Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
226 - 250 of 1075 Matches Previous Page  |  Next Page
Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

Best Practices For Public Cloud Security
sponsored by TrendMicro
WHITE PAPER: This white paper discusses the need for cloud managers to balance developer time-to-value with security risks and cost.
Posted: 01 Feb 2016 | Published: 04 Feb 2015

TrendMicro

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on and learn how to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Key Considerations in Choosing a WAF
sponsored by F5 Networks
WHITE PAPER: Attacks are becoming more sophisticated, and keeping up to date on security measures can be challenging. In this detailed white paper, explore both the basic and advanced considerations of selecting a web application firewall today, including performance, high availability, reliability, automatic attack detection, ease of management, and much more.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

F5 Networks

The Expansion of the IPS Appliance Market and Intrusion Prevention Systems Assessment
sponsored by IBM
RESOURCE: In this report, you will evaluate several best-in-class intrusion prevention systems, and determine which stand-alone IPS appliances offer the functionality needed in your enterprise. Read on to learn which vendors offer IPS and IDS functionality to provide control over public cloud workloads.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

IBM

You Can’t Secure What You Can’t See: 7 Rules to Achieve Visibility in Virtual Infrastructure
sponsored by CloudPassage
RESOURCE: This blog post outlines 7 tips for increasing visibility in virtual environments for better security. Read on to learn about how to gain continuous visibility with comprehensive security functions.
Posted: 20 Jan 2016 | Published: 22 Sep 2015

CloudPassage

Containers and the Cloud: Overcoming Security Concerns
sponsored by CloudPassage
WEBCAST: This webcast contains a discussion of a cloud security innovation, containerization.
Posted: 19 Jan 2016 | Premiered: Dec 31, 2015

CloudPassage

How Enterprises Are Attacking the Cloud Security Challenge
sponsored by CloudPassage
WEBCAST: The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.
Posted: 15 Jan 2016 | Premiered: Dec 23, 2015

CloudPassage

Best Practices for Securing AWS Instances
sponsored by CloudPassage
WEBCAST: In this webcast, security pros will explore the security challenges AWS computing presents and offer 7 best practices to secure your cloud environments faster. Watch now to learn more.
Posted: 15 Jan 2016 | Premiered: Dec 4, 2015

CloudPassage

Forrester Market Overview: Cloud Workload Security Management Solutions - Automate or Die
sponsored by CloudPassage
WHITE PAPER: This Forrester report is a must-read for anyone planning their security strategy for public, private or hybrid cloud infrastructure. In addition to a great landscape of buyer challenges and needs, the report outlines Forrester's top workload cloud security criteria.
Posted: 13 Jan 2016 | Published: 02 Jun 2015

CloudPassage

How Enterprises Are Attacking the IT Security Challenge
sponsored by CloudPassage
WHITE PAPER: This white paper will demonstrate the increasing complexity of managing IT security, spending trends, challenges and vulnerabilities.
Posted: 13 Jan 2016 | Published: 04 Sep 2015

CloudPassage

SANS Institute Survey: Orchestrating Security in the Cloud
sponsored by CloudPassage
ANALYST REPORT: Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 13 Jan 2016 | Published: 30 Sep 2015

CloudPassage

Flipping the Script: Law Firms Hunted by Cybercriminals
sponsored by SurfWatch Labs
WHITE PAPER: This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

SurfWatch Labs

Single Sign-on for Office 365,Microsoft Azure and On-Premises Environments
sponsored by Rackspace
WHITE PAPER: In this white paper, learn how to achieve a robust, hybrid infrastructure that allows users to seamlessly access their productivity apps — regardless of whether they are deployed on-premise or in the cloud. Additionally, learn why hybrid makes sense, common concerns and pitfalls of hybrid infrastructure, and more.
Posted: 29 Dec 2015 | Published: 29 Dec 2015

Rackspace

How to Implement a BYOD Cloud Strategy
sponsored by VMware
EGUIDE: In this exclusive e-guide, our cloud gurus break down how you can make two technology forces—BYOD and cloud computing—exist without disruption in your enterprise. Read on for expert answers to your top questions on this important cloud topic.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

VMware

The Six Key Inflection Points You Can't Ignore in IT Infrastructure and Operations
sponsored by NetEnrich
VIDEO: In this webcast, Raju Chekuri, CEO of NetEnrich, addresses the constantly shifting landscape of IT and several best practices that will help you excel at meeting your specific IT demands. Tune in now to discover and solve the 6 key challenges faced when optimizing your operations for the cloud.
Posted: 07 Dec 2015 | Premiered: 17 Aug 2015

NetEnrich

Time for IT to Reign in Cloud Computing Control
sponsored by Microsoft
EGUIDE: Access this e-guide to see how hybrid cloud models can enable organizations to promote secure and economical storage without eliminating the freedom that users prefer. You will also learn how niche cloud computing environments are providing more targeted services and how to build a solid hybrid cloud environment.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Microsoft

Computer Weekly – 12 January 2016: How open source is beating proprietary software
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide assesses the impact of open source software and how it is underpinning the digital revolution. We examine the prospects for cloud in financial services as regulators give their approval. And we ask if Uber is really part of a new business model for the sharing economy. Read the issue now.
Posted: 08 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Untapped Data Protection Processes
sponsored by Microsoft
EGUIDE: In this three-part expert e-guide, learn how a single pool of data created by merging backup, data recovery, and archive can serve multiple data protection needs—and spawn new ideas about how to use that data. Additionally, learn why a hybrid approach using disk, cloud, and tape is best for most organizations' protection plans.
Posted: 08 Jan 2016 | Published: 08 Jan 2016

Microsoft

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Blue Coat Systems

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Blue Coat Systems

Rethinking Enterprise Storage: A Hybrid Cloud Model
sponsored by Microsoft
WHITE PAPER: In this extensive resource, explore how hybrid cloud computing can be used both to overcome the challenges of data growth and integrating with the cloud. Additionally, learn about the current possibilities available for migrating from on-premises infrastructure to the cloud, leveraging hybrid cloud storage for disaster recovery, and more.
Posted: 04 Jan 2016 | Published: 31 Dec 2013

Microsoft

Leapfrogging Backup with Cloud Snapshots
sponsored by Microsoft
WHITE PAPER: In this white paper, learn about a tool that can replace traditional backup processes with cloud snapshots that automate off-site data protection. Additionally, explore how this option can reduce time spent managing backups, enable easy restoration and access of data on the cloud , and more.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

Microsoft

Hybrid Cloud Storage Security Brief
sponsored by Microsoft
WHITE PAPER: This brief white paper explores 4 common scenarios of hybrid cloud security concerns for StorSimple hybrid cloud storage solution and how security measures address these scenarios. Read on to learn more.
Posted: 11 Dec 2015 | Published: 31 Mar 2014

Microsoft

The Big Bang – How cloud is changing the face of resiliency
sponsored by IBM
WHITE PAPER: This white paper discusses how the cloud may be the key to robust disaster recovery and mitigating cybersecurity threats and downtime. Read on and discover how implementing the right cloud strategy can help improve your enterprise's business continuity management and ensure stronger data protection.
Posted: 08 Dec 2015 | Published: 31 Dec 2014

IBM
226 - 250 of 1075 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement