Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
26 - 50 of 821 Matches Previous Page  | Next Page
Research Report: Mobile Security Trends in the Workplace
sponsored by Bluebox
WHITE PAPER: In this informative report, get the facts on enterprise mobility trends and BYOD programs, and discover how organizations should adapt to this changing IT security landscape.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

Bluebox

ESG Research: Security Management and Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: The prevalent approach to security management and operations is to implement on an ad hoc and technology-focused basis. This haphazard approach is no longer adequate.  This report details the current state of the market and what to expect moving forward.
Posted: 15 Aug 2014 | Published: 30 Jun 2012

Hewlett-Packard Company

Building a Microsoft Windows Based Private Cloud
sponsored by Dell and Microsoft
WHITE PAPER: Explore this brief paper that explains the evolution to the private cloud, the importance that consolidation plays in cloud adoption, and essential Windows components needed to simplify management in your cloud.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

Private Cloud Infrastructures: The Basics
sponsored by Dell and Microsoft
WHITE PAPER: In this helpful resource, you'll get the basics on what IT departments need to know about private cloud networks, and how to implement them in your organization.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

Creating Efficiency through Private Cloud
sponsored by Dell and Microsoft
RESOURCE: Explore this step-by-step guide to your private cloud foundation that will help your organization improve visibility and reporting of resources, ensure security, access and governance, and more.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

For your eyes only: Endpoint data privacy in the cloud
sponsored by Druva Software
WEBCAST: This webcast provides encryption key management schemes, designed for the cloud so your organization is ensured endpoint data privacy in the cloud. Watch now and also find out key considerations for selecting cloud backup.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Druva Software

Insights from the 2013 IBM Chief Information Security Officer Assessment
sponsored by IBM
WHITE PAPER: This white paper reveals insights into the practices and behaviors that could best strengthen the role and influence of the modern security leader.
Posted: 14 Aug 2014 | Published: 31 Oct 2013

IBM

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Citrix

Combining Security and the Cloud to Enhance Your Business
sponsored by GFI Cloud
EBOOK: This resource highlights the views of several tech influencers pertaining to security and the cloud. Each person provides valuable insight and explains how to implement them both into your business.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

GFI Cloud

Insights on scaling network efficiency economically
sponsored by HP
WHITE PAPER: Expectations run high in today's bandwidth-intensive, always-on computing world. Users expect instant access to applications, fast-streaming videos, jitter-free voice, and Web pages that load in the blink of an eye. Failing to meet these expectations can have a significant impact.
Posted: 11 Aug 2014 | Published: 31 Dec 2012

HP

Cost effective cloud backup and recovery model
sponsored by Asigra
WEBCAST: There's been a lot of talk about the recently launched Recovery License Model (RLM), but how does it work?  What does it mean to someone in the backup and recovery industry?
Posted: 11 Aug 2014 | Premiered: Dec 2, 2013

Asigra

9 Things to Consider Before Choosing a Cloud Phone Provider
sponsored by ShoreTel
WHITE PAPER: Businesses today are turning to cloud phone systems more than ever, but how do you know which one is right for you?
Posted: 11 Aug 2014 | Published: 11 Aug 2014

ShoreTel

Case Study: FIS Global Partners with Asigra to Provide Clients Enhanced Secure Data Protection that Meets Compliance Mandates
sponsored by Asigra
WHITE PAPER: For financial services business, it's critical that client data remains accessible and securely stored. As business grows, you will need to upgrade your backup service portfolio with an advanced solution – but there are questions you should ask before choosing.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Asigra

Can Enterprises Count on the Cloud for Data Protection?
sponsored by HP Autonomy
WHITE PAPER: Read on to learn the key requirements of cloud protection for the enterprise.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

HP Autonomy

Shadow IT in the Enterprise
sponsored by Nasuni Corporation
WHITE PAPER: In this report, discover survey results from more than 1,000 enterprise users to give you a better sense of who is using Dropbox and for what purposes. Don't be surprised to learn that smartphone and tablet users are much more likely to use Dropbox – read on to find out more.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

Nasuni Corporation

Securing Your Company – Where Do You Start?
sponsored by NEC Corporation of America
WEBCAST: In this helpful webcast, learn how your organization can leverage new integrated IT solutions like managed security and cloud services and to improve your business's efficiency and security, and create value for your customers.
Posted: 06 Aug 2014 | Premiered: Aug 1, 2014

NEC Corporation of America

IaaS Public Clouds and the Perceived Security Threat
sponsored by Global Knowledge
WHITE PAPER: This important whitepaper reviews security concerns and discusses how the industry has dealt with them, and then explores how these same concerns can be mitigated with a proper cloud strategy.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

Global Knowledge

Confidence in cloud file sharing: How to be protected and productive
sponsored by Dropbox for Business
WEBCAST: Watch this video to find out how your business can be confident that its shared files are consistently protected.
Posted: 31 Jul 2014 | Premiered: Jul 31, 2014

Dropbox for Business

Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchSecurity.com

Build Your Own Virtual Infrastructure in 15 Minutes or Less
sponsored by Zentera Systems Inc.
VIDEO: Download this exclusive video now for information on a self-service fabric tool that will allow you to build your own virtual infrastructure in as little as 15 minutes.
Posted: 31 Jul 2014 | Premiered: 31 Jul 2014

Zentera Systems Inc.

Top 5 Reasons to Take Advantage of the Private Cloud Now
sponsored by Dell, Inc.
WHITE PAPER: In this expert paper, learn about 5 good reasons, from cost efficiencies to data protection, why your company should take advantage of the private cloud now.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Dell, Inc.

Challenges with Cloud Security?
sponsored by ComputerWeekly.com
RESOURCE: Cloud information security is an issue. Download an exclusive copy of Encryption in the Cloud & see why industry experts say that cloud encryption is the key to making cloud computing more attractive for potential users that are concerned with data security. To access this resource, simply take our brief Cloud Security Survey!
Posted: 30 Jul 2014 | Published: 30 Jul 2014

ComputerWeekly.com

AWS Security Best Practices: Define your Information Security Management System and a set of policies for data protection
sponsored by Amazon Web Services and Intel
WHITE PAPER: This white paper provides security best practices that will help you define your Information Security Management System (ISMS), and build a set of policies to protect your data and assets in the AWS cloud.
Posted: 24 Jul 2014 | Published: 30 Nov 2013

Amazon Web Services and Intel

AWS Case Study: Flipboard
sponsored by Amazon Web Services and Intel
CASE STUDY: In this case study, one social magazine company is helping its 100 million readers to discover, view, and share content across their social networks – and is adding a quarter of a million readers every day. Find out how Amazon Web Services (AWS) gives them the power and flexibility to thrive in the business marketplace.
Posted: 23 Jul 2014 | Published: 28 Jul 2014

Amazon Web Services and Intel

AWS Free Usage Tier Download: Gain Hands-on Experience with the AWS Cloud
sponsored by Amazon Web Services
TRIAL SOFTWARE: With AWS Free Tier, you can gain hands-on experience with a broad selection of AWS products and services, from a fully managed NoSQL database service with seamless scalability to cost-effective email-sending service in the cloud. Access this resource to learn more about AWS Free Tier benefits.
Posted: 23 Jul 2014 | Premiered: 23 Jul 2014

26 - 50 of 821 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement