Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
201 - 225 of 1047 Matches Previous Page  |  Next Page
Norton Cyber Security Insights Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report examines consumers' online behaviours, attitudes and security habits alongside the dangers and financial cost of cyber crime
Posted: 16 Feb 2016 | Published: 16 Feb 2016

ComputerWeekly.com

The Cloud App Visibility Blindspot
sponsored by Imperva
WHITE PAPER: Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."
Posted: 11 Feb 2016 | Published: 16 Sep 2015

Imperva

Transforming the future of cloud adoption
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This study by StratoGen, which questioned 1,000 senior business executives, reveals that more than a third of UK businesses still host fewer than 10% of their IT applications in the cloud.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

ComputerWeekly.com

Predictions 2016: The Cloud Accelerates
sponsored by Hedvig Inc
RESEARCH CONTENT: This report by Forrester outlines 11 factors that will accelerate cloud adoption in 2016. Uncover key developments like: Top vendors gain and others retreat or refocus; automation finally chips away at cloud security fears; and more.
Posted: 10 Feb 2016 | Published: 16 Nov 2015


Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: Check out this incredible online resource center that's packed with proven best practices focused on how to transform your data into a powerful strategic asset with a holistic data protection plan—enabling you to access all of your data safely from any endpoint.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Key Considerations in Choosing a WAF
sponsored by F5 Networks
WHITE PAPER: Attacks are becoming more sophisticated, and keeping up to date on security measures can be challenging. In this detailed white paper, explore both the basic and advanced considerations of selecting a web application firewall today, including performance, high availability, reliability, automatic attack detection, ease of management, and much more.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

F5 Networks

The Expansion of the IPS Appliance Market and Intrusion Prevention Systems Assessment
sponsored by IBM
RESOURCE: In this report, you will evaluate several best-in-class intrusion prevention systems, and determine which stand-alone IPS appliances offer the functionality needed in your enterprise. Read on to learn which vendors offer IPS and IDS functionality to provide control over public cloud workloads.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

IBM

Making Sense of the Shared Responsibility Model
sponsored by Palerra Inc.
WHITE PAPER: In this white paper, take a closer look at the Shared Responsibility Model and the misconceptions of the cloud service security infrastructure.
Posted: 21 Jan 2016 | Published: 16 Dec 2015

Palerra Inc.

Evaluating Cloud Security Solutions for Office 365
sponsored by Palerra Inc.
WHITE PAPER: Choosing the right Office 365 cloud security approach to defend your data is no simple task. This buyers guide gives you all of the key criteria and must-have features to look for when choosing a strategy.
Posted: 20 Jan 2016 | Published: 30 Dec 2015

Palerra Inc.

You Can’t Secure What You Can’t See: 7 Rules to Achieve Visibility in Virtual Infrastructure
sponsored by CloudPassage
RESOURCE: This blog post outlines 7 tips for increasing visibility in virtual environments for better security. Learn how to gain continuous visibility with comprehensive security functions.
Posted: 20 Jan 2016 | Published: 22 Sep 2015

CloudPassage

Containers and the Cloud: Overcoming Security Concerns
sponsored by CloudPassage
WEBCAST: This webcast contains a discussion of a cloud security innovation, containerization.
Posted: 19 Jan 2016 | Premiered: Dec 31, 2015

CloudPassage

How Enterprises Are Attacking the Cloud Security Challenge
sponsored by CloudPassage
WEBCAST: The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.
Posted: 15 Jan 2016 | Premiered: Dec 23, 2015

CloudPassage

Best Practices for Securing AWS Instances
sponsored by CloudPassage
WEBCAST: In this webcast, security pros will explore the security challenges AWS computing presents and offer 7 best practices to secure your cloud environments faster. Watch now to learn more.
Posted: 15 Jan 2016 | Premiered: Dec 4, 2015

CloudPassage

Forrester Market Overview: Cloud Workload Security Management Solutions - Automate or Die
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 13 Jan 2016 | Published: 02 Jun 2015

CloudPassage

How Enterprises Are Attacking the IT Security Challenge
sponsored by CloudPassage
WHITE PAPER: This white paper will demonstrate the increasing complexity of managing IT security, spending trends, challenges and vulnerabilities.
Posted: 13 Jan 2016 | Published: 04 Sep 2015

CloudPassage

SANS Institute Survey: Orchestrating Security in the Cloud
sponsored by CloudPassage
ANALYST REPORT: Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 13 Jan 2016 | Published: 30 Sep 2015

CloudPassage

Cloud Deployment Elucidates Pros and Cons for Legacy Applications
sponsored by Oracle Corporation
EGUIDE: There are many common mistakes organizations make when deploying applications in the cloud—and each differs in severity. Read on to discover several commonplace mistakes made in cloud application deployment, as well as determine the pros and cons of legacy applications that the cloud elucidates.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Oracle Corporation

Secure Your Cloud Against Exposures: How Vulnerability Management Platforms Help
sponsored by Alert Logic
WHITE PAPER: This commissioned study, conducted by Forrester Research on behalf of Alert Logic, examines how vulnerability management platforms actively/continuously scan apps and data in public cloud environments to beyond current security technologies. Read on to review how to close visibility gaps in your cloud security model.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

Alert Logic

Building a Successful Hybrid Cloud Strategy
sponsored by Presidio
EGUIDE: This complimentary e-guide provides expert advice for building a hybrid cloud strategy and discusses the importance of moving applications to the cloud to start off the migration process. Read on to learn what management tools and cloud migration strategies can help your enterprise implement a successful cloud architecture.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Presidio

How to Contain the Cloud, and Other Security Questions
sponsored by SearchCloudSecurity.com
EBOOK: This Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.
Posted: 09 Feb 2016 | Published: 29 Apr 2016

SearchCloudSecurity.com

CW Europe – Forecast: Cloudy with Dry Spells
sponsored by ComputerWeekly.com
EZINE: In Europe cloud is restricted and hybrid setups make use of local compute and storage.
Posted: 09 Feb 2016 | Published: 08 Feb 2016

ComputerWeekly.com

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that reduces IT risk and drives operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Access now to discover how your enterprise can protect and manage all of its credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

Monitoring that Cloudy Network
sponsored by SearchSecurity.com
EBOOK: Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchSecurity.com

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com
201 - 225 of 1047 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement