Cloud Security Reports

Effectively Mixing On-Premises and Cloud Resources
sponsored by TechTarget Data Center
EBOOK: Hybrid cloud best practices are evolving as organizations learn how to effectively blend on-premises IT with the cloud. This handbook explores the security issues, costs and the best uses for these hybrid cloud environments.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

TechTarget Data Center

Security: Communicating to the Board of Directors and Evaluating Vendors' Promises
sponsored by BitSight
EGUIDE: This informative e-guide provides expert advice on how to plan security assessment reports to effectively communicate key security elements to the board of directors. Inside, also discover how a vendor security checklist can help you weigh your security needs against vendors' claims.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight

How to Manage Cloud Resources from the Data Center
sponsored by Rackspace Technology
EGUIDE: This exclusive e-guide provides essential points every hybrid cloud management strategy should follow. Next, learn why hybrid cloud deployments are becoming the future cloud model for enterprises.
Posted: 01 Mar 2016 | Published: 25 Feb 2016

Rackspace Technology

Evaluating the Expanding Cloud Access Security Broker Market
sponsored by Symantec & Blue Coat Systems
EGUIDE: In this expert e-guide, learn how the CASB market is evolving and what to look for in a CASB. Also inside, discover a helpful evaluation guide and review one platform in particular to find out how it measures up.
Posted: 01 Mar 2016 | Published: 10 Feb 2016

Symantec & Blue Coat Systems

What Public and Hybrid Clouds Offer in the Cloud Market
sponsored by SimpliVity
EGUIDE: Public cloud adoption has grown significantly over the past few years, as even the most skeptical IT pros admit the technology is right for certain use cases. This exclusive e-guide details the benefits and drawbacks of both public cloud and hybrid cloud adoption.
Posted: 25 Feb 2016 | Published: 18 Feb 2016

SimpliVity

How to Build a Successful Hybrid Cloud Computing Model
sponsored by SimpliVity
EGUIDE: Hybrid clouds are becoming increasingly popular and projections indicate that many enterprises will be reviewing and/or adopting hybrid cloud deployments this year. Access this guide to learn about three key functions to consider and how to build the most effective hybrid cloud for your enterprise.
Posted: 24 Feb 2016 | Published: 19 Feb 2016

SimpliVity

How to Tackle Hybrid Cloud Challenges and Construct a Solid Governance Strategy
sponsored by Presidio
EGUIDE: This e-guide highlights expert tips on tackling hybrid cloud challenges surrounding security and compliance, account management and billing, and resource provisioning. Read on to learn how your enterprise can take advantage of public cloud by implementing a reliable, compliant hybrid cloud strategy.
Posted: 18 Feb 2016 | Published: 08 Feb 2016

Presidio

The Need-to-Know of Today's Cloud Security
sponsored by TechTarget Cloud Computing
EBOOK: In this handbook, you will examine several common cloud security conundrums, emphasizing the importance of identity and access management (IAM) in the cloud and scrutinizing the role of data encryption. If your organization is serious about securing workloads in the cloud, read on now to learn the specific vulnerabilities cloud APIs introduce.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

TechTarget Cloud Computing

The Making of a Cloud Security Culture
sponsored by Trend Micro, Inc.
EGUIDE: This e-guide emphasizes the importance of cultivating a cloud security culture and discusses the key benefits and differences between public and hybrid cloud. Access now to learn how your organization can achieve a secure cloud environment.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

Trend Micro, Inc.

Find the Right EFSS to Secure Employee File Sharing
sponsored by Trend Micro, Inc.
EGUIDE: This e-guide gives you a way to solve your enterprise file synchronization and sharing needs.
Posted: 16 Feb 2016 | Published: 10 Feb 2016

Trend Micro, Inc.

Cloud Deployment Elucidates Pros and Cons for Legacy Applications
sponsored by Oracle Corporation
EGUIDE: There are many common mistakes organizations make when deploying applications in the cloud—and each differs in severity. Read on to discover several commonplace mistakes made in cloud application deployment, as well as determine the pros and cons of legacy applications that the cloud elucidates.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Oracle Corporation

Building a Successful Hybrid Cloud Strategy
sponsored by Presidio
EGUIDE: This complimentary e-guide provides expert advice for building a hybrid cloud strategy and discusses the importance of moving applications to the cloud to start off the migration process. Read on to learn what management tools and cloud migration strategies can help your enterprise implement a successful cloud architecture.
Posted: 11 Feb 2016 | Published: 08 Feb 2016

Presidio

Top 3 Cloud Security Developments
sponsored by TechTarget Security
EBOOK: This Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.
Posted: 09 Feb 2016 | Published: 29 Apr 2016

TechTarget Security

CW Europe – Forecast: Cloudy with Dry Spells
sponsored by TechTarget ComputerWeekly.com
EZINE: In Europe cloud is restricted and hybrid setups make use of local compute and storage.
Posted: 09 Feb 2016 | Published: 08 Feb 2016

TechTarget ComputerWeekly.com

Monitoring that Cloudy Network
sponsored by TechTarget Security
EBOOK: Security pros using continuous security monitoring techniques can learn from federal programs, but must also keep up with technical advances like hybrid cloud. In this guide, learn how to adapt and advance your security monitoring efforts.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

TechTarget Security

Under Attack? 2016 Defenses Escape Compromise
sponsored by TechTarget Security
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

TechTarget Security

Computer Weekly – 12 January 2016: How open source is beating proprietary software
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide assesses the impact of open source software and how it is underpinning the digital revolution. We examine the prospects for cloud in financial services as regulators give their approval. And we ask if Uber is really part of a new business model for the sharing economy. Read the issue now.
Posted: 08 Jan 2016 | Published: 12 Jan 2016

TechTarget ComputerWeekly.com

Computer Weekly – 27 October 2015: Blockchain Sparks Change in Banking Industry
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, find out why blockchain, the technology that underpins bitcoin, is making waves in the banking sector. Also learn why EasyJet says digital is increasingly important for airlines, and take a look at the forces driving digital disruption and why some sectors are changing faster than others.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

TechTarget ComputerWeekly.com

Information Security Magazine: October Issue
sponsored by TechTarget Security
EZINE: In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

TechTarget Security

Best Practices: Laptop and Mobile Backups Today
sponsored by TechTarget Data Backup
EBOOK: This handbook offers insight into what's available today for laptop and mobile backup, how vendors are addressing the challenges associated with backing up these devices and how to choose a solution that's right for you and your needs.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

TechTarget Data Backup

Addressing Remote and Endpoint Backup Challenges with the Cloud
sponsored by TechTarget Data Backup
EBOOK: This handbook provides you with an overview of challenges associated with remote data protection and the products available today to address them. Read on now to address your endpoint data protection concerns, as well as how to choose the right cloud endpoint backup products for your organization.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

TechTarget Data Backup

Your Role in AWS Security
sponsored by TechTarget Search AWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

TechTarget Search AWS

Addressing Remote and Endpoint Backup Challenges with the Cloud
sponsored by TechTarget Data Backup
EBOOK: This handbook provides you with an overview of challenges associated with remote data protection and the products available today to address them. Read on now to address your endpoint data protection concerns, as well as how to choose the right cloud endpoint backup products for your organization.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

TechTarget Data Backup

Taking Inventory of the Cloud
sponsored by TechTarget CIO
EZINE: This edition of CIO Decisions e-zine delves into the importance of cloud inventory management for reigning in rogue cloud apps and the associated costs. Explore how CIOs are tracking cloud app use to determine app consolidation needs and to realize a better ROI.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

TechTarget CIO

Storage Magazine, August 2015
sponsored by TechTarget Storage
EZINE: Storage magazine's August 2015 issue explores building an on-prem cloud, looks at today's backup applications, and shares ways to improve the disaster recovery planning process.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

TechTarget Storage