Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
226 - 250 of 960 Matches Previous Page  |  Next Page
Build a Path to Cloud Success by Answering 3 Questions
sponsored by IBM
EBOOK: This insightful e-book outlines the potential pitfalls, goals, limitations, and key considerations 3 industries face when migrating to the hybrid cloud.
Posted: 06 Jan 2015 | Published: 06 Jan 2015


New Possibilities for the Digital Era
sponsored by IBM
EBOOK: As technologies change, database storage must also change with it. The new storage platform needs to be scalable, accessible, and mobile ready.
Posted: 22 Dec 2014 | Published: 22 Dec 2014


Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014


Rethinking the Business Benefits of the Cloud
sponsored by Microsoft
WHITE PAPER: This white paper explores new business models that the cloud enables and explains how the cloud can reduce costs and improve security. Read on to get new insight into the possibilities of the cloud.
Posted: 08 Dec 2014 | Published: 06 Aug 2014


Cloud Infrastructure Security: It's Time to Rethink Your Strategy
sponsored by CloudPassage
WHITE PAPER: This white paper discusses why, in order to truly reap the benefits of the cloud, leaders need to rethink their approach to infrastructure security.
Posted: 24 Nov 2014 | Published: 24 Nov 2014


Best Practice Security in a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: This white paper explores the security risks that come with each cloud model, the split responsibilities for cloud security, and expert tips for building a secure cloud.
Posted: 14 Nov 2014 | Published: 31 Jul 2014


The PaaS Payoff: Greater Agility, Less Cost
sponsored by Red Hat
WHITE PAPER: This exclusive report points to research from UBM Tech that reveals how many IT decision makers are addressing these challenges with the help of Platform as a Service (PaaS). Learn more about the top reasons why organizations are harnessing PaaS, and why it is becoming the go-to strategy for modern business.
Posted: 07 Nov 2014 | Published: 31 Aug 2014

Red Hat

Best Practice Security in a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: Access this white paper to learn about a straightforward approach to cloud security that will not only assist in mitigating the risks associated with cloud deployments and usage, but also improve and standardize your security posture and practices across all environments.
Posted: 29 Oct 2014 | Published: 31 Jul 2014


How to Navigate the Complex Move to the Cloud
sponsored by Rackspace
WHITE PAPER: Access this expert resource to learn how a managed services provider can help you on your move to the cloud. You'll get insight into how managed service providers can help you with product selection, scalability, and shifting workloads to the cloud as well as ensuring cloud security.
Posted: 27 Oct 2014 | Published: 27 Oct 2014


Getting to grips with BYOD
sponsored by
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Cloud Security Services Security School
sponsored by
VIRTUAL ENVIRONMENT: This Cloud Security classroom looks at the most significant developments and discusses the action plans security pros should consider to get the most mileage out of cloud-based security services.
Posted: 09 Oct 2014 | Premiered: 15 Oct 2014

TOPICS:  Cloud Security

The adoption of cloud-based services
sponsored by
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the issues around the adoption of cloud-based services, security technology that is being deployed by enthusiasts and looks at the reasons why the avoiders are holding back.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Social Engineering in IT Security
sponsored by
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Cloud-based Identity and Access Management Security School
sponsored by
VIRTUAL ENVIRONMENT: Learn about the advantages of a cloud-centric identity and access management (IAM).
Posted: 25 Sep 2014 | Premiered: 25 Sep 2014

TOPICS:  Cloud Security

Plan Your Path to a Virtual Private Cloud
sponsored by Juniper Networks, Inc.
WEBCAST: This exclusive webcast will help you create a sound strategy for migrating to the private cloud.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014

Juniper Networks, Inc.

How Organizations Are Responding to Mobile and Cloud Threats
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores the results of a recent survey that sought to elucidate how organizations are adapting their approach to authentication to protect their sensitive assets as they adopt cloud-based services and BYOD.
Posted: 10 Dec 2014 | Published: 15 May 2014

SafeNet, Inc.

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE: This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

CIO Decisions: Artificial Intelligence in the Enterprise
sponsored by
EZINE: AI is not some far-off fantasy. Some experts predict that smart machines and robots will become so intertwined with business operations as to be indispensible—and some enterprises are already reaping the results.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

How to Bring Shadow IT into the Light - 8 Steps Along the Path
sponsored by Rackspace
WHITE PAPER: This white paper describes eight steps to help CIOs and other IT leaders to bring these potential risks to light. The key is to gain benefits from the cloud without risking your company's data.
Posted: 14 Oct 2014 | Published: 14 Oct 2014


Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013


Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011


Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013


Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

226 - 250 of 960 Matches Previous Page    8 9 10 11 12 13    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement