Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
226 - 250 of 831 Matches Previous Page  |  Next Page
The CIO Guide to Virtual Server Data Protection
sponsored by Commvault
WHITE PAPER: In this white paper, discover the three questions you need to be asking about data protection in your virtualized environment.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Commvault

Inspiring disruption: Tech Trends 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

ComputerWeekly.com

Collaboration: Delivering a More Dynamic, Secure Mobile Workforce
sponsored by Hewlett-Packard Limited
VIDEO: Take 30 seconds out of your day to see why GE is securely penetrating their emerging markets and enabling customers to take advantage of their services. Watch this video to learn more.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

Experts break down the pros and cons of 27 cloud management tools
sponsored by TechTarget
RESOURCE: With so many cloud management tools to choose from, how do you determine which is best for your unique infrastructure needs? Fortunately, this expert buyer's guide to cloud management tools can help. Access this exclusive resource to discover the pros, cons, features and use cases of 27 cloud management tools.
Posted: 05 Feb 2014 | Published: 05 Feb 2014

TechTarget

Achieve paramount cloud security for your enterprise
sponsored by TechTarget
RESOURCE: Complete our 2 min cloud security challenges survey and gain access to an exclusive reference guide designed to help you achieve better cloud security for your enterprise and how to assess your risk before moving data processing or applications to the cloud.
Posted: 05 Feb 2014 | Published: 05 Feb 2014

TechTarget

Corporate Data in the Consumer Cloud, Chapter 4
sponsored by SearchConsumerization.com
EGUIDE: IT shouldn't leave mobile devices and consumer cloud-based services to user control. In addition to cloud-based file sharing, businesses should consider on-premises and hybrid file sharing, as well as security.
Posted: 28 Jan 2014 | Published: 28 Jan 2014


Cloud Solutions: Three Critical Rules for Retail
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper is a retailer's guide to the cloud, including information on the 3 most common types of services, the major benefits of cloud adoption, and key guidelines for transitioning to  this type of environment.
Posted: 27 Jan 2014 | Published: 31 Jan 2013

Hewlett-Packard Company

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Bristol City Council Trading with Schools Future Proof their Service with CentraStage
sponsored by CentraStage
WHITE PAPER: This case study looks at a successful implementation of a cloud service provider and how one organization benefited from increased support.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

CentraStage

Security in the Skies
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper highlights the major cloud security concerns and threats, and offers a list of controls to include in your security strategy to prevent these inherent risks.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

Securing your Midsized Business
sponsored by IBM
WHITE PAPER: This guide explores security management strategies and how to combat the growth of sophisticated threats.
Posted: 26 Feb 2014 | Published: 31 Oct 2013

IBM

Solution Brief - Security for the Cloud
sponsored by Hewlett-Packard Limited
WHITE PAPER: This whitepaper outlines a security intelligence platform that addresses these unique challenges through risk and compliance management, security intelligence, application security, threat research and more.
Posted: 26 Feb 2014 | Published: 19 Feb 2014

Hewlett-Packard Limited

Compliance in the Cloud: Myth or Reality
sponsored by SunGard Availability Services
WHITE PAPER: This expert resource covers a series of frequently asked questions about cloud providers and how they handle data protection and compliance.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SunGard Availability Services

Does Application Security Pay?
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce application vulnerabilities, speed recovery time, and minimize delays. Read on to learn more.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Seagate NAS - What's Driving Data Security and Remote Access Inside
sponsored by Seagate Technology
WHITE PAPER: Check out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

Seagate Technology

Security Intelligence is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: This guide explores a unique security intelligence platform and how it can secure your cloud.
Posted: 18 Feb 2014 | Published: 31 Oct 2013

IBM

Find the Right Balance of Cloud Risks and Rewards
sponsored by SearchCloudComputing.com
EBOOK: This expert handbook covers the reasons why the hybrid cloud is a practical first step towards cloud computing for many organizations.
Posted: 11 Feb 2014 | Published: 11 Feb 2014

SearchCloudComputing.com

eGuide: Ways to Adapt to Data Center Growth
sponsored by Iron Mountain
EGUIDE: Download this expert e-guide now for a look at managing the new technologies of your data center and handling the new security threats.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Iron Mountain

Keep Data Safe From Breaches With a File Sync and Share Solution
sponsored by ownCloud
WHITE PAPER: This exclusive whitepaper offers a file sync and share solution that will keep your data safe and your employees productive.
Posted: 05 Feb 2014 | Published: 05 Feb 2014

ownCloud

Enable Anytime, Anywhere Access Without Exposing Your Data
sponsored by ownCloud
WHITE PAPER: This exclusive whitepaper covers a solution that help you deal with security risks that come from users syncing sensitive data to their home devices.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

ownCloud

DNS in the Cloud: Building a Secure DNS Architecture
sponsored by F5 Networks
EGUIDE: Access this expert e-guide about DNS in the cloud to unveil the suggested tactics to improve DNS architectures and security, including DNSSEC signed zones.
Posted: 29 Jan 2014 | Published: 29 Jan 2014

F5 Networks

Assuaging Concerns about Public Cloud Services And APM: Expert Roadmap
sponsored by XO Communications
EGUIDE: In this e-guide, cloud networking expert Amy Larsen DiCarlo shares her insight on the public cloud, with emphasis on use cases, common concerns, and how to choose the right provider. Click through to also find 5 FAQs about network-based application performance management (APM) to ensure your business stays up-to-speed.
Posted: 21 Jan 2014 | Published: 21 Jan 2014

XO Communications

Good Shepherd Medical Center
sponsored by INHS
WHITE PAPER: Review this case study on Good Shepherd Medical Center's experience implementing a cloud-enabled backup and archive solution that offered improved patient data visibility on- and off-site with continuous server image capture and disaster recovery features.
Posted: 10 Jan 2014 | Published: 27 Dec 2013

INHS

Cloud Integration and Big Data: Expert Best Practices and Emerging Trends
sponsored by Treasure Data
EGUIDE: In this expert e-guide, senior vice president at Cloud Technology Partners and cloud computing thought leader, David Linthicum, discusses three key topics: integration, the cloud and "big data." The discussion ranges from cloud integration to security issues in the cloud and the workings of Hadoop.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Treasure Data
226 - 250 of 831 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement