Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
51 - 75 of 851 Matches Previous Page  |  Next Page
Power Systems Cloud Infographic
sponsored by IBM
WHITE PAPER: Integrating security into your cloud allows you to deal with only 2% of the intrusions other architectures face. This infographic introduces a virtual server to deploy in the cloud that provides a 50% reduction in operational expenses.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

IBM

Build your services business with Veeam and Microsoft Azure Marketplace
sponsored by Veeam Software
WHITE PAPER: Access this white paper to discover how to build your IT service business using cloud provider programs.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Veeam Software

Webinar: Endpoint Data Privacy in The Cloud
sponsored by Druva Software
WEBCAST: Tune into this webinar to discover an endpoint backup tool for data stored in the cloud.
Posted: 11 Feb 2015 | Premiered: Feb 11, 2015

Druva Software

An Expert Guide on Vulnerability Management Programs
sponsored by Risk IO
EGUIDE: With this helpful e-guide, learn how to best implement authenticated vulnerability scans to make the most of your security practices.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Risk IO

IDC Essential Guidance: Securing the Enterprise: Multifunction Printer Risks and Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This analyst brief reveals the consequences of nonsecure MFPs, and offers essential guidance on how to secure them.
Posted: 10 Feb 2015 | Published: 31 Jul 2014

Hewlett-Packard Company

Application Security in the Age of Cloud, BYOD, and SaaS
sponsored by BitGlass
WHITE PAPER: This white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

BitGlass

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

How to Bolster Office 365's Built-In Security Functionality
sponsored by BitGlass
WHITE PAPER: This white paper explains how you can bolster Office 365's built-in security functionality with a comprehensive, in-house security plan, and lists the key areas that your enterprise has to address.
Posted: 04 Feb 2015 | Published: 31 Dec 2014

BitGlass

The Definitive Guide to Cloud Access Security Brokers
sponsored by BitGlass
WHITE PAPER: This white paper discusses Cloud Access Security Brokers (CASBs) as a potential solution for enterprises looking to safely enable cloud apps and mobile devices.
Posted: 04 Feb 2015 | Published: 29 Aug 2014

BitGlass

Office 365: How Bitglass Restores Visibility and Data Protection to IT
sponsored by BitGlass
WHITE PAPER: This white paper presents a potential solution for the security and compliance issues raised by Office 365, enabling enterprises to secure their data outside of the firewall while maintaining user privacy.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

Does App Security Pay? The Business Impact of Security Tools
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive resource discusses how your organization can dramatically reduce applications vulnerabilities, speed recovery time and minimize delays. Read on to learn more.
Posted: 01 Feb 2015 | Published: 20 Jan 2014

Hewlett-Packard Company

Reducing security risks from open source software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights how your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Posted: 01 Feb 2015 | Published: 01 Oct 2013

Hewlett-Packard Company

Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

The Big Shift to Cloud-Based Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper explains why SMBs are just as vulnerable to cyberattacks as larger corporations, and how cloud-based security can provide them with a stronger network security posture without breaking the bank.
Posted: 28 Jan 2015 | Published: 29 Aug 2014

Qualys

Go hybrid and get the best of both worlds in the cloud
sponsored by SearchCloudStorage.com
EBOOK: Before taking advantage of hybrid cloud benefits, understand that it takes time and patience, along with knowing which metrics you will use to determine success.
Posted: 20 Jan 2015 | Published: 20 Jan 2015


NetApp Private Storage for Microsoft Azure Solution Brief
sponsored by NetApp
WHITE PAPER: As society becomes more and more mobile, businesses must adapt with a mobile-ready data center. This white paper outlines how businesses can achieve an agile and efficient hybrid cloud storage system.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

NetApp

Protecting Against Web Application Threats Using SSL
sponsored by Symantec Corporation
WHITE PAPER: In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Bring Your Own Device: Driving Workforce Productivity with Bring Your Own Device (BYOD)
sponsored by Acronis
WHITE PAPER: In today's mobile world, workers want to work from anywhere- not just in the office. Bring Your Own Device (BYOD) policies increase employee productivity, but can also pose security risks. This white paper details to deploy a BYOD program that keeps information on mobile devices secure.
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Acronis

AWS billing prompts use of third-party cloud cost analysis tools
sponsored by SearchAWS
EGUIDE: This e-guide highlights how companies, such as Cloudyn Ltd., help companies identify spending patterns and create financial forecasts to keep the financial planning process under control. Learn more about how big data analytics can help consolidate AWS billing accounts.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchAWS

Cloud app management -- from migration to monitoring
sponsored by SearchCloudComputing.com
EGUIDE: In this e-guide, discover which apps are right for the cloud and the keys to cloud application migration. Also, get an insider's look into the latest cloud application trends that you can capitalize on.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Best practices for hybrid cloud management
sponsored by SearchCloudComputing.com
EGUIDE: This e-guide will provide you with a roadmap to help you piece together the hybrid cloud management puzzle. Learn about the keys to a solid hybrid cloud management strategy, how to avoid hybrid cloud security hurdles, cross-platform tools to use, and much more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

Cloud-based management comes with trade-off
sponsored by SearchCloudComputing.com
EGUIDE: In this e-guide, discover the differences between traditional management tactics and cloud management strategies. Additionally, learn how to integrate another layer of performance data into the central system to deal with the complexity of cloud.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com

How should our team manage data stored in the cloud?
sponsored by SearchCloudComputing.com
EGUIDE: This informative e-guide reveals expert tips for cloud managers to ensure that the provider's management tools mesh well with your enterprise's needs. Learn why you should look for management features beyond security controls for effective cloud storage.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

SearchCloudComputing.com
51 - 75 of 851 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement