Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
51 - 75 of 1075 Matches Previous Page  |  Next Page
Extending Backup to the Cloud
sponsored by Veeam Software
WHITE PAPER: Simplify your move to the cloud with fast backup, granular recovery, and automatic transfer of backup data. Access now to see how you can achieve new levels of availability and storage efficiencies for your mission-critical virtual environments with this data backup and replication solution.
Posted: 02 Jun 2016 | Published: 21 Jan 2016

Veeam Software

2016 Trends in Cyber Security: A Quick Guide to The Most Important Insights in Security
sponsored by Microsoft
EBOOK: This eBook, which analyzes more than 600 million computers worldwide, puts together one of the most complete security data sets in the world. Learn how the landscape of exploits, vulnerabilities and malware has evolved over the past 10 years.
Posted: 02 Jun 2016 | Published: 01 May 2016

Microsoft

An Office 365 Expert Debate: New Cloud, New Risks
sponsored by Mimecast
RESOURCE: This resource features an expert debate on the risks of Office 365. View now and you'll also have access to a demo on ways to enjoy economic cloud advantages while sidestepping cybercrimes.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Mimecast

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Four security tips for HIPAA compliance in healthcare cloud storage
sponsored by Pure Storage
EGUIDE: No risks can be taken when it comes to healthcare information storage. This is deterring many healthcare IT professionals from taking advantage of cloud storage opportunities. Read on to uncover four security tips that will keep your healthcare cloud storage in compliance with HIPAA standards.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

What's New in Horizon7
sponsored by VMware
WEBCAST: Isn't it time you redefine workspace services delivery? Learn in this webcast how to leverage cloud-enabled VDI to provide your end users with one place to securely access all their desktops, apps, and online services from anywhere and any device—offering users elasticity of scale.
Posted: 01 Jun 2016 | Premiered: Jun 1, 2016

VMware

The Rise of the Cloud Security Professional
sponsored by (ISC)2 UK Ltd
WHITE PAPER: The problem with implementing a secure cloud strategy comes in the lack of understanding around how to define cloud computing and its risks. By employing credentialed cloud security professionals, you can ensure your organizations is using the today's best practices that can maintain secure cloud computing infrastructures.
Posted: 01 Jun 2016 | Published: 31 Dec 2015

(ISC)2 UK Ltd

Keep Office 365 compliance in check with these tools
sponsored by Symantec Corporation
EGUIDE: When it comes to Microsoft Office 365, cybersecurity is a top concern. That's why it's a priority for the software giant. Learn what's available to keep corporate data safe and compliant.
Posted: 31 May 2016 | Published: 01 Apr 2016

Symantec Corporation

Case Study: VMware empowers King Abdulaziz City for Science and Technology to Provide Reliable Cloud
sponsored by VMware
CASE STUDY: By providing internet and IT services to academic institutions, governments are faced with the challenge of meeting customer demands. Many use cloud services but finding one that has rich user features but remain easy to manage is tough. Read on to learn about an organization that was able to overcome these challenges and stay ahead of competitors.
Posted: 31 May 2016 | Published: 31 May 2016

VMware

Security Delivery Platform
sponsored by Gigamon
RESOURCE: The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

What CIOs Need to Know About IoT and Security Risks
sponsored by MASERGY
ANALYST REPORT: Perimeters have vanished. Organizations need to move past traditional security approaches and move to technologies like software-defined networking (SDN), which brings performance and efficiency advantages as well as security improvements. With so much to gain from the IoT, don't be scared away by fixable risks.
Posted: 27 May 2016 | Published: 21 Oct 2015

MASERGY

IDC Server Security: Virtualization and Cloud Changes Everything
sponsored by TrendMicro
WHITE PAPER: Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Evaluating Hybrid Cloud Security Options to Control Network Security
sponsored by MASERGY
EGUIDE: This e-guide helps you evaluate your hybrid cloud security options to best secure your data as it moves to the cloud. Learn what different organizations are implementing to help their situation, including host-based security tools, encryption and other security services.
Posted: 25 May 2016 | Published: 12 May 2016

MASERGY

Building a Cloud Network: What Does It Mean?
sponsored by MASERGY
EGUIDE: Building a network that supports cloud computing appears, for many engineers, to be a path paved by fat pipes. But that's not always the case. Find out what it means – and what it will take – to build a cloud network for your business.
Posted: 25 May 2016 | Published: 19 May 2016

MASERGY

Cloud Computing & VDI in Facts and Figures
sponsored by Dell, Inc.
WHITE PAPER: Since 2005, remote working users has increased by 80% opening up possibilities of security risks and vulnerabilities and requiring a cloud infrastructure solid to handle demand. VDI is key in keeping this infrastructure efficient and secure. Access this white paper to learn more benefits of VDI.
Posted: 25 May 2016 | Published: 25 May 2016

Dell, Inc.

Cloud Security Requires Shared Responsibility Model
sponsored by CloudPassage
EGUIDE: When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.
Posted: 25 May 2016 | Published: 17 May 2016

CloudPassage

Keep Cloud Applications Secure During The DevOps Process
sponsored by CloudPassage
EGUIDE: To minimize cloud application risks, make sure your security strategy accounts for each phase of a DevOps project. Find out why effective cloud app security starts with building security into every step of the development process and how you can make security a key part in each step of the DevOps process.
Posted: 24 May 2016 | Published: 17 May 2016

CloudPassage

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance
sponsored by TrendMicro
WHITE PAPER: In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.
Posted: 24 May 2016 | Published: 31 Oct 2015

TrendMicro

One Firewall Brand Decreases Complexity, Not Security
sponsored by Fortinet, Inc.
WHITE PAPER: This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Assessing the Risk: Yes, the Cloud Can Be More Secure Than Your On-Premises Environment
sponsored by Amazon Web Services
WHITE PAPER: Discover cloud security myths and a framework for assessing risk while comparing existing complex data center environments with new architectures in the cloud. You'll also learn three factors that contribute to cloud risk and security decisions.
Posted: 23 May 2016 | Published: 31 Jul 2015

Amazon Web Services

IBM's Content-Focused Mobile App for Sales Teams – Powered by Box Platform
sponsored by Box
RESOURCE: Not all applications are secure and seamless enough to handle the content your sales team needs, and on the fly. Learn about IBM's new app that can enable your sales teams to interact with your most pertinent customer content and data on-the-go with one PaaS mobile platform.
Posted: 23 May 2016 | Published: 07 Apr 2016

Box

Content PaaS for Your Enterprise Applications
sponsored by Box
DATA SHEET: In this white paper, receive in introduction to Box Platform, a content platform as a service (PaaS). Explore how you can create better content experiences for your users, and introduce advanced collaboration to your apps with user-facing services that utilize granular permission control over all app content.
Posted: 23 May 2016 | Published: 23 May 2016

Box

How Amazon Web Services (AWS) Eases Enterprise Data Center Management
sponsored by Red Hat
WHITE PAPER: Hybrid cloud computing service models add new challenges for your IT department, which is already battling the complexities of virtual infrastructure. Discover in this white paper how to leverage Amazon Web Services (AWS) to flexibly extend your data center capacity when needed, taking advantage of advanced cloud management.
Posted: 23 May 2016 | Published: 31 Dec 2013

Red Hat

Secure an Office 365 and Exchange hybrid setup
sponsored by Symantec Corporation
EGUIDE: This e-guide shows you six important factors to consider for the larger picture in Exchange Server security with a hybrid setup. These factors take into consideration the high-level of security issues that can surface when you disrupt the critical business system.
Posted: 20 May 2016 | Published: 13 May 2016

Symantec Corporation
51 - 75 of 1075 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement