Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
226 - 250 of 1285 Matches Previous Page  |  Next Page
Data Loss Prevention – Now with CASB
sponsored by Symantec
WHITE PAPER: Data is often maliciously targeted through cloud applications. This resource will help you determine strategies for using DLP and CASB to protect your company in the cloud.
Posted: 22 Aug 2017 | Published: 31 Dec 2016

Symantec

How to Make Money in the Cloud
sponsored by ConnectWise
EBOOK: Access this e-book to set your business up to profit on cloud services, and maximize revenue gained, by approaching forward-thinking clients about new services, creating recurring service bundles to overcome slim profit margins on cloud licenses, and more.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

ConnectWise

Use AWS to Secure Your DevOps Pipeline Like a Bank
sponsored by Stelligent
VIDEO: From security of the source code used to trigger builds, to the insertion of strict business controls at run time, and out to the continuous inspection of the running infrastructure to ensure compliance, this webcast teaches you how to build capabilities that are enabling them to run their business faster and safer on AWS.
Posted: 21 Aug 2017 | Premiered: 29 Nov 2016

Stelligent

Continuous Security on AWS
sponsored by Stelligent
VIDEO: If you are planning to deploy resources with AWS, or if you have already started and are looking to improve the security of your DevOps environments on AWS, then watch this webinar. You will learn how to infuse security validation in your development and deployment processes for continuous security on AWS.
Posted: 21 Aug 2017 | Premiered: 08 Aug 2017

Stelligent

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec

macOS Security Checklist
sponsored by JAMF
WHITE PAPER: The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. Download this white paper to discover how to implement the organizations security recommendations.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

How the Williams Martini Racing Team Protects its Data
sponsored by Symantec
CASE STUDY: Check out this case studying exploring how Williams Martini Racing overcame the challenge of securing high-value data by implementing endpoint, web, and data center protection.
Posted: 18 Aug 2017 | Published: 31 Dec 2016

Symantec

Recovering your Company's PCs Affected by Ransomware
sponsored by Acronis
WHITE PAPER: After a ransomware strike on a PC, your company data is at a serious risk. Read this white paper to learn how to safely protect your company's PCs after a ransomware strike.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Acronis

Take Your SIEM to the Cloud
sponsored by Splunk
WHITE PAPER: 90% of U.S. CEOs indicate that they have seen the financial, reputational and career consequences of falling victim to a cyberattack. Check out this expert white paper to uncover how a security operations center can improve your security posture.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Splunk

Addressing Today's Endpoint Security Challenges
sponsored by Citrix
WHITE PAPER: Endpoint security has become a major issue for enterprise IT as business mobility and BYOD render traditional perimeter based protection ineffective. Read this white paper to uncover key strategies for mobile and endpoint security, including multilayered protection for apps, data, devices and networks.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Honda Dealer Recovers from Ransomware
sponsored by Acronis
CASE STUDY: Take a look at this Honda dealership case study on how they overcame data loss and malware attacks by leveraging the cloud.
Posted: 16 Aug 2017 | Published: 31 Aug 2016

Acronis

How to simplify your workspace with UEM
sponsored by Citrix
WHITE PAPER: In the era of the evolution of mobile devices and BYOD, client management tools must evolve in order to enhance security platforms. Read this white paper to find out how to provide security to your device's operating system using UEM.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Citrix

Strengthen Your Defenses Against Cybercrime
sponsored by Mimecast
WHITE PAPER: Despite the fact that email-borne attacks are a real threat, many organizations aren't confident in their ability to spot or stop one. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Mimecast

Equinix Delivers Security Intelligence with Cloud-Based SIEM
sponsored by Splunk
CASE STUDY: Read this case study to uncover how Equinix, a large technology company, was able to increase visibility and achieve a 30% faster response to security incidents with Splunk.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Splunk

Remedying the Email Security Gaps in Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Private Cloud Users Stack Up Third-Party Platform Delivery vs. DIY
sponsored by Red Hat
WHITE PAPER: With so many OpenStack distributions to choose from, do you know which use cases will help you best realize OpenStack success? Read this research paper, in which 2 separate case studies detail the way in which an OpenStack cloud was deployed, the workloads to which that compute power is deployed, and the tools supporting the environment.
Posted: 11 Aug 2017 | Published: 31 Dec 2016

Red Hat

10 Steps to Success with Public Cloud Adoption
sponsored by Rackspace Intel
WHITE PAPER: This white paper lays out 10 steps to a successful public cloud adoption. Inside, you will learn everything you need to know to get your public cloud initiative off the ground, from building a business case to executing your migration.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Rackspace Intel

The Imperative for Hybrid IT: Cloud and Innovation in the Modern Era
sponsored by Red Hat
RESEARCH CONTENT: Today, nearly 90% of enterprises overall use at least one form of cloud. This research report uncovers the what, why and how of the new approaches to IT to understand how companies are coping with public and private cloud.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Red Hat

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect

Cloud Access Security Brokers: A Market Guide
sponsored by Cisco Umbrella
RESEARCH CONTENT: The cloud access security broker (CASB) market is still rapidly evolving, with vendors providing a range of capabilities and delivery options to help secure usage of the cloud. This Gartner Research report acts as a market guide for understanding the CASB market.
Posted: 10 Aug 2017 | Published: 24 Oct 2016

Cisco Umbrella

Clearing Public Cloud Hurdles: An Infographic
sponsored by Rackspace Intel
RESOURCE: By downloading this infographic, you'll learn to conquer the top 5 challenges businesses face on the path to public cloud adoption. Read on to access this high-level view of successful implementation, and use public cloud to support forward-leaning compute-intensive workloads like AI and IoT, and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Rackspace Intel

Overcome Security Barriers to the Cloud
sponsored by Commvault
WHITE PAPER: Learn how to enable data security features in the cloud to avoid costly data breaches. As a bonus, discover 4 other barriers to the cloud and how to overcome these challenges.
Posted: 09 Aug 2017 | Published: 31 Dec 2015

Commvault

Yelp Customer Story: Secure Content with Threat Intelligence and Automated Protection
sponsored by Cisco Umbrella
CASE STUDY: Discover how Yelp fosters trust between their users and its online content by preempting potentially dangerous malware attacks and other threats with cloud-delivered automated protection and integrated threat intelligence.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Cisco Umbrella

Enterprise Cloud Applications & Services Adoption, Use, and Threats
sponsored by Symantec
RESEARCH CONTENT: This special "Shadow Data Research Report" addresses the challenges faced when securing data in cloud apps and services specific to Shadow. Plus the report covers the potential repercussions of data leakage including compliance and mitigation costs that we guarantee you'll never want to face.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Symantec

Rethink Your Strategy to Defeat Evasive Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Malware is rapidly changing, and security policies need to change alongside it. Inside, learn about why implementing an analytics-based threat detection system is your best bet at keeping your network safe.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Palo Alto Networks
226 - 250 of 1285 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement