Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
201 - 225 of 824 Matches Previous Page  | Next Page
The Benefits of an Integrated Approach to Security in the Cloud
sponsored by IBM
WHITE PAPER: This guide explores the role of growing cloud computing and various security models that can protect your cloud services.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

IBM

Managing Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data.
Posted: 18 Feb 2014 | Published: 31 Dec 2011

IBM

Security Intelligence is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: This guide explores a unique security intelligence platform and how it can secure your cloud.
Posted: 18 Feb 2014 | Published: 31 Oct 2013

IBM

Optimizing Mobility in Cloud Environments
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores the role of the cloud in workplace mobility and how you can shift critical apps to cloud server providers, limiting the strain on your exisiting data centers.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

Hewlett-Packard Limited

Collaboration gives GE more dynamic, secure mobile workforce
sponsored by Hewlett-Packard Limited
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

Minimize the Risk of Your Cloud-Based Services
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide dives into how you can minimize the risk of your cloud-based services and reap the benefits of a fully protected cloud.
Posted: 10 Feb 2014 | Published: 30 Apr 2012

Hewlett-Packard Limited

2013 State of Cloud Infrastructure
sponsored by TechTarget
RESOURCE: There are a number of issues related to the cloud today among IT shops, even though the market continues to create new products that are gaining the trust of many CIOs and IT pros. Find out all the latest adoption plans, usage trends and technical challenges in our 2013 State of the Cloud Infrastructure report by completing this short survey!
Posted: 05 Feb 2014 | Published: 05 Feb 2014

TechTarget

Cloud Security Certification Guide
sponsored by TechTarget
RESOURCE: Which certifications could help improve your skill set and better prepare you to handle today's cloud security pain-points? Take our 2 min cloud security challenges survey and gain access to an exclusive reference guide designed to help you understand which certification is most beneficial for your career!
Posted: 05 Feb 2014 | Published: 05 Feb 2014

TechTarget

Why You Must Have Cloud Governance Before You Move Your Apps
sponsored by CA Technologies.
WHITE PAPER: Access this resource to explore how you can leverage traditional SOA governance programs and extend practices to your future cloud deployment.
Posted: 04 Feb 2014 | Published: 31 Dec 2011

CA Technologies.

Corporate Data in the Consumer Cloud, Chapter 4
sponsored by SearchConsumerization.com
EGUIDE: IT shouldn't leave mobile devices and consumer cloud-based services to user control. In addition to cloud-based file sharing, businesses should consider on-premises and hybrid file sharing, as well as security.
Posted: 28 Jan 2014 | Published: 28 Jan 2014


Enabling and Protecting the Open Enterprise
sponsored by CA Technologies.
WHITE PAPER: View this informative resource for an overview of the challenges of securing the open enterprise, and learn the steps you can take to enable your business for growth, while protecting it from risk and attack.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

CA Technologies.

Does App Security Pay? The Business Impact of Security Tools
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 20 Jan 2014 | Published: 20 Jan 2014

Hewlett-Packard Company

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Good Shepherd Medical Center
sponsored by INHS
WHITE PAPER: Review this case study on Good Shepherd Medical Center's experience implementing a cloud-enabled backup and archive solution that offered improved patient data visibility on- and off-site with continuous server image capture and disaster recovery features.
Posted: 10 Jan 2014 | Published: 27 Dec 2013

INHS

Lower the Pressure of Data on Your Hospital With Cloud Storage
sponsored by BridgeHead Software
WHITE PAPER: In this white paper, uncover a cloud-enabled data management solution that can handle the explosive growth in healthcare data, and in turn, provides robust disaster recovery. In addition, healthcare organizations can virtualize their EMR applications to free up floor space and stay on par with meeting ACO and MU requirements.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

BridgeHead Software

Compliance in the Cloud: Myth or Reality
sponsored by SunGard Availability Services
WHITE PAPER: This expert resource covers a series of frequently asked questions about cloud providers and how they handle data protection and compliance.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SunGard Availability Services

Does Application Security Pay?
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce application vulnerabilities, speed recovery time, and minimize delays. Read on to learn more.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Seagate NAS - What's Driving Data Security and Remote Access Inside
sponsored by Seagate Technology
WHITE PAPER: Check out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

Seagate Technology

Choosing a Hybrid Cloud Approach
sponsored by SearchCloudComputing.com
EGUIDE: This expert handbook covers the reasons why the hybrid cloud is a practical first step towards cloud computing for many organizations.
Posted: 11 Feb 2014 | Published: 11 Feb 2014

SearchCloudComputing.com

eGuide: Ways to Adapt to Data Center Growth
sponsored by Iron Mountain
EGUIDE: Download this expert e-guide now for a look at managing the new technologies of your data center and handling the new security threats.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Iron Mountain

Keep Data Safe From Breaches With a File Sync and Share Solution
sponsored by ownCloud
WHITE PAPER: This exclusive whitepaper offers a file sync and share solution that will keep your data safe and your employees productive.
Posted: 05 Feb 2014 | Published: 05 Feb 2014

ownCloud

Enable Anytime, Anywhere Access Without Exposing Your Data
sponsored by ownCloud
WHITE PAPER: This exclusive whitepaper covers a solution that help you deal with security risks that come from users syncing sensitive data to their home devices.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

ownCloud

DNS in the Cloud: Building a Secure DNS Architecture
sponsored by F5 Networks
EGUIDE: Access this expert e-guide about DNS in the cloud to unveil the suggested tactics to improve DNS architectures and security, including DNSSEC signed zones.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

F5 Networks

Assuaging Concerns about Public Cloud Services And APM: Expert Roadmap
sponsored by XO Communications
EGUIDE: In this e-guide, cloud networking expert Amy Larsen DiCarlo shares her insight on the public cloud, with emphasis on use cases, common concerns, and how to choose the right provider. Click through to also find 5 FAQs about network-based application performance management (APM) to ensure your business stays up-to-speed.
Posted: 21 Jan 2014 | Published: 21 Jan 2014

XO Communications

Cloud Integration and Big Data: Expert Best Practices and Emerging Trends
sponsored by Treasure Data
EGUIDE: In this expert e-guide, senior vice president at Cloud Technology Partners and cloud computing thought leader, David Linthicum, discusses three key topics: integration, the cloud and "big data." The discussion ranges from cloud integration to security issues in the cloud and the workings of Hadoop.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Treasure Data
201 - 225 of 824 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement