Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
201 - 225 of 1082 Matches Previous Page  |  Next Page
Attaining Real Opportunity for MSPs: Cloud Infrastructure as End-to-End systems
sponsored by LogicNow
WHITE PAPER: With more and more clients wanting greater services from their MSPs, providers have real opportunity in managing both on premises and cloud infrastructure as end-to-end systems. This white paper examines how it can be done with the right ecosystem of tools. Read on to find out more.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

LogicNow

Protecting Business Critical Services – Email
sponsored by LogicNow
WHITE PAPER: This white paper takes a look at the world of email and the challenges of managing email for businesses. Access now and you'll learn how an email management solution encompassing security, continuity, and archiving can optimize your email protection strategy and discover the best option to help achieve this.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

LogicNow

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Privileged access, accounts and credentials are critical assets for enterprises that must be highly protected through a defense-in-depth strategy. Discover ways to combine technology and processes so you can prevent data breaches, address regulatory requirements, and more.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Secure Data in the Cloud with AWS Identity and Access Management
sponsored by Radiant Logic, Inc.
EGUIDE: Organizations that employ Amazon Web Services (AWS) find that IAM challenges are exacerbated. Learn how to secure cloud data and AWS users with IAM in this helpful e-guide.
Posted: 07 Apr 2016 | Published: 24 Mar 2016

Radiant Logic, Inc.

SMS Masterminds Enhances Security, Improves System Functionality With Splunk Light Cloud Service
sponsored by Splunk
CASE STUDY: This case study explores how a marketing company leveraged a cloud service to protect their systems from potential brute force attacks, while lowering operational costs and reducing time resolution for errors.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

Splunk

Improving with Cloud
sponsored by Big Switch Networks
PRODUCT REVIEW: This review showcases how one emerging technology is overcoming many of the bigger challenges facing the future of cloud and network technology.
Posted: 06 Apr 2016 | Published: 26 Aug 2015

Big Switch Networks

Innovative Cloud-Based SIEM Deployment Delivers Actionable Security Intelligence
sponsored by Splunk
CASE STUDY: This case study explores how Equinix, a global cloud interconnection provider, overcame security blind spots and the burden of manually extracting and correlating data by turning to cloud-based SIEM.
Posted: 06 Apr 2016 | Published: 24 Feb 2016

Splunk

A Balanced Approach to Cloud Storage
sponsored by Cloudian
WHITE PAPER: This white paper highlights the advantages of leveraging a hybrid cloud solution that enables enterprises to benefit from the cost-efficiency and capacity of a public cloud and the security of a private cloud. Access now to see how balancing your cloud storage can enable your enterprise to keep the hard and soft costs of cloud under control.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

Cloudian

Provide a Unified, Coherent Developer Experience using Cloud-based Identification
sponsored by Radiant Logic, Inc.
EGUIDE: This e-guide teaches you about a centralized security tier to enable single sign-on across multiple enterprise, partner and cloud services. Learn how to create a cloud gateway to access applications running across multiple back ends so developers spend less time implementing new security frameworks for each service.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Radiant Logic, Inc.

Top 5 Considerations in Transitioning to SDN for the Digital Workplace
sponsored by Aruba Networks
WHITE PAPER: Software-defined networking is an important enabling technology for the digital workplace. By the end of 2020, it is expected to impact about 80% of network purchase decisions. Access this white paper to explore the top five factors you should consider as you transition to SDN.
Posted: 29 Mar 2016 | Published: 23 Mar 2016

Aruba Networks

Locking up the Cloud with IAM
sponsored by SearchCloudSecurity.com
EBOOK: In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.
Posted: 25 Mar 2016 | Published: 18 Mar 2016

SearchCloudSecurity.com

Today's Most Valuable Commodity is Located in Cyberspace
sponsored by Digital Guardian
EGUIDE: This e-guide teaches you about current cloud security trends and how hackers are adapting their methods to steal your business data. Continue reading to inform your organization about cloud attacks and adapt countermeasures to respond accordingly.
Posted: 24 Mar 2016 | Published: 22 Mar 2016

Digital Guardian

Recognize Your Security Shortcomings and Address Them with Confidence
sponsored by Dell, Inc. and Intel®
EGUIDE: This white paper shows you the current state of data security among businesses of all sizes. Learn about the concerns adopting a cloud-based infrastructure raises and how to confidently secure your IT environment overall.
Posted: 24 Mar 2016 | Published: 21 Mar 2016

Dell, Inc. and Intel®

Achieve Compliance and Cost Control
sponsored by Matrix42
WHITE PAPER: Cloud computing, in spite of being only about ten years old, continues to gain market share in the enterprise. Analyst house Market Research Media estimates that the global cloud computing market will grow at a 30% CAGR, reaching $270 billion in 2020.
Posted: 18 Mar 2016 | Published: 29 Dec 2015

Matrix42

Network-based Security: Global Visibility is the Difference
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Point security solutions aren't enough to keep up with increasingly diverse and sophisticated cyberthreats. Access this brief resource to learn how a network-based security strategy can detect threats and stop them before they affect your business.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Your Cloud Success Requires Network Strength
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This short resource discusses how you can adapt your network strategy to leverage the strength of hybrid clouds while more effectively protecting your business-critical applications.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Level 3 Communications, Inc.

Experts Weigh in on Network Segmentation Best Practices
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Experts weigh in on the improved security and simplified administration microsegmentation promises in this e-guide. It appears to be the next logical step to securing your data, but will it deliver once the hype dies down?
Posted: 14 Mar 2016 | Published: 29 Feb 2016

NTT Com Security (UK) Ltd

Plugging the Security Gaps of Cloud File Sharing Services
sponsored by Imperva
WHITE PAPER: This paper examines seven items to consider when it comes to security and compliance of cloud file sharing services and how you can mitigate the risks with a Cloud Access Security Broker (CASB) solution.
Posted: 14 Mar 2016 | Published: 17 Feb 2016

Imperva

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 09 Mar 2016 | Published: 17 Jun 2015

Imperva

Botnet Research Report
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This research report takes a closer look at botnets that are used to deploy malware, use cases to help you understand what you should expect from your network service providers, and the need for greater levels of partnership and collaboration across the security community to safeguard the Internet more effectively.
Posted: 07 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Backup and Disaster Recovery Plans Get Cloudy
sponsored by Dimension Data
WHITE PAPER: In this resource, you will explore a host of modern approaches to backup and disaster recovery, and learn how to move elements of your environment to the cloud and manage your hybrid IT infrastructure. Read on to gain and maintain visibility of your entire backup and disaster recovery environment.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

Dimension Data

2016 Cyber-Threat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This report illuminates ways to reduce your attack surface using next-generation firewalls and CASBs, so you can control access to network and cloud-based computing resources. Access now to examine other tools and tactics, including network access control, full-network scans, and more.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogRhythm, Inc.

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

Greencore Cloud Case Study: Taking a Bite out of Operational Cost & Business Risk
sponsored by Adapt Services
CASE STUDY: In this case study, discover how Greencore decided to outsource its IT infrastructure to Adapt, gained a customized, consistent application ecosystem, and experienced a number of other benefits, including: a 25% reduction in data center costs, increased performance, security, and availability, acquisition-friendly infrastructure, and more.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

Adapt Services

Cloud Security Gateways Rise to the Data Loss Challenge
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine we look at cloud data loss prevention (DLP), the challenges of enforcing security policies across environments, and whether cloud access security brokers can offer another layer of protection for enterprise data.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SearchSecurity.com
201 - 225 of 1082 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement