Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
26 - 50 of 876 Matches Previous Page  | Next Page
A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

The PaaS Payoff: Greater Agility, Less Cost
sponsored by Red Hat
WHITE PAPER: This exclusive report points to research from UBM Tech that reveals how many IT decision makers are addressing these challenges with the help of Platform as a Service (PaaS). Learn more about the top reasons why organizations are harnessing PaaS, and why it is becoming the go-to strategy for modern business.
Posted: 07 Nov 2014 | Published: 31 Aug 2014

Red Hat

State of the market Enterprise Cloud 2014
sponsored by Zscaler & Verizon
WHITE PAPER: Access this informative guide to navigate the developing landscape of cloud computing. You'll get insight into topics such as new developments in cloud security, the increasing variety of cloud services available today, the growing use of cloud for external-facing production applications, and more.
Posted: 07 Nov 2014 | Published: 31 Oct 2014

Zscaler & Verizon

Security Solutions for the Application Economy
sponsored by CA Technologies.
VIDEO: This video explores a leading solution for securing users's identities across all applications and devices.
Posted: 06 Nov 2014 | Premiered: 06 Nov 2014

CA Technologies.

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Trends in Data Centric Security
sponsored by Intel® Services
WHITE PAPER: This white paper discusses Data Centric Security, which protects data when it is shared across multiple platforms, systems, or data centers by focusing security controls onto the data itself, rather than relying on the underlying infrastructure to keep it out of the wrong hands.
Posted: 05 Nov 2014 | Published: 14 Sep 2014

Intel® Services

How to Bring Shadow IT into the Light - 8 Steps Along the Path
sponsored by Rackspace
WHITE PAPER: This white paper describes eight steps to help CIOs and other IT leaders to bring these potential risks to light. The key is to gain benefits from the cloud without risking your company's data.
Posted: 05 Nov 2014 | Published: 14 Oct 2014

Rackspace

CIO Decisions: Artificial Intelligence in the Enterprise
sponsored by SearchCIO.com
EZINE: AI is not some far-off fantasy. Some experts predict that smart machines and robots will become so intertwined with business operations as to be indispensible—and some enterprises are already reaping the results.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchCIO.com

Why and how to choose the right cloud backup vendor.
sponsored by Hewlett-Packard Limited
WHITE PAPER: Read this whitepaper to find out why you should move to cloud-based data protection.
Posted: 04 Nov 2014 | Published: 08 Mar 2013

Hewlett-Packard Limited

Piecing Together the Hybrid Cloud Management Puzzle
sponsored by VMware
EGUIDE: This expert e-guide offers steps and tips to truly cash in on the benefits of a hybrid cloud, such as low cost and scalability, through proper management. Read on to discover to determine if you have a true hybrid cloud and how to conquer deployment issues.
Posted: 31 Oct 2014 | Published: 01 Oct 2014

VMware

This Year's Best Advice on Building, Managing the Hybrid Cloud Model
sponsored by VMware
EGUIDE: This expert e-guide provides advice for building and managing the hybrid cloud model.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

VMware

Why Cloud Encryption Requires a Unique Set of Considerations
sponsored by CipherCloud
EGUIDE: In this expert e-Guide take a look at how encryption is handled in some common cloud computing architectures. In addition Forrester analyst James Staten details the importance of the 'bring your own encryption' (BYOE) fad as a cloud security model.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

CipherCloud

Selecting The Right Cloud Deployment (with Security in Mind)
sponsored by CDW Corporation
VIDEO: Watch this informative video to learn the important steps for selecting and implementing the right cloud infrastructure for your business, and also learn about the top concern with implementing the cloud – security.
Posted: 29 Oct 2014 | Premiered: 24 Jun 2014

CDW Corporation

Imagine what the Cloud Can Do For You
sponsored by CDW Corporation
RESOURCE: Dive into this infographic that describes how the cloud can help you stay safe in the face of threats, while enhancing business productivity.
Posted: 28 Oct 2014 | Published: 28 Oct 2014

CDW Corporation

How to Strategically Use the Cloud for More than Cost Savings
sponsored by CDW Corporation
WHITE PAPER: Access this resource to learn how cloud provides ready access to advanced mobile, social, Big Data and analytic resources, and can help your organization achieve sustainable competitive advantage by transforming how you operate internally and deliver value to users.
Posted: 28 Oct 2014 | Published: 28 Oct 2014

CDW Corporation

Best Practices to Help Overcome Cloud Security Concerns
sponsored by CDW Corporation
WHITE PAPER: This report gives your IT shop a better understanding of the threats against cloud technologies, as it highlights 9 top threats along with their implications to enterprise security and possible solutions to address each threat.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

CDW Corporation

Moving to the Cloud? How A Managed Services Provider Can Help
sponsored by Rackspace
WHITE PAPER: Access this expert resource to learn how a managed services provider can help you on your move to the cloud. You'll get insight into how managed service providers can help you with product selection, scalability, and shifting workloads to the cloud as well as ensuring cloud security.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

Rackspace

Best Practices to Help Overcome Cloud Security Concerns
sponsored by CDW Corporation
WHITE PAPER: This report gives your IT shop a better understanding of the threats against cloud technologies, as it highlights 9 top threats along with their implications to enterprise security and possible solutions to address each threat.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

CDW Corporation

Fundamentals of the Hybrid Cloud Computing Model
sponsored by VMware
EGUIDE: Take a look at how this exclusive e-guide explores the key fundamentals of the hybrid cloud model and how security, connectivity, and portability play a key role in integrating a public cloud with a private cloud.
Posted: 24 Oct 2014 | Published: 30 Sep 2014

VMware

Securing Web Services with HID
sponsored by HID
VIDEO: This quick video provides a few case studies concerning an active authentication system that leverages cloud-based threat detection to provide secure access to web-based apps and keep critical end-user information safe.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

HID

Embracing SaaS: A Blueprint for IT Success
sponsored by IBM
WHITE PAPER: This white paper explains how implementing software as a service (SaaS) boosts your company's performance agility and enables your IT team to handle tasks without headaches.
Posted: 23 Oct 2014 | Published: 30 Apr 2014

IBM

Best Practices for Deploying Cloud
sponsored by Scalr
EGUIDE: This expert e-guide reveals why cloud industry expert David Linthicum believes clouds are more secure than traditional IT systems, as well as hybrid clouds taking over in the future.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Scalr

Evolving Security for a Maturing Cloud
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: Join ISACA and TechTarget for a virtual seminar on December 9th and come away with insight into the risks, strategies, and solutions that comprise the current cloud security landscape.
Posted: 22 Oct 2014 | Premieres: 09 Dec 2014

SearchSecurity.com

Taming Shadow IT
sponsored by BitGlass
WHITE PAPER: This white paper offers an in-depth guide book to IT security in regards to cloud computing and applications.
Posted: 21 Oct 2014 | Published: 21 Oct 2014


Security in the Hybrid Cloud, Now and in 2016
sponsored by F5 Networks
RESOURCE: The infographic illustrates current security practices in the hybrid cloud and investigates where these trends are likely to head by 2016.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

F5 Networks
26 - 50 of 876 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement