Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
26 - 50 of 849 Matches Previous Page  |  Next Page
The Dawn of Hybrid Cloud WAF
sponsored by Radware
WHITE PAPER: This white paper outlines the 3 reasons why most clouds are shifting to a hybrid state, and how to protect them. Read on for important questions to ask during the migration process including, as well at an in-depth look at cloud WAF, application protection, and more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

Radware

Challenges and Strategies for the Collaborative, BYOD/Mobile Workforce
sponsored by BlackBerry
WEBCAST: This webcast demonstrates how to take mobile productivity to a new level by implementing secure communication and access to data behind the firewall or in the cloud. Learn how to optimize enterprise mobility management when you connect employees to data, apps, services, and of course, each other.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

BlackBerry

Take Back Control with Centralized Cloud Management
sponsored by Dimension Data
WHITE PAPER: This expert white paper examines how IT can help organizations take back control of the cloud by aggregating multiple cloud solutions and centralizing cloud management.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

Dimension Data

Best Practices for Keeping Enterprise Email Secure
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
EGUIDE: Access this expert eGuide to learn the best practices for evaluating cloud-based email security providers, and discover whether email security SaaS initiatives are really worth your interest.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

California Sets New Standard For IT With Shared Services
sponsored by NetApp
CASE STUDY: This case study explores how a large state agency implemented a cloud infrastructure to help unite 29 IT departments, lower costs, and increase data storage capacity.
Posted: 09 Jul 2015 | Published: 31 Dec 2014

NetApp

Top 4 Security Concerns of the SaaS Delivery Model
sponsored by SAP
WHITE PAPER: This white paper addresses security concerns brought forth by cloud and SaaS models, including identity management, data storage, and data transmission. Learn the imperatives of built-in security features when it comes to your deployment.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

SAP

Hybrid IT: The Cloud of the Future
sponsored by Datapipe
WHITE PAPER: This white paper explores the hybrid cloud model and its advantages over purely private or public approaches.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

Datapipe

Top 5 Reasons to Take Advantage of the Private Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This expert white paper details the top 5 reasons your organization should take advantage of the private cloud.
Posted: 07 Jul 2015 | Published: 30 Jul 2014

Dell, Inc. and Intel®

A Focus on Cloud Security, So You Can Focus on Business
sponsored by SAP
WHITE PAPER: This white paper stresses the critical importance of information protection in a cloud environment. Discover ways to implement security controls and practices in your SaaS strategy.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

SAP

Red Hat Security Infographic
sponsored by Red Hat
RESOURCE: This white paper outlines how open source security can protect a variety of environments, and make the job of a CIO easier. Read on to learn about open source's benefits and deicide if it's right for your business.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

Red Hat

Is Your Infrastructure Holding You Back?
sponsored by IBM
WHITE PAPER: This expert e-book will help you connect the dots between today's biggest business opportunities and the specific infrastructure technology required to seize them.
Posted: 06 Jul 2015 | Published: 31 Dec 2014

IBM

Ensuring Data Security in the Cloud and on Endpoints
sponsored by WinMagic
WEBCAST: This webcast explores the risks of cloud file sync and share services and how to ensure data protection in the cloud.
Posted: 01 Jul 2015 | Premiered: Jun 3, 2015

WinMagic

Office 365 Email Migration Surprises – Rhetoric vs. Reality
sponsored by Mimecast
WEBCAST: During this 30 minute webinar, Microsoft Office365 MVP J. Peter Bruzzese, will reveal the post migration surprises he's heard most frequently from companies that have already made the move. He'll provide his realistic assessment of what to expect and what to plan for when moving to the cloud.
Posted: 30 Jun 2015 | Premiered: Jun 3, 2015

Mimecast

Best Practices for Securing Your Cloud Email Service
sponsored by McAfee, Inc.
EGUIDE: This exclusive e-guide compares on-premises and cloud-based email security tools.
Posted: 29 Jun 2015 | Published: 24 Jun 2015

McAfee, Inc.

Data Protection in the Cloud: Are you Protecting Customers and Employees
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WEBCAST: In this webcast, you will learn the 7 questions to ask vendors to know the level of data protection to expect before migrating to the cloud.
Posted: 29 Jun 2015 | Premiered: Nov 20, 2014

BAE Systems Applied Intelligence (formerly SilverSky)

Identify, Mitigate Shadow IT with a Cloud Risk Assessment
sponsored by IBM
WHITE PAPER: This 50-attribute evaluation offers a snapshot of your data with insights on your organization's usage of cloud services and the risks associated with each service.
Posted: 29 Jun 2015 | Published: 31 Dec 2014

IBM

What Consumers Believe About Cloud File Sharing & Why That’s a Warning to IT Pros
sponsored by WinMagic
WHITE PAPER: This white paper explores the pros and cons of three file sync and share security strategies. Continue reading to learn the 3 crucial aspects for securing files destined for the cloud and how to appropriately evaluate the risks of cloud file sync and share approaches.
Posted: 26 Jun 2015 | Published: 20 Apr 2015

WinMagic

The Truth About Data-At-Rest Encryption & the Cloud
sponsored by FireHost Inc.
WHITE PAPER: This white paper explains why some methods of encryption are weaker than others and suggests ways to implement the strongest encryption standards for your data-at-rest.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

The True Cost of Cloud Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how higher security in the cloud is the ultimate cost savings measure, even if it appears costly up front.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

Get Control of Cloud Based File Synchronization Services
sponsored by Varonis
WHITE PAPER: In this white paper, discover how you can allow your employees to use file synchronization without putting your data at risk.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

How Secure Managed Cloud Services Mitigate Threats
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores why secure managed cloud services can mitigate threats more effectively than basic managed cloud providers.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Cloud provider security policies
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: This security classroom looks at cloud security options from a policy driven point of view.
Posted: 17 Jun 2015 | Premiered: 16 Jun 2015

TOPICS:  Cloud Security
SearchCloudSecurity.com

An Introduction to AWS Security
sponsored by Global Knowledge
WHITE PAPER: This white paper explains the most important aspects of AWS security and what that means to the enterprise.
Posted: 17 Jun 2015 | Published: 05 May 2015

Global Knowledge

When Worlds Collide: Networks and the Cloud Converge
sponsored by SearchNetworking.com
EBOOK: To get the most out of the cloud, to really make it work for you and your network, you must plan carefully. This three-part guide addresses many facets of this new landscape, preparing you to build your network in this cloud-driven future.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

TOPICS:  Cloud Security | WAN
SearchNetworking.com
26 - 50 of 849 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement