Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
51 - 75 of 940 Matches Previous Page  |  Next Page
Cloud Access Security Brokers: Critical Capabilities
sponsored by BitGlass
WEBCAST: This video will help you protect your network by providing prospective on the brokers specialized in guarding data over the cloud.
Posted: 12 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Get the Right Cloud for Your Applications and Deliver Business Results Fast
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this white paper, learn how a preconfigured cloud storage option can be tailored to meet your specific strategic performance, capacity, security, and cost requirements. Additionally, explore the technology behind this option, as well as case studies from a variety of organizations who have already adopted it.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

Dell, Inc. and Intel®

Computer Weekly – 12 January 2016: How open source is beating proprietary software
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide assesses the impact of open source software and how it is underpinning the digital revolution. We examine the prospects for cloud in financial services as regulators give their approval. And we ask if Uber is really part of a new business model for the sharing economy. Read the issue now.
Posted: 08 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

DevOps in Large Companies - Is It Possible?
sponsored by Apcera
WEBCAST: In this webcast, learn the how to transform culture to make DevOps possible and explore the role technology plays in the process. Explore recommendations for overcoming legacy systems, how to approach microservices and platforms as a service, the role policy plays, and more.
Posted: 08 Jan 2016 | Premiered: Dec 2, 2015


Why Cloud Innovation Needs Trust: IT Leader Panel Discussion
sponsored by Apcera
WEBCAST: In this webcast, hear from a panel of distinguished IT leaders about the current state of cloud innovation and lessons learned. Additionally, learn why trust is essential to an organization's approach to the cloud and what that looks like in practice.
Posted: 08 Jan 2016 | Premiered: Dec 11, 2015


How to Get the Multi-Cloud Business Advantage Without Sacrificing Security or Control
sponsored by Apcera
WHITE PAPER: In this white paper, explore the benefits of a multi-cloud approach, and learn why you may be less secure sticking with on-premise deployments, as well as guidelines for cloud ownership and governance. Additionally, learn 3 key considerations for cloud migration, including: orchestration, policy and enforcement, and one more.
Posted: 08 Jan 2016 | Published: 30 Nov 2015


Untapped Data Protection Processes
sponsored by Microsoft
EGUIDE: In this three-part expert e-guide, learn how a single pool of data created by merging backup, data recovery, and archive can serve multiple data protection needs—and spawn new ideas about how to use that data. Additionally, learn why a hybrid approach using disk, cloud, and tape is best for most organizations' protection plans.
Posted: 08 Jan 2016 | Published: 08 Jan 2016

Microsoft

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Blue Coat Systems

Transform Your Business with Cloud-Based Programming Components
sponsored by SAP
VIDEO: This video uncovers technologies McLaren Group leveraged to super-charge its business transformation. By tuning in, you'll learn how to gain technical advantage, as well as increase your profitability and customer service agility, with the cloud.
Posted: 07 Jan 2016 | Premiered: 19 Sep 2015

SAP

Flipping the Script: Law Firms Hunted by Cybercriminals
sponsored by SurfWatch Labs
WHITE PAPER: This resource examines the cyber-threats facing law firms, explaining why they are attractive and easy targets for cybercriminals. Access it to discover just how much danger your firm is in and how you can stay safe.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

SurfWatch Labs

Special Report: The Risks of Shadow Data
sponsored by Elastica
WHITE PAPER: Based on the analysis of over 63 million documents, this report on shadow data provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Elastica

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Blue Coat Systems

Rethinking Enterprise Storage: A Hybrid Cloud Model
sponsored by Microsoft
WHITE PAPER: In this extensive resource, explore how hybrid cloud computing can be used both to overcome the challenges of data growth and integrating with the cloud. Additionally, learn about the current possibilities available for migrating from on-premises infrastructure to the cloud, leveraging hybrid cloud storage for disaster recovery, and more.
Posted: 04 Jan 2016 | Published: 31 Dec 2013

Microsoft

Leapfrogging Backup with Cloud Snapshots
sponsored by Microsoft
WHITE PAPER: In this white paper, learn about a tool that can replace traditional backup processes with cloud snapshots that automate off-site data protection. Additionally, explore how this option can reduce time spent managing backups, enable easy restoration and access of data on the cloud , and more.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

Microsoft

Smarter Cybersecurity Solutions
sponsored by Webroot
WHITE PAPER: This white paper highlights a cloud-based, cybersecurity solution that enables you to provide your customers with one, simple solution. Learn how to provide your customers with security that will simplify deployment and management, as well as save time and money.
Posted: 31 Dec 2015 | Published: 31 Dec 2015

Webroot

Configure and Deploy Active Directory Federated Services in a Hybrid Architecture
sponsored by Rackspace
WHITE PAPER: In this white paper, learn how to achieve a robust, hybrid infrastructure that allows users to seamlessly access their applications—regardless of whether they are deployed on-premise or in the cloud. Additionally, learn why hybrid makes sense, common concerns and pitfalls of hybrid infrastructure, and more.
Posted: 29 Dec 2015 | Published: 29 Dec 2015

Rackspace

Oracle Secure Cloud Infrastructure
sponsored by Oracle Corporation
VIDEO: This brief video outlines how you can simplify cloud security management by combining state of the art hardware and software. Tune in to learn more about its features and benefits, and see if it's right for your private cloud.
Posted: 24 Dec 2015 | Premiered: 24 Dec 2015

Oracle Corporation

On-demand Support Anytime, Anywhere from SQL DBA Experts
sponsored by Rackspace
WHITE PAPER: In this white paper, learn the benefits of one database administration service for the cloud. Explore the ways you can slash expenses and maximize performance, while at the same time gaining scalability, security, and the reliability of seasoned SQL professionals.
Posted: 24 Dec 2015 | Published: 24 Dec 2015

Rackspace

Introducing the SPARC M7 Processor with Security in Silicon
sponsored by Oracle Corporation
VIDEO: This brief video outlines a revolutionary way to secure your cloud in real-time that combines hardware and software. Tune in to see if this next-generation cloud security option is right for your organization.
Posted: 23 Dec 2015 | Premiered: 23 Dec 2015

Oracle Corporation

Cloud Security and Data Backup Misconceptions
sponsored by IBM
EGUIDE: In this expert e-guide, learn the facts and fallacies about cloud security concerns and cloud-to-cloud backup. Find out the top 5 misconceptions about cloud data backup and what you can do to avoid a data breach.
Posted: 23 Dec 2015 | Published: 09 Dec 2015

IBM

Devise a Cloud Security Strategy for Governance Needs
sponsored by IBM
EGUIDE: This expert e-guide teaches you how to build a cloud security strategy that aligns with compliance requirements and governance needs.
Posted: 23 Dec 2015 | Published: 09 Dec 2015

IBM

A Secure Path to the Cloud
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, learn how one cloud infrastructure provider has built cybersecurity into the hardware to go beyond basic network and data defenses to protect your organization's sensitive assets.
Posted: 22 Dec 2015 | Published: 09 Dec 2015

Oracle Corporation

Hybrid Cloud: What it Really Means to the Future of Enterprise Security
sponsored by NaviSite, Inc.
WHITE PAPER: Take advantage of this whitepaper to get a better grasp of what's behind the hybrid cloud phenomenon and what it means to enterprise IT. Read on to learn the advanced security and compliance capabilities that the hybrid cloud offers that organizations can't achieve on their own.
Posted: 22 Dec 2015 | Published: 04 Dec 2015

NaviSite, Inc.

Managing the Secure Deployment of Cloud Services
sponsored by IBM
WHITE PAPER: This white paper invites you to explore the possibilities of a SaaS-based approach to the secure deployment and use of cloud services. Access now and learn how to make it easier for business users to access sanctioned cloud services and introduce elements of identity and access management (IAM) that are often missing.
Posted: 22 Dec 2015 | Published: 27 Oct 2015

IBM

Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control
sponsored by IBM
WHITE PAPER: This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.
Posted: 22 Dec 2015 | Published: 30 Oct 2015

IBM
51 - 75 of 940 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement