Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
26 - 50 of 824 Matches Previous Page  |  Next Page
How You Can Deliver Scalable, Graphics-Rich Virtual Desktops
sponsored by NVIDIA
WHITE PAPER: Download and discover how NVIDIA is redefining virtualization by delivering quality interactive visual experiences with a GPU that can be implemented at scale. Read on and learn how you can gain a competitive edge with all the technology you need to fully virtualize enterprise computing.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

NVIDIA

Think You are Safe from DDoS Attacks?
sponsored by Neustar®
WHITE PAPER: This white paper examines the repercussions of relying solely on firewalls and IPS/IDS to attempt blocking DDoS attacks. View now to learn the steps to take to protect sensitive data stored in the cloud.
Posted: 02 Jun 2015 | Published: 06 May 2015

Neustar®

CISOs' Best Practices for Building Cloud Security Strategy with Confidence
sponsored by IBM
RESOURCE: This infographic presents the top 4 cloud security elements you need to include in your strategy. Continue reading to learn how to mitigate risk in your cloud environment whether it's SaaS, IaaS, or PaaS.
Posted: 01 Jun 2015 | Published: 17 Dec 2014

IBM

The Value of Cloud and Data Security
sponsored by Trend Micro
WHITE PAPER: In this white paper, you'll learn about a simple, comprehensive approach to server security that proves serious economic value for any company.
Posted: 22 May 2015 | Published: 22 May 2015

Trend Micro

Avoid Breaches: Cloud-Based Application Security
sponsored by Hewlett-Packard Company
EGUIDE: This expert e-guide reveals the 3 key best practices for preventing cloud-app security breaches and patching vulnerabilities. Learn how to use such technologies as encryption, sandboxing, and log monitoring to ensure data protection.
Posted: 22 May 2015 | Published: 01 Apr 2015

Hewlett-Packard Company

Security, Storage, and Collaboration Gains from Cloud Solutions
sponsored by Box
WHITE PAPER: Access this white paper to learn how Avago Technologies implemented a new cloud file sync and share service, yielding greater business agility, infrastructure cost-savings and simplified management for greater security.
Posted: 21 May 2015 | Published: 31 Jul 2014

Box

6 Major Trends Shaping the Future of Security
sponsored by Box
WHITE PAPER: This white paper outlines the 6 major trends that are changing IT security as we know it.
Posted: 20 May 2015 | Published: 20 Feb 2014

Box

Box bolsters Security Credibility with Customer-Managed Encryption Key Offering
sponsored by Box
RESOURCE: Access this resource to learn about EKM and how customer managed keys further improve the security offered by cloud service providers.
Posted: 20 May 2015 | Published: 20 May 2015

Box

Capitalize on a Big Opportunity: Move Enterprise Services to the Cloud
sponsored by Dimension Data
WHITE PAPER: Access this informative guidebook to learn how you can build a successful enterprise cloud solution.
Posted: 20 May 2015 | Published: 20 May 2015

Dimension Data

What Are Enterprises Really Doing with File Sync and Share Systems?
sponsored by Box
WHITE PAPER: Access this white paper to learn what businesses are really doing with EFSS. Explore further to find out about the most common use case for Enterprise File Sync and Share, as well as challenges posed such as security, compliance, and data privacy.
Posted: 20 May 2015 | Published: 12 Sep 2014

Box

Top 10 Data Security Mistakes to Avoid
sponsored by EE
WHITE PAPER: This insightful white paper presents the top 10 common security mistakes that countless organizations have made recently.
Posted: 18 May 2015 | Published: 08 Apr 2015

EE

Securing Cloud Computing: How to Evaluate Providers
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, explore the state of security in the cloud. Continue reading to reveal a 21 questions-to-ask checklist of leading security practices for protecting sensitive data in the cloud.
Posted: 14 May 2015 | Published: 17 Dec 2014

IntraLinks, Inc

Next Generation Cloud Security
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec Corporation

Cloud Identity Access: Bridging the Gap between IT and Users
sponsored by Symantec Corporation
RESOURCE: Organizations are struggling to secure rogue cloud apps as users work remotely on a myriad of devices.  This white paper presents the challenges of securing cloud apps data and offers insights into facilitating harmony between users and IT.
Posted: 12 May 2015 | Published: 25 Mar 2015

Symantec Corporation

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

Head in the Hybrid Clouds
sponsored by SearchCloudComputing.com
EBOOK: Hybrid clouds are the way forward for many organizations, once key obstacles are overcome in the planning process.
Posted: 11 May 2015 | Published: 11 May 2015

SearchCloudComputing.com

IAM - The Foundation of Cloud Security
sponsored by Symantec Corporation
WHITE PAPER: This brief white paper examines key components for an effective IAM program to protect your sensitive data from unauthorized access.
Posted: 08 May 2015 | Published: 11 Dec 2014

Symantec Corporation

Optimizing The Hybrid Cloud: Extending Your Enterprise WAN to Infrastructure as a Service
sponsored by Silver Peak
WHITE PAPER: Access this white paper now to learn how IaaS deployments can impact the network and discover a more efficient approach to consistent hybrid WAN architecture.
Posted: 07 May 2015 | Published: 23 Mar 2015

Silver Peak

Five Design Principles of an Effective Endpoint Security Strategy
sponsored by Absolute Software
WEBCAST: Access this webinar and learn about zero-day malware and other alarming virtual pests that pose a threat to organizations. Uncover the five design principals, by way of Forrester Research, that indicate an effective endpoint strategy.
Posted: 06 May 2015 | Premiered: Sep 17, 2014

Absolute Software

Hybrid Cloud—A Better DDoS Defense
sponsored by F5 Networks
WHITE PAPER: This white paper explores how a hybrid cloud solution can get you an on-premises method to shield your organization from DDoS attacks.
Posted: 06 May 2015 | Published: 06 May 2015

F5 Networks

The Rise of the Hybrid WAN: Meeting the Challenge of the Cloud
sponsored by Silver Peak
WHITE PAPER: Read this white paper to learn more about how organizations are embracing the hybrid cloud.
Posted: 06 May 2015 | Published: 23 Mar 2015

Silver Peak

Getting the most out of your cloud deployment
sponsored by BitDefender
WHITE PAPER: In this white paper, discover tips for efficiently transitioning to the cloud and ensuring cloud application security.
Posted: 28 Apr 2015 | Published: 31 Dec 2014

BitDefender

Critical Factors to Endpoint Security
sponsored by Dell and Microsoft
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell and Microsoft

Enterprise Development in the Cloud: Top Benefits, Drivers, and Concerns
sponsored by Red Hat
WHITE PAPER: According to a survey of 408 enterprise IT software development professionals, enterprises using the cloud see improvements in time to market as well as higher productivity. Read this white paper for key findings from this survey regarding enterprise development in the cloud.
Posted: 21 Apr 2015 | Published: 17 Jun 2014

Red Hat

Navigating the Cloud for MSPS
sponsored by Solarwinds N-able
EGUIDE: In this E-Guide you will find the synopsis of a MSPAlliance webinar about security risks for your MSP.  Also included is a discussion of five cloud security issues facing MSPs.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Solarwinds N-able
26 - 50 of 824 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement