Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
51 - 75 of 702 Matches Previous Page  | Next Page
Setting the Groundwork for IAM in the Cloud
sponsored by OpenIAM
WEBCAST: This presentation will address three strategic issues that need to be identified within an organization to ensure that your IAM strategy will succeed in the cloud.
Posted: 25 Mar 2014 | Premiered: Mar 18, 2014

OpenIAM

The Benefits of an Integrated Approach to Security in the Cloud
sponsored by IBM
WHITE PAPER: This paper looks at how the growing adoption of cloud computing is changing the way organizations are implementing security. Organizations from a variety of industries were interviewed to assess how they are approaching security for their cloud deployments leveraging a solution from IBM.
Posted: 25 Mar 2014 | Published: 31 Dec 2013

IBM

Security intelligence is the smart way to keep the cloud safe
sponsored by IBM
WHITE PAPER: This white paper will examine the intelligence capabilities necessary for gaining visibility into, and control over, cloud security. It also demonstrates how an integrated suite of end-to-end security intelligence solutions can help meet cloud security needs.
Posted: 25 Mar 2014 | Published: 31 Oct 2013

IBM

Podcast: Making the Right Cloud Model Choice to Ensure Data Security in a Hybrid World
sponsored by Code42
PODCAST: In this on-demand podcast from the experts at SearchStorage.com, learn how choosing the right cloud model can help you address the challenges of data backup and security.
Posted: 20 Mar 2014 | Premiered: Mar 13, 2014

Code42

Migrating Data to the Cloud? Have a Safe Trip.
sponsored by Peak 10
WHITE PAPER: This resource goes over some of the things to consider when moving data to the cloud. Choosing the right provider has a lot to do with the success of your storage in the cloud, and this resource provides the questions that need to be asked to make sure the right vendor is chosen.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

Can the UK Find Security in US Cloud Services?
sponsored by Peak 10
WHITE PAPER: This resource goes over the facts about the UK's attitudes towards the cloud and data security and gives some insight into where the focuses will shift in the coming years.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

How to Protect Health Data from Hackers
sponsored by Peak 10
WHITE PAPER: View this resource to reveal key recommendations to help prevent the growing number of cyber threats in the healthcare industry.
Posted: 20 Mar 2014 | Published: 06 Mar 2014

Peak 10

Cloud ROI: The Answer for Banking ROE?
sponsored by Peak 10
WHITE PAPER: Athough the banking industry has largely been slow to adopt the cloud in the past, this trend is not likely to continue much longer due to the advantages the cloud offers in terms of customer experience. It also recommends that banks focus more on the potential benefits and less on the back-end systems that process and store data.
Posted: 20 Mar 2014 | Published: 03 Mar 2014

Peak 10

Security Management 2.5: Replacing Your SIEM Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 20 Mar 2014 | Published: 01 Feb 2014

IBM

Cloud Computing and Banks: Too Good to Pass Up
sponsored by Peak 10
WHITE PAPER: This resource details why many banks have shied away from the cloud and looks at why they might want to rethink their decision.
Posted: 19 Mar 2014 | Published: 04 Mar 2014

Peak 10

Cloud Security Begins with Asking the Right Questions
sponsored by Peak 10
WHITE PAPER: This resource discusses the problem with looking at the cloud and security as single entities and emphasizes customizing them to your needs.
Posted: 19 Mar 2014 | Published: 06 Mar 2014

Peak 10

Secure DNS Prevents DDoS Attacks
sponsored by Neustar®
WEBCAST: This informative webcast discusses why DNS has become a favorite target for DDoS attacks and how a hardened DNS combined with cloud-based protection can provide the shield your organization needs.
Posted: 18 Mar 2014 | Premiered: Mar 18, 2014

Neustar®

Computer Weekly Buyer's Guide to infrastructure on demand
sponsored by TechTarget
RESOURCE: Working out how to make infrastructure on demand work for your company is a challenge. In this 10-page buyer's guide, Computer Weekly looks at assessing the needs of your business, how a lack of standards is hindering progress and Microsoft's Azure, which aims to become an operating system for the cloud.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

A Guide to Data Privacy in the Cloud
sponsored by Peak 10
WHITE PAPER: This exclusive whitepaper features tips for keeping your private data safe in the cloud.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Peak 10

Compliance & Security in the Cloud
sponsored by Peak 10
WHITE PAPER: This helpful guide will take you through the process of picking a cloud service provider that will help you meet compliance and security regulations.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Peak 10

Companies are driving the growth of the cloud
sponsored by CentraStage
WHITE PAPER: This white paper investigates how companies and organizations are increasingly adopting cloud services for more secure and efficient device management. Inside, discover how the movement toward more automated solutions is benefiting the user experience and, ultimately, business.  
Posted: 13 Mar 2014 | Published: 13 Mar 2014

CentraStage

Accelerate and Simplify Business Growth
sponsored by Hewlett-Packard Company
BROCHURE: This brochure highlights advisory services that can help you understand the business drivers that will impact organizations in the future. It also gives the benefits that these advisory services offer, such as reduced complexity and enterprise costs and improved business processes and operational results.
Posted: 12 Mar 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

13 Tips for Cloud Security
sponsored by Peak 10
WHITE PAPER: This valuable whitepaper covers 13 tips to help keep mission-critical data safe in the cloud.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Peak 10

CIO Top Of Mind For 2013
sponsored by EMC Corporation
WHITE PAPER: This short resource gives survey results from over 600 CIOs and tells what they think about the biggest trends in storage today.
Posted: 11 Mar 2014 | Published: 31 Dec 2012

EMC Corporation

Pick Your Identity Bridge
sponsored by Ping Identity Corporation
WHITE PAPER: This resource gives insight into identity bridges and highlights two potential solutions to the challenges that come with connecting users and resources. It also offers and IDaaS solution that delivers SSO to SaaS and on-premises environments via a single turnkey solution.
Posted: 10 Mar 2014 | Published: 01 Jan 2014

Ping Identity Corporation

SANS 2013 Report on Digital Forensics and Incident Response Survey
sponsored by FireEye
ANALYST REPORT: This guide will help forensic professionals and their clients better prepare for future investigations and how to better allocate resources.
Posted: 06 Mar 2014 | Published: 31 Dec 2013

FireEye

Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 06 Mar 2014 | Published: 01 Feb 2014

IBM

When Millions Need Access: Identity Management in an Interconnected World
sponsored by IBM
WHITE PAPER: This whitepaper covers an automation solution that will allow you to monitor the ever-growing number of access points to your organization's sensitive data.
Posted: 06 Mar 2014 | Published: 13 Feb 2013

IBM

Five Reasons It’s Time For Secure Single Sign-On
sponsored by Ping Identity Corporation
WHITE PAPER: Access this informative resource to uncover five reasons why your organization should consider secure SSO.
Posted: 06 Mar 2014 | Published: 31 Jul 2013

Ping Identity Corporation

Evaluating Cloud Computing Services: Criteria to Consider
sponsored by FireHost Inc.
EGUIDE: This expert e-guide covers the extra protection you can get from a cloud service provider. It also will help you decide what to consider when choosing a cloud provider.
Posted: 25 Mar 2014 | Published: 25 Mar 2014

FireHost Inc.
51 - 75 of 702 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement