Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
226 - 250 of 1046 Matches Previous Page  |  Next Page
Single Sign-on for Office 365,Microsoft Azure and On-Premises Environments
sponsored by Rackspace
WHITE PAPER: In this white paper, learn how to achieve a robust, hybrid infrastructure that allows users to seamlessly access their productivity apps — regardless of whether they are deployed on-premise or in the cloud. Additionally, learn why hybrid makes sense, common concerns and pitfalls of hybrid infrastructure, and more.
Posted: 29 Dec 2015 | Published: 29 Dec 2015

Rackspace

The Six Key Inflection Points You Can't Ignore in IT Infrastructure and Operations
sponsored by NetEnrich
VIDEO: In this webcast, Raju Chekuri, CEO of NetEnrich, addresses the constantly shifting landscape of IT and several best practices that will help you excel at meeting your specific IT demands. Tune in now to discover and solve the 6 key challenges faced when optimizing your operations for the cloud.
Posted: 07 Dec 2015 | Premiered: 17 Aug 2015

NetEnrich

Successfully Integrating DevOps Teams Within Your Organization
sponsored by evident.io
EGUIDE: Access this exclusive e-guide to discover expert recommendations for building a proactive DevOps team within your organization and how you can successfully integrate security with DevOps.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

evident.io

Best Practices to Protecting AWS Cloud Resources
sponsored by evident.io
EGUIDE: Access this exclusive e-guide from the experts at SearchAWS.com to explore solutions that effectively secure apps and data in the AWS cloud. You'll also examine three network security measures that enterprises should follow when designing an AWS environment.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

evident.io

Best Practices for Securing Workloads in Amazon Web Services
sponsored by evident.io
WHITE PAPER: Access this informative resource to explore best practices for securely deploying enterprise workloads in AWS. You'll also learn how these tips can apply to securing workloads in other IaaS strategies.
Posted: 24 Nov 2015 | Published: 15 Apr 2015

evident.io

Orchestrating Security in the Cloud
sponsored by evident.io
ANALYST REPORT: Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 23 Nov 2015 | Published: 30 Sep 2015

evident.io

Continuous Security and Reliability in Iterative Development
sponsored by evident.io
WHITE PAPER: Access this white paper to understand the new approaches to security required in a continuous deployment environment.
Posted: 20 Nov 2015 | Published: 31 Dec 2014

evident.io

Best Practices for Securing your Cloud Email Service
sponsored by Mimecast
EGUIDE: This eGuide explains how to weigh the two so your migration succeeds, and what criteria to look for in the security tools every email service needs.
Posted: 19 Nov 2015 | Published: 19 Nov 2015

Mimecast

Cloud Security – The Unavoidable Topic
sponsored by evident.io
ANALYST REPORT: This white paper details a cloud infrastructure security platform for AWS. Read on to explore a SWOT analysis of this platform to learn the features and benefits it offers, as well as how it compares to other cloud security tools on the market.
Posted: 18 Nov 2015 | Published: 19 Mar 2015

evident.io

How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015

Check Point Software Technologies Ltd.

Secure Cloud Application Usage: Protect the Business Against Cloud-Based Threats
sponsored by IBM
WHITE PAPER: This essential solution brief highlights a SaaS solution that integrates cloud discovery, threat intelligence and prevention, policy enforcement, identity as a service, and more into one solution. Access now to see how this solution can simplify and secure your cloud application use as well as help protect against user and cloud-based threats.
Posted: 10 Nov 2015 | Published: 30 Sep 2015

IBM

Cloud Risk and Compliance
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: This classroom examines the key cloud concerns and how to work with cloud service providers to ensure the safety of sensitive corporate assets.Moving enterprise workloads and data to the cloud doesn't remove IT's responsibility for security and regulation compliance.
Posted: 05 Nov 2015 | Premiered: 13 Oct 2015

SearchCloudSecurity.com

Untapped Data Protection Processes
sponsored by Microsoft
EGUIDE: In this three-part expert e-guide, learn how a single pool of data created by merging backup, data recovery, and archive can serve multiple data protection needs—and spawn new ideas about how to use that data. Additionally, learn why a hybrid approach using disk, cloud, and tape is best for most organizations' protection plans.
Posted: 08 Jan 2016 | Published: 08 Jan 2016

Microsoft

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Blue Coat Systems

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Blue Coat Systems

Rethinking Enterprise Storage: A Hybrid Cloud Model
sponsored by Microsoft
WHITE PAPER: In this extensive resource, explore how hybrid cloud computing can be used both to overcome the challenges of data growth and integrating with the cloud. Additionally, learn about the current possibilities available for migrating from on-premises infrastructure to the cloud, leveraging hybrid cloud storage for disaster recovery, and more.
Posted: 04 Jan 2016 | Published: 31 Dec 2013

Microsoft

Leapfrogging Backup with Cloud Snapshots
sponsored by Microsoft
WHITE PAPER: In this white paper, learn about a tool that can replace traditional backup processes with cloud snapshots that automate off-site data protection. Additionally, explore how this option can reduce time spent managing backups, enable easy restoration and access of data on the cloud , and more.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

Microsoft

Hybrid Cloud Storage Security Brief
sponsored by Microsoft
WHITE PAPER: This brief white paper explores 4 common scenarios of hybrid cloud security concerns for StorSimple hybrid cloud storage solution and how security measures address these scenarios. Read on to learn more.
Posted: 11 Dec 2015 | Published: 31 Mar 2014

Microsoft

How to Implement a BYOD Cloud Strategy
sponsored by VMware
EGUIDE: In this exclusive e-guide, our cloud gurus break down how you can make two technology forces—BYOD and cloud computing—exist without disruption in your enterprise. Read on for expert answers to your top questions on this important cloud topic.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

VMware

The Big Bang – How cloud is changing the face of resiliency
sponsored by IBM
WHITE PAPER: This white paper discusses how the cloud may be the key to robust disaster recovery and mitigating cybersecurity threats and downtime. Read on and discover how implementing the right cloud strategy can help improve your enterprise's business continuity management and ensure stronger data protection.
Posted: 08 Dec 2015 | Published: 31 Dec 2014

IBM

How Can I Become an Always-On Business?
sponsored by IBM
WHITE PAPER: This white paper details the 3 prevailing strategies to being an always-on organization to address security threats and protect data without downtime.
Posted: 07 Dec 2015 | Published: 25 Nov 2015

IBM

The Great Debate: One Integrated Business System vs. Siloed Applications
sponsored by NetSuite
WHITE PAPER: This white paper analyzes the inefficiencies caused by running disparate business applications and systems across your various departments, and demonstrates how a cloud-based software can unify your critical-business processes.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

NetSuite

A Definitive Guide to Windows 10 Management
sponsored by VMware
WEBCAST: This webcast examines the impact W10 will have on enterprise mobility in the next 5 years. Access this video to redefine your mobility management strategy with W10, and reap the benefits of its cloud-based management capabilities.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

VMware

Making the Business Case for Private and Hybrid Cloud Executive Summary
sponsored by Dell and Microsoft
WHITE PAPER: Access this white paper to uncover the business benefits of adopting private and hybrid cloud strategies. You'll discover 6 key business benefits of a private cloud approach, how to use hybrid cloud strategies to accommodate fluctuations in demand and app workload, 3 steps to a private/hybrid cloud approach, and more.
Posted: 17 Nov 2015 | Published: 30 Oct 2015

Dell and Microsoft

Cloud Collaboration Ensures Compliance, Flight Safety
sponsored by Microsoft
WHITE PAPER: This case study explores how an air navigation service provider they designed a mobile cloud app for their document review process to ensure better compliance, collaboration, and flight safety.
Posted: 11 Nov 2015 | Published: 31 Mar 2015

Microsoft
226 - 250 of 1046 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement