Cloud Security Reports

Cloud app management -- from migration to monitoring
sponsored by TechTarget Cloud Computing
EGUIDE: In this e-guide, discover which apps are right for the cloud and the keys to cloud application migration. Also, get an insider's look into the latest cloud application trends that you can capitalize on.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

TechTarget Cloud Computing

Best practices for hybrid cloud management
sponsored by TechTarget Cloud Computing
EGUIDE: This e-guide will provide you with a roadmap to help you piece together the hybrid cloud management puzzle. Learn about the keys to a solid hybrid cloud management strategy, how to avoid hybrid cloud security hurdles, cross-platform tools to use, and much more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

TechTarget Cloud Computing

Traditional vs. Cloud Management Tactics
sponsored by TechTarget Cloud Computing
EGUIDE: In this e-guide, you'll discover the differences between traditional management tactics and cloud management strategies. Access now and also learn how to integrate another layer of performance data into the central system to deal with the complexity of cloud.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

TechTarget Cloud Computing

How should our team manage data stored in the cloud?
sponsored by TechTarget Cloud Computing
EGUIDE: This informative e-guide reveals expert tips for cloud managers to ensure that the provider's management tools mesh well with your enterprise's needs. Learn why you should look for management features beyond security controls for effective cloud storage.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

TechTarget Cloud Computing

Learn to Make File Sync and Share Fit Your Enterprise
sponsored by IBM
EBOOK: Download and discover how to evaluate enterprise file sync-and-share options with analyst insight and tips for successful implementation. Read on to learn more about the top five EFSS challenges, why it's time to redefine the market, and more.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

IBM

When Worlds Collide: Networks and the Cloud Converge
sponsored by TechTarget Networking
EBOOK: To get the most out of the cloud, to really make it work for you and your network, you must plan carefully. This three-part guide addresses many facets of this new landscape, preparing you to build your network in this cloud-driven future.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

TOPICS:  Cloud Security | WAN
TechTarget Networking

Head in the Hybrid Clouds
sponsored by TechTarget Cloud Computing
EBOOK: This expert e-book discusses the 3 fundamentals of effective hybrid cloud management—security, account management/billing, and resource provisioning. Read on to learn industry tricks and tips to keep in mind during the building process, as well as strategies for monitoring application performance.
Posted: 11 May 2015 | Published: 11 May 2015

TechTarget Cloud Computing

How Box Balances Security with Usability
sponsored by Box
EGUIDE: In this in-depth e-guide, explore the differences between Box and Dropbox for enterprise-use, and learn how online file-sharing apps are attempting to strike the perfect balance between usability and securty.
Posted: 21 Mar 2015 | Published: 21 Mar 2015

Box

Next-Generation Security in a Mobile Era
sponsored by TechTarget CIO
EBOOK: Mobile security isn't just a matter investing more in security technologies. Access this handbook to learn what CIO expert Harvey Koeppel thinks it will take to reformulate your mobile security strategy and tackle today's mobile risks. Also uncover the top 10 mobile security risks, a 7-point checklist for guarding mobile apps and devices, and more.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TechTarget CIO

How to Deliver Cloud-Enabled Video Conferencing Services
sponsored by TechTarget Networking
EBOOK: This e-guide discusses ways that you can better implement and manage video conferencing to your organization, particularly via the cloud.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

TechTarget Networking

In Cloud Storage, Options Abound
sponsored by TechTarget Cloud Computing
EBOOK: Examine cloud-based storage in terms of cost, manageability, security and latency/availability.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

TechTarget Cloud Computing

Securing Your Cloud Deployment with Today's Top Strategies
sponsored by TechTarget Security
EZINE: In this Insider Edition, InfoSec Pros will learn how to achieve better cloud security. It reviews existing cloud security standards and how to assess, and manage, the risk of a cloud deployment.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

TechTarget Security

Application Security in the Age of Cloud, BYOD, and SaaS
sponsored by BitGlass
WHITE PAPER: This white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

BitGlass

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Go Hybrid and Get the Best of Both Worlds in the Cloud
sponsored by TechTarget Storage
EBOOK: This technical handbook offers practical advice on how to implement hybrid cloud storage in a way that works for you today and in the future. Discover cloud storage use cases, practical steps on the hybrid journey, and more.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

TechTarget Storage

AWS billing prompts use of third-party cloud cost analysis tools
sponsored by TechTarget Search AWS
EGUIDE: This e-guide highlights how companies, such as Cloudyn Ltd., help companies identify spending patterns and create financial forecasts to keep the financial planning process under control. Learn more about how big data analytics can help consolidate AWS billing accounts.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

TechTarget Search AWS

Protecting This House: IT's Role in Cloud Security
sponsored by TechTarget Cloud Computing
EBOOK: Having a clear-cut cloud governance strategy helps ease administrative issues for IT and allows organizations to proactively protect their data.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

TechTarget Cloud Computing

Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE: This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

CIO Decisions: Artificial Intelligence in the Enterprise
sponsored by TechTarget CIO
EZINE: AI is not some far-off fantasy. Some experts predict that smart machines and robots will become so intertwined with business operations as to be indispensible—and some enterprises are already reaping the results.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

TechTarget CIO

How to Bring Shadow IT into the Light - 8 Steps Along the Path
sponsored by Rackspace Technology
WHITE PAPER: This white paper describes eight steps to help CIOs and other IT leaders to bring these potential risks to light. The key is to gain benefits from the cloud without risking your company's data.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Rackspace Technology

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM