Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
26 - 50 of 859 Matches Previous Page  |  Next Page
Next-Generation Security in a Mobile Era
sponsored by SearchCIO.com
EBOOK: In this SearchCIO handbook, learn how enterprise mobility management and next-generation security tools can help your enterprise mitigate an ever-growing number of mobile risks.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

SearchCIO.com

Mobile SSO & the Rise of Mobile Authentication
sponsored by OneLogin
WHITE PAPER: In this white paper, uncover the top four considerations when defining your mobile and cloud identity strategy. Discover why Identity and Access Management (IAM)-as-a-Service (IDaaS) appears to be the golden ticket for organizations to get a handle on who can and can't access important data. Read on to learn more.
Posted: 11 Mar 2015 | Published: 25 Feb 2015

OneLogin

3 Requirements to Automate Cloud Provisioning
sponsored by OneLogin
WHITE PAPER: Check out this white paper to learn the three requirements to automating cloud provisioning and how to take the strain off of IT admins. View now to learn more.
Posted: 11 Mar 2015 | Published: 28 Jan 2015

OneLogin

Conquering the Top 5 AD Challenges
sponsored by OneLogin
WHITE PAPER: In thiw white paper, explore how one security platform connects your AD infrastructure and cloud applications to simplify and strengthen identity and access management (IAM).
Posted: 09 Mar 2015 | Published: 18 Feb 2015

OneLogin

5 Reasons to User Provision in the Cloud with Identity Management
sponsored by OneLogin
WHITE PAPER: In this white paper, the five reasons to user provision apps in the cloud with identity access management (IAM) software are revealed.
Posted: 09 Mar 2015 | Published: 04 Feb 2015

OneLogin

Explore Hybrid Cloud Computing's Uses and Best Practices
sponsored by NetApp
ESSENTIAL GUIDE: Inside this expert essential guide, explore the pros, cons, types, and benefits of hybrid cloud approaches. Learn what is driving enterprise IT to the hybrid cloud model and how to pick your hybrid cloud strategy's starting point based on public or private cloud computing. Find out how the enterprise market is shaping AWS hybrid cloud strategy.
Posted: 09 Mar 2015 | Published: 09 Mar 2015

NetApp

5 Threats Google Apps Can't Defend
sponsored by Datto, Inc.
WHITE PAPER: In this white paper, learn the five threats that Google can't defend and how to protect your data on your own. Read on now to learn more.
Posted: 06 Mar 2015 | Published: 04 Feb 2015

Datto, Inc.

Case Study: A Global 1000 Enterprise Adapts Its Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Top 13 Ways to Strengthen Google Apps Security and Compliance
sponsored by OneLogin
WHITE PAPER: In this white paper, you will learn the 13 steps to bolster Google Apps and cloud security and compliance.
Posted: 06 Mar 2015 | Published: 14 Jan 2015

OneLogin

Hybrid Cloud Model Enhances DNS Security
sponsored by Efficientip
WHITE PAPER: This white paper suggests one way to prevent DNS compromises – a hybrid cloud DNS server.
Posted: 05 Mar 2015 | Published: 31 Dec 2014

Efficientip

Five Reasons to Consider SaaS for Your Business Applications
sponsored by Oracle Corporation
WHITE PAPER: Access this in-depth white paper to explore 5 potential benefits of deploying an SaaS business application with minimal risk, low initial investment, and great flexibility.
Posted: 04 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation

The Complete Guide To Google Apps Security
sponsored by Datto, Inc.
WHITE PAPER: In this helpful guide, explore the available additional protection services and technologies for securing data stored in Google's cloud.
Posted: 04 Mar 2015 | Published: 07 Jan 2015

Datto, Inc.

Managed Cloud Environment Security FAQ
sponsored by Dimension Data
WHITE PAPER: Access this white paper to get answers to how security is maintained in multi-tenanted and dynamic environments.  Read on to explore how to evaluate the security of managed cloud environment providers.
Posted: 03 Mar 2015 | Published: 10 Sep 2014

Dimension Data

Shedding Light on the Cloud App Blind Spot
sponsored by Imperva
WHITE PAPER: Unfortunately, cloud applications can come with a large number of potentially hazardous blind spots. This white paper intends to shed light on these areas and will cover why traditional controls that secure your on-premise environment don't provide the required visibility into user activity and risks related to cloud app use.
Posted: 03 Mar 2015 | Published: 03 Mar 2015

Imperva

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Get the 5 security areas you needs to be concerned with when selecting the cloud system that's right for your business.
Posted: 03 Mar 2015 | Published: 31 Dec 2013

Oracle Corporation

Safeguarding Mobile, Cloud, and Social Access
sponsored by IBM
WHITE PAPER: In this white paper, explore a number of strategies and solutions for protecting your data from malicious attacks on new access channels.
Posted: 02 Mar 2015 | Published: 17 Sep 2014

IBM

Security predictions for 2015
sponsored by Imperva
WHITE PAPER: With the insight of security experts and the help of analytics tools, this white paper presents five security predictions for the 2015 security landscape.
Posted: 27 Feb 2015 | Published: 31 Jan 2015

Imperva

Cloud Planning Mistakes You'll Make in 2015
sponsored by Rackspace
EGUIDE: This expert e-guide from SearchCloudComputing.com examines common blunders that most organizations make during a cloud deployment – specifically when it comes to security, governance and performance.
Posted: 26 Feb 2015 | Published: 16 Feb 2015

Rackspace

The Value in Threat Intelligence Information
sponsored by Webroot
EGUIDE: This expert guide describes the pros and cons of threat intelligence and helps you decide if it's right for your company.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Webroot

Back to Basics: Securing Business Information on the Cloud
sponsored by Box
WHITE PAPER: View this white paper to learn how the cloud can enable us to go back to security basics to manage distributed computing.
Posted: 25 Feb 2015 | Published: 04 Feb 2015

Box

An Alternative to Today's Distributed Content Security Chaos
sponsored by Box
WHITE PAPER: View this resource to learn how cloud-based services can provide superior security compared to traditional built-out methods.
Posted: 25 Feb 2015 | Published: 05 Mar 2014

Box

Protecting your Data Strategy in the Cloud
sponsored by BitGlass
EGUIDE: In this expert e-guide, you will uncover how to adjust your cloud security strategy based on use and the vendor. Read on now to learn about new attack vectors and security complications.
Posted: 20 Feb 2015 | Published: 07 Jan 2015

BitGlass

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper tells you exactly what those precautions are and how to take them when dealing with the cloud.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Rackspace

7 Steps to Securing Healthcare Infrastructures Using a Cloud Security Plan
sponsored by NaviSite
WHITE PAPER: This resource outlines the 7 steps you need to follow in order to secure infrastructures using a cloud security plan. By adhering to the following seven-step plan, you can bank on a proven methodology for cost-effectively and securely leveraging cloud services.
Posted: 19 Feb 2015 | Published: 18 Feb 2015

NaviSite

Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus
26 - 50 of 859 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement