to build a cloud that meets your specific workload requirements.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Stratoscale

Innovation and Choice for Meditech
sponsored by Pure Storage
WHITE PAPER: Businesses have been stuck in clumsy storage cycle, pushing organizations to check out cloud based options. But these are limited by strict regulations of data security-control. You may need is a cloud-like cost model with the security of an onsite solution. Read this white paper to learn about one such solution.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Pure Storage

McKenna Long & Aldridge Chose Masergy's Managed Cloud Networking
sponsored by MASERGY
WEBCAST: With these Managed Cloud Networking solutions, the firm could open new offices quicker than ever before. Learn how you can leverage analysis tools to monitor network traffic and application usage patterns to gain predictive insights for strategic IT initiatives.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

Wireless Security Survey
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

Security Solutions for Mobile Users in the Workplace
sponsored by HID
EBOOK: This e-book describes the security landscape for mobile devices and how you can improve the user experience on mobile devices while still protecting your assets and managing costs efficiently.
Posted: 07 Jun 2016 | Published: 31 Dec 2015

HID

Intermedia Builds an Instant Security Operations Center and Speeds Business Processes
sponsored by Splunk
CASE STUDY: This case study demonstrates how Intermedia overcame its cloud security challenges and boosted productivity with data-driven analytics and incisive, enterprise-wide intelligence.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Splunk

Gatwick Airport Drives Security Efficiency with SIM Cloud Platform
sponsored by Splunk
WEBCAST: Discover how Gatwick Airport utilized the cloud to drive secure operational efficiency and gain a real-time view of the performance of terminals and the airfield. Learn how to utilize the cloud to soar to success with superior and secure business performance.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Splunk

An Office 365 Expert Debate: New Cloud, New Risks
sponsored by Mimecast
RESOURCE: This resource features an expert debate on the risks of Office 365. View now and you'll also have access to a demo on ways to enjoy economic cloud advantages while sidestepping cybercrimes.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Mimecast

4 Tips for HIPAA-Compliant Cloud Storage
sponsored by Pure Storage
EGUIDE: Healthcare cloud storage requires more layers of data security and compliance strategies, making some CIOs reluctant to engage the services of third parties. But in this e-guide, find 4 key tips to evaluate cloud storage vendors to ensure patient data protection and HIPAA compliance.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

What CIOs Need to Know About IoT and Security Risks
sponsored by MASERGY
ANALYST REPORT: Businesses that already have IoT initiatives have seen increased revenue around 16% last year in the areas of business affected by the effort, according to a recent study. Still, as enticing as these prospects are the question that CIOs must ask are: How secure are IoT sensors and networks?
Posted: 27 May 2016 | Published: 21 Oct 2015

MASERGY

One Firewall Brand Decreases Complexity, Not Security
sponsored by Fortinet, Inc.
WHITE PAPER: This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universal network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Forward Thinking Backup Through Unified Data Protection
sponsored by Veritas
WHITE PAPER: This white paper highlights a unified backup and recovery solution that manages workloads on multiple physical, virtual, and cloud platforms. Read on to see how this converged platform can enable your enterprise to manage and protect mixed workloads across your enterprise and reduce administration and infrastructure costs.
Posted: 18 May 2016 | Published: 18 May 2016

Veritas

How Equinix Deploys an Effective Cloud-based SIEM
sponsored by Splunk
WEBCAST: Discover ways one company's cloud-based SIEM delivers instant access to advanced security analytics, valuable context, and detailed insights.
Posted: 17 May 2016 | Premiered: May 17, 2016

Splunk

AAA WCNY Optimizes Roadside Assistance, Delivers Physical and Network Security
sponsored by Splunk
CASE STUDY: Discover how to achieve full operational visibility into your network security and firewall traffic. Learn how AAA Western and Central New York leveraged cloud to monitor their VPN, enhance PCI compliance, and deliver superior customer service—all not possible without its secure network.
Posted: 17 May 2016 | Published: 17 May 2016

Splunk

Securing Productivity in the Borderless Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016

Microsoft

Industry Expert FAQ: How Can IT Help Mitigate Security Risks?
sponsored by Juniper Networks, Inc.
ANALYST BRIEF: This white paper shares insights from industry expert Jennifer Blatnik as she discusses how IT best mitigates security risks. Learn what she believes are the top network security threats today and how to best address cloud security issues.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security

Windows 10, EMM, and the Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: Enterprise mobility management (EMM) is one big key to unlocking mobility's full potential. We had previously required a variety of solutions to deal with every aspect of mobile management. Now there is an EMM solution that does it all. Read on to learn more about EMM and this simplifying solution.
Posted: 03 Jun 2016 | Published: 31 May 2016

MobileIron

Extending Your IT Infrastructure to the AWS Cloud
sponsored by Amazon Web Services
VIDEO: Find out how you can seamlessly and securely integrate cloud resources into your existing IT infrastructure. You'll learn how you can benefit from adopting a hybrid cloud architecture.
Posted: 02 Jun 2016 | Premiered: 13 Feb 2013

Amazon Web Services

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Assessing the Risk: Yes, the Cloud Can Be More Secure Than Your On-Premises Environment
sponsored by Amazon Web Services
WHITE PAPER: Discover cloud security myths and a framework for assessing risk while comparing existing complex data center environments with new architectures in the cloud. You'll also learn three factors that contribute to cloud risk and security decisions.
Posted: 23 May 2016 | Published: 31 Jul 2015

Amazon Web Services

The Intricacies of Securing Data in the Cloud and How to Implement Policies Successfully
sponsored by Intel
EGUIDE: This e-guide helps you put together a cloud security policy for your organization as your business practices rely more heavily on cloud storage. Access now for help with creating policies for storing and securing different data types, authorizing who can migrate data and choosing which applications can access your data.
Posted: 17 May 2016 | Published: 09 May 2016

Intel

Office 365: Upgrading Enterprise Security
sponsored by Symantec Corporation
WHITE PAPER: You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.
Posted: 13 May 2016 | Published: 29 Feb 2016

Symantec Corporation

TechTarget's Top 6 Security Measures for the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.
201 - 225 of 1063 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement