Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
26 - 50 of 1076 Matches Previous Page  |  Next Page
How to Conquer the Biggest AWS Adoption Challenges
sponsored by Palerra Inc.
WHITE PAPER: Managing a large cloud infrastructure takes much more IT resources and expertise than previously anticipated. In this white paper discover how to conquer the biggest challenges enterprises encounter when adopting AWS.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palerra Inc.

Use Secure Cloud and Scalability to Revolutionize B2B Payments Market
sponsored by Armor
WHITE PAPER: Learn how to speed up the collection of not only payments, but also account data, and apply it to unique business rules and processes in an automated fashion. Uncover how to not only secure back-end payment systems, but also protect information the moment it enters the payment stream.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Armor

Azure Security and Identity Management Best Practices
sponsored by Rackspace
WEBCAST: Watch this free on-demand webinar and learn how to develop an identity and authentication cloud strategy, use Azure as your base infrastructure, develop a core set of VM best practices, and leverage security managed services for security operations and compliance assistance.
Posted: 12 Aug 2016 | Premiered: Aug 12, 2016

Rackspace

Secure Access for K-12 Education
sponsored by Fortinet, Inc.
RESOURCE: Learn how classrooms and networks with specific needs can benefit from secure wireless networking without excessive cost or loss of features. Access now to learn how you can support BYOD, guard against malicious attacks, malware and viruses, and completely control application usage.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Fortinet, Inc.

Cloud Access Security Brokers Fill Critical Enterprise Void
sponsored by Palerra Inc.
EGUIDE: In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

How the Cloud Access Security Broker Space Is Evolving
sponsored by Palerra Inc.
EGUIDE: The cloud access management broker (CASB) space is moving quickly to meet the need for modern cloud security. In this e-guide, discover some expert advice from consultant Rob Shapland on obstacles for enterprises to consider before selecting a CASB platform.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Cloud Security Automation: Are We Up To The Task?
sponsored by Palerra Inc.
EGUIDE: In this e-guide, learn how to bridge the divide between DevOps and security. Discover how to fix the security problems encountered when leveraging the agility of the cloud.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

How the Top Nine Private Cloud Software Suites Stack Up
sponsored by Red Hat
ANALYST REPORT: This report assesses the state of the private cloud market and identifies the top nine private cloud software providers and how they stack up against each other. Also, read on to see how private cloud computing has changed over the years, and discover the top trends in the private cloud market today.
Posted: 11 Aug 2016 | Published: 19 Jan 2016

Red Hat

Ansible In Depth: A Playbook for Complex IT Orchestration
sponsored by Red Hat
WHITE PAPER: Discover in this white paper an in-depth overview of IT configuration management, deployment, and orchestration tool Ansible, accessible for all skill levels and purpose-built for easily deploying workloads to public and on premise clouds.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Red Hat

Cloud Security Spotlight Report
sponsored by Palerra Inc.
WHITE PAPER: This comprehensive research report explores the specific drivers and risk factors of cloud infrastructure, how organizations are using the cloud, whether the promise of the cloud is living up to the hype, and how organizations are responding to the security threats in these environments.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Overcome the Limitations of Traditional Cloud Security for Office 365
sponsored by Palerra Inc.
WHITE PAPER: See how you can take a modern approach to securing your Office 365 data without the performance bottlenecks of traditional inline solutions. Uncover how your enterprise can increase visibility, improve threat detection, continuously monitor configuration and activities for compliance, as well as provide automated incident response and remediation.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Palerra Inc.

Using Hybrid Cloud Strategy to Drive Business Value
sponsored by IBM
WHITE PAPER: 72% of businesses in the United States have adopted a cloud-first approach to new service deployment. This analysis outlines the business value of a hybrid cloud strategies and how advisors can help businesses realize that value. Take a look at the benefit of integrating a hybrid environment in the enterprise and what to look for in a provider.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Hybrid Cloud Is About Choice
sponsored by IBM
RESOURCE: Hybrid cloud computing integrates cloud resources with traditional IT infrastructure to ensure security, high performance, and accelerated application delivery. Discover how you can leverage hybrid cloud to become more agile and support new business models.
Posted: 10 Aug 2016 | Published: 08 Jul 2016

IBM

Flash-Accelerated and Cloud-Ready: New Storage Requirements for Enterprise Apps
sponsored by NetApp
WHITE PAPER: Hybrid cloud and flash storage is the new power couple in the IT world, but many still have questions regarding their compatibility. Discover Eric Burgener's answers to the top 5 questions posed by those critical of cloud-enabled flash, and learn how to reap the most benefits from this new fusion.
Posted: 10 Aug 2016 | Published: 31 Dec 2015

NetApp

Stairway to the Cloud
sponsored by Nokia
APPLICATION NOTE: Building a private cloud architecture can be a daunting task. However, if the task is broken down into specific steps, then the construction process can be methodically executed. Access this application note that contains a 9-step blueprint to a private cloud architecture that provides a solid baseline foundation.
Posted: 10 Aug 2016 | Published: 30 Jun 2016

Nokia

Securing Cloud Environments: Policy-Based Security Automation and Microsegmentation Overview
sponsored by Nokia
WHITE PAPER: If you're not enabling your SDN with a virtualized services platform then you may not be able to meet the networking and security challenges imposed by the cloud. Access this white paper that highlights one platform that can extend the benefits of SDN from networking to security policy management and orchestration, ensuring success in the cloud.
Posted: 10 Aug 2016 | Published: 31 Dec 2015

Nokia

Spotlight on Insider Threats to Cloud Applications
sponsored by Palerra Inc.
WHITE PAPER: In this quick infographic, get a solid understanding of the makeup of insider threats to the cloud, why they are on the rise, and how to mitigate your enterprise's vulnerability to them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

Palerra Inc.

Cloud API and DR Questions Answered
sponsored by Hewlett Packard Enterprise
EGUIDE: APIs are the lifeline between enterprise applications within cloud environments and cloud disaster recovery is becoming a popular option as cloud adoption grows. In this e-guide, learn the answers to frequently asked questions about proper API and disaster recovery set up and management.
Posted: 10 Aug 2016 | Published: 08 Aug 2016

Hewlett Packard Enterprise

Guide to Common Cloud Computing Questions
sponsored by Hewlett Packard Enterprise
EGUIDE: This eGuide will helps you address your organization's security needs and bust the most common cloud computing myths wide open. Gain an understanding of what cloud computing actually is and what it can deliver for your organization.
Posted: 09 Aug 2016 | Published: 08 Aug 2016

Hewlett Packard Enterprise

How to Quantify the Value of a Cloud Access Security Broker
sponsored by Palerra Inc.
WHITE PAPER: In this white paper uncover the reasons why Cloud Access Security Brokers are a crucial piece of any enterprise's security policy and how to make sure you're getting cloud security added into your budget.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

Palerra Inc.

How to Make AWS Security as Agile and Effective as your AWS Environment
sponsored by Palerra Inc.
WHITE PAPER: Discover how to secure you AWS and bring it in line with the speed that your enterprise is now working at. Learn how automation is the key: conventional security is a roadblock to innovation and how organizations cannot afford the time it takes to detect and fix security defects at the end of a release cycle.
Posted: 05 Aug 2016 | Published: 05 Aug 2016

Palerra Inc.

Simplify Cloud Access and Provisioning with a Federated Identity Service
sponsored by Radiant Logic, Inc.
WEBCAST: Delve into the identity integration issues that arise when enterprises connect to cloud applications. Discover how to overcome the challenges by creating a place to authenticate users, utilize a global reference image to provision to cloud apps, and simplify the management of users and groups.
Posted: 05 Aug 2016 | Premiered: Feb 19, 2016

Radiant Logic, Inc.

Empower Your Infrastructure and Conquer Complexity with Identity Services
sponsored by Radiant Logic, Inc.
RESOURCE: Access this resource to learn how to empower your infrastructure by implementing effective identity management policies.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

Radiant Logic, Inc.

Unlocking the Hybrid Cloud Management and Security Puzzle
sponsored by BT
EGUIDE: Managing the hybrid cloud means covering all of your bases from having a solid cloud management strategy to security. This is especially important for financial organizations. In this e-guide, find out why a strong cloud security strategy is crucial to financial organizations and fundamentals to consider before adopting a hybrid cloud.
Posted: 04 Aug 2016 | Published: 27 Jul 2016

BT

Overcome Identity Integration Challenges
sponsored by Radiant Logic, Inc.
RESOURCE: In this infographic, get a quick grasp of how you can easily integrate identity using a federated identity service based on virtualization. Learn how you can manage groups dynamically, join attributes from all sources to build global user profiles, and more.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

Radiant Logic, Inc.
26 - 50 of 1076 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement