Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
226 - 250 of 1039 Matches Previous Page  |  Next Page
Making Sense of European Data Protection Regulations
sponsored by OpenText
WHITE PAPER: This white paper can help you make sense of current and future data protection regulations in the EU.
Posted: 30 Oct 2015 | Published: 31 Dec 2014

OpenText

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

How Cloud Computing Transforms New Business Models
sponsored by OpenText
WHITE PAPER: Cloud services now include management of deployment, apps, platforms, and IT infrastructure. In this white paper, you will learn the 6 most important considerations to keep in mind for a successful cloud partnership with your provider.
Posted: 29 Oct 2015 | Published: 31 Dec 2014

OpenText

Top 3 Differences Between Enterprise and Consumer Clouds
sponsored by OpenText
WHITE PAPER: In this white paper, learn how to approach the different cloud options available before adopting, and the main differentiators between consumer cloud applications and enterprise cloud applications.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

OpenText

Trends and Impacts: The Changing Landscape of the Cloud
sponsored by OpenText
WHITE PAPER: This extensive report examines the world of cloud computing as it stands today and predicts how it will stand in the future.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

OpenText

Protecting Traditional and Cloud Data Centers with Security Intelligence
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper discusses the need for a high level of security in both traditional and cloud data centers and offers solutions to common challenges that can arise, such as security inefficacy or insufficient firewall performance. Access now to learn how security intelligence services can provide your enterprise with many benefits.
Posted: 26 Oct 2015 | Published: 31 Oct 2014

Juniper Networks, Inc.

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015

Mimecast

Signed, Sealed, Delivered: Making Cloud-based Email Secure
sponsored by SearchCloudSecurity.com
EBOOK: In this Technical Guide, experts examine the security implications and general ins and outs of moving company email to a cloud-based service. Read on to explore 10 useful tips for choosing a cloud email service provider with security in mind.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

SearchCloudSecurity.com

Fit for Purpose, Cloud Services for SAP
sponsored by Dimension Data
WHITE PAPER: Access this white paper now to discover how upgrading your SAP enterprise application could be as easy as switching to the cloud. Access this white paper now to deploy you SAP apps on a secure, flexible, resilient, highly available infrastructure supported with full disaster recovery.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

Dimension Data

A Comprehensive Guide to Selecting the Right Hosted Communications Solution
sponsored by Cisco
WHITE PAPER: This white paper offers a three-step process that will allow you to make an informed decision on which cloud partner and hosted communications solution you should choose.
Posted: 07 Oct 2015 | Published: 31 Dec 2013

Cisco

Enterprise Security in Asia: The Ugly, The Bad & The Good
sponsored by F5 Networks
WHITE PAPER: This white paper reveals the truth about cybersecurity in Asia including a 52% surge in breaches and the emerging sophisticated schemes from hackers. View now to learn which attacks are most popular and how to avoid being the next data breach victim.
Posted: 01 Oct 2015 | Published: 13 Jan 2015

F5 Networks

5 Steps to Migrate Your Applications to the Cloud Stress Free
sponsored by Commvault
WHITE PAPER: In this white paper, you'll find a five-step process for securely migrating your applications to the cloud and keeping them secure once they're there.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Commvault

Ensure Business Continuity with a Modern Disaster Recovery Approach
sponsored by Commvault
WHITE PAPER: This essential white paper discusses the need for a modern, cloud approach to disaster recovery that consists of multiple facets united on a common platform. Read on to learn how cloud can help your enterprise unify, centralize and simplify your DR operations.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Commvault

Top 5 Cloud Data Protection Challenges. Solved
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 28 Sep 2015 | Published: 24 Aug 2015

Commvault

Simplify Cloud Integration with Cloud Services
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, you will learn about a cloud service platform that streamlines the transition to the hybrid cloud. Additionally, learn how an integration platform can accommodate the internet of things, enable mobility, and more.
Posted: 28 Sep 2015 | Published: 31 Dec 2014

Oracle Corporation

The New Language of Cloud Computing
sponsored by F5 Networks
WHITE PAPER: In this white paper, learn the results of a survey that examined enterprises' perception and adoption of cloud computing today. Discover the implications of this survey for the future of the cloud, how it is being adopted throughout different markets, and more.
Posted: 25 Sep 2015 | Published: 25 Sep 2015

F5 Networks

Leveraging the Cloud for App Test/Dev Teams
sponsored by Commvault
WHITE PAPER: In this white paper, learn 5 reasons to run app testing and development in the cloud. Plus, learn how a production-level environment in the cloud can accelerate data cloud recovery and migration.
Posted: 25 Sep 2015 | Published: 25 Sep 2015

Commvault

Hybrid Cloud Security Expert Best Practices
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The cloud-based security services market is booming, as enterprises adopt email, Web security, and identity and access management SaaS. How can CISOs best combine cloud-based security controls with on-premises security programs? This supercast looks at the latest cloud security services and best practices.
Posted: 24 Sep 2015 | Premiered: 17 Sep 2015

SearchSecurity.com

Empower More Productive Users with EMM and Enterprise Mobility
sponsored by VMware
RESOURCE: This infographic will review how current mobility trends (like the expansion of cloud architecture) are affecting EMM. Discover how cloud-enabled EMM can power the productivity of your users and IT, as well as 5 reasons to employ advanced EMM.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

Is Email Sapping your Organization's Productivity? How to Stop the Productivity Drain
sponsored by ServiceNow
WEBCAST: In this webinar, Dave Wright, Chief Strategy Officer at ServiceNow, and Ron Markham, Strategy Leader at ServiceNow, address the drain in enterprise-level productivity, and the role of email in this drain. Access this video now to examine a cloud-based service that will streamline otherwise complex work processes.
Posted: 15 Sep 2015 | Premiered: Sep 15, 2015

ServiceNow

Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015

IBM

The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

Computer Weekly – 27 October 2015: Blockchain Sparks Change in Banking Industry
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, find out why blockchain, the technology that underpins bitcoin, is making waves in the banking sector. Also learn why EasyJet says digital is increasingly important for airlines, and take a look at the forces driving digital disruption and why some sectors are changing faster than others.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

ComputerWeekly.com

State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

FinalCode

Information Security Magazine: October Issue
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

SearchSecurity.com
226 - 250 of 1039 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement