Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud SecurityReports
51 - 75 of 828 Matches Previous Page  | Next Page
Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

The Pros and Cons of Mobile Application Management
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: MAM technologies come with challenges and are not always the perfect solution for every app and IT department. Learn how to weigh the pros and cons of MAM technologies and decide if it is right for your company.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
sponsored by IBM
WHITE PAPER: This white paper provides insight on the main behavioral characteristics of hardware and software used for security purposes.
Posted: 16 Jul 2014 | Published: 31 Dec 2013

IBM

Modern Infrastructure – July/August 2014
sponsored by SearchCloudComputing.com
EZINE: Government spying and more mundane security concerns have businesses worrying about cloud data sovereignty.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

SearchCloudComputing.com

Cloud-Based Security Software Opens Floodgates for IT Innovation
sponsored by GFI Cloud
EGUIDE: In this expert e-guide, learn how one IT specialist was able to turn a modest investment in cloud-based security into a secured environment.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

GFI Cloud

The giant’s advantage: Why cloud computing levels the playing field for small businesses
sponsored by GFI Cloud
WHITE PAPER: In this white paper, you will find effective cloud computing solutions that will help your business grow—not only for technical purposes, but also with the relationship between your team.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

GFI Cloud

Top Tips for Managing a Mobile Workforce
sponsored by GFI Cloud
WHITE PAPER: This white paper introduces several tips for managing and protecting a mobile workforce, including solutions compatible with cloud computing.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

GFI Cloud

Gaining Control of the Cloud
sponsored by Gravitant
WHITE PAPER: This whitepaper covers how you can identify risks in the public cloud and offers a software solution to help keep you safe.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Gravitant

Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

ComputerWeekly.com

Auditing Security Checklist for Use of AWS
sponsored by Amazon Web Services and Intel
WHITE PAPER: This paper is designed to help internal compliance teams and their external auditors with a checklist for assessing an organization's AWS security strategy.
Posted: 11 Jul 2014 | Published: 30 Jun 2014

Amazon Web Services and Intel

How Resellers Can Become the Trusted Advisors on Security Issues
sponsored by Webroot
WHITE PAPER: This white paper introduces an innovative endpoint security solution with a completely cloud-based architecture rather than the outdated, signature-based methods of the past.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services and Intel
WHITE PAPER: Consult this exclusive report to get a complete overview of security processes on AWS. Specifically, AWS physical and operational security processes are described for network and server infrastructure under AWS's management, as well as service-specific security implementations.
Posted: 10 Jul 2014 | Published: 30 Jun 2014

Amazon Web Services and Intel

Deliver Secure Service without Sacrificing Mobility or Collaboration
sponsored by Citrix and Microsoft
WHITE PAPER: This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.
Posted: 10 Jul 2014 | Published: 31 Jan 2014

Citrix and Microsoft

Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Insight and Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

Insight and Red Hat

Introduction to ShareFile
sponsored by Citrix and Microsoft
VIDEO: In this short video, learn about a solution that allows you to easily share, sync, and store large files from any device, anywhere. Click through to find out how to be productive on the go safely and securely and also maintain full visibility and access.
Posted: 10 Jul 2014 | Premiered: 06 May 2014

Citrix and Microsoft

Craft a security policy for a cloud-based BYOD environment
sponsored by IBM
TECHNICAL ARTICLE: As the bring your own device (BYOD) movement gains popularity in the workplace, new security concerns arise. In this article, learn how to create a thorough, clear security policy for a cloud-based BYOD environment that includes RIM, Android, Apple, and Windows devices.
Posted: 10 Jul 2014 | Published: 10 May 2013

IBM

How to easily configure antivirus policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: This short video demonstrates – by walking you through, step by step – how to easily configure antivirus policies in GFI Cloud. Watch now to discover how to achieve improved network security in the cloud.
Posted: 10 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

Mobilize Enterprise Data with Citrix ShareFile on Microsoft Azure
sponsored by Citrix and Microsoft
WHITE PAPER: To help IT regain control over employee file sharing, organizations are mobilizing enterprise data with a highly secure and validated enterprise file sync and sharing solution with flexible data storage. Access this white paper to find out how you can meet your users' mobility, productivity, and collaboration requirements.
Posted: 09 Jul 2014 | Published: 03 Jul 2014

Citrix and Microsoft

How to Quickly and Easily Configure Patch Management Policies in GFI Cloud
sponsored by GFI Cloud
VIDEO: Learn how simple it is to configure patch management policies.
Posted: 09 Jul 2014 | Premiered: 09 Jul 2014

GFI Cloud

Stay in Control of Critical Data with GFI Cloud
sponsored by GFI Cloud
VIDEO: Access this video for a product tour of a solution that offers IT management, monitoring, and security capabilities.
Posted: 09 Jul 2014 | Premiered: 10 Oct 2013

GFI Cloud

GFI CloudTM Case Study - MacDermid Offshore Solutions UK
sponsored by GFI Cloud
WHITE PAPER: This informative case study details a success story with one server monitoring solution. Read on to find out how you can have a single view of key software without integration and compatibility worries instead of different vendors for different pieces of software, and ensure that your primary servers are always up with key services running.
Posted: 09 Jul 2014 | Published: 08 Jul 2014

GFI Cloud

Top 5 "Must-Haves" for MSPs Adding IT Monitoring and Security Services
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper provides MSPs with guidelines for deciding which security solutions to offer and which suppliers to work with.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

AccelOps Inc.

Simple Security Is Better Security
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces an alternative solution to lower complexity—cloud-based endpoint security. Read on to find out how SMBs differ from one another and why it is important to take the time to evaluate each of their needs.
Posted: 09 Jul 2014 | Published: 31 May 2014

Sophos, Inc.

Delivering a Secure Foundation for the Cloud with RHEL
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how enterprises and cloud service providers can help resolve related security concerns by using Red Hat Enterprise Linux® as the guest operating system for their cloud workloads and as the underlying platform for their cloud infrastructure.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Red Hat

Chapter 3: Patching Security Holes in Private Clouds
sponsored by Dell and VMware
EZINE: Download chapter 3 of this 4-part expert e-zine to gain advice for patching the security holes in private clouds. Learn more about storage provisioning, perimeter security, data portability and much more.
Posted: 09 Jul 2014 | Published: 06 Jun 2013

Dell and VMware
51 - 75 of 828 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement