Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
226 - 250 of 949 Matches Previous Page  |  Next Page
Best practices for hybrid cloud management
sponsored by SearchCloudComputing.com
EGUIDE: This e-guide will provide you with a roadmap to help you piece together the hybrid cloud management puzzle. Learn about the keys to a solid hybrid cloud management strategy, how to avoid hybrid cloud security hurdles, cross-platform tools to use, and much more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Traditional vs. Cloud Management Tactics
sponsored by SearchCloudComputing.com
EGUIDE: In this e-guide, you'll discover the differences between traditional management tactics and cloud management strategies. Access now and also learn how to integrate another layer of performance data into the central system to deal with the complexity of cloud.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

How should our team manage data stored in the cloud?
sponsored by SearchCloudComputing.com
EGUIDE: This informative e-guide reveals expert tips for cloud managers to ensure that the provider's management tools mesh well with your enterprise's needs. Learn why you should look for management features beyond security controls for effective cloud storage.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Rethinking the Business Benefits of the Cloud
sponsored by Microsoft
WHITE PAPER: This white paper explores new business models that the cloud enables and explains how the cloud can reduce costs and improve security. Read on to get new insight into the possibilities of the cloud.
Posted: 08 Dec 2014 | Published: 06 Aug 2014

Microsoft

The PaaS Payoff: Greater Agility, Less Cost
sponsored by Red Hat
WHITE PAPER: This exclusive report points to research from UBM Tech that reveals how many IT decision makers are addressing these challenges with the help of Platform as a Service (PaaS). Learn more about the top reasons why organizations are harnessing PaaS, and why it is becoming the go-to strategy for modern business.
Posted: 07 Nov 2014 | Published: 31 Aug 2014

Red Hat

Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Cloud Security Services School
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: This Cloud Security classroom looks at the most significant developments and discusses the action plans security pros should consider to get the most mileage out of cloud-based security services.
Posted: 09 Oct 2014 | Premiered: 15 Oct 2014

SearchCloudSecurity.com

Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 08 Oct 2014 | Published: 10 Jul 2014

Red Hat

The adoption of cloud-based services
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the issues around the adoption of cloud-based services, security technology that is being deployed by enthusiasts and looks at the reasons why the avoiders are holding back.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

Infographic: Cloud Cover – Accelerating Toward Cloud Financials
sponsored by Workday
WHITE PAPER: Check out this infographic to see why financial systems are moving to the cloud, and why it's better for your business.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Workday

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Protecting This House: IT's Role in Cloud Security
sponsored by SearchCloudComputing.com
EBOOK: Having a clear-cut cloud governance strategy helps ease administrative issues for IT and allows organizations to proactively protect their data.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Security Best Practices for a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: This white paper presents a straightforward approach to cloud security that enables your enterprise to mitigate the risks associated with cloud deployment and usage; improve and standardize your security posture and practices across all environments; and more.
Posted: 01 Dec 2014 | Published: 31 Jul 2014

IBM

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE: This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

CIO Decisions: Artificial Intelligence in the Enterprise
sponsored by SearchCIO.com
EZINE: AI is not some far-off fantasy. Some experts predict that smart machines and robots will become so intertwined with business operations as to be indispensible—and some enterprises are already reaping the results.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchCIO.com

How to Bring Shadow IT into the Light - 8 Steps Along the Path
sponsored by Rackspace
WHITE PAPER: This white paper describes eight steps to help CIOs and other IT leaders to bring these potential risks to light. The key is to gain benefits from the cloud without risking your company's data.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Rackspace

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Managed Mobility Services: Reduce Your Risk and Improve Productivity
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how HP Managed Mobility Services can help your organisation manage secure access to applications and data, and let users store, sync and share files anytime, anywhere, from any mobile device.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Enterprise
226 - 250 of 949 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement