Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
76 - 100 of 857 Matches Previous Page  |  Next Page
Future Security Fortification - The Road Ahead
sponsored by IBM
WHITE PAPER: In this white paper, learn the expected security challenges your company may face in the next 5 years. Read on to uncover tips and best practices for securing your organization against these threats.
Posted: 23 Mar 2015 | Published: 04 Dec 2014

IBM

Top 5 IT security trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Download this brief white paper to discover the five major changes to expect in 2015 and what these changes could mean for you.
Posted: 23 Mar 2015 | Published: 30 Nov 2014

Dimension Data

See clearly in the cloud with threat-aware identity and access management
sponsored by IBM
WHITE PAPER: View this white paper to learn how next-generation cloud security technologies can securely connect people, applications, and devices to cloud environments, eliminating data and application protection concerns.
Posted: 21 Mar 2015 | Published: 31 Oct 2014

IBM

How Box Balances Security with Usability
sponsored by Box
EGUIDE: In this in-depth e-guide, explore the differences between Box and Dropbox for enterprise-use, and learn how online file-sharing apps are attempting to strike the perfect balance between usability and securty.
Posted: 21 Mar 2015 | Published: 21 Mar 2015

Box

Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

Infographic: 2014 Honeypot findings across US, Europe and Asia
sponsored by Alert Logic
RESOURCE: Access this brief infographic to find out the types and frequencies of attacks and how they vary globally. View now to learn more.
Posted: 18 Mar 2015 | Published: 04 Dec 2014

Alert Logic

Multi-Cloud Private Storage: Take Charge of Your Cloud Data
sponsored by NetApp
WHITE PAPER: Access this white paper to learn about a cloud storage system that provides benefits like big data analytics while still protecting data.
Posted: 17 Mar 2015 | Published: 30 Sep 2014

NetApp

The Truth About Cloud Security Threats
sponsored by Alert Logic
WHITE PAPER: Download this white paper to discover what types of threats are growing, how often they attack, and what you can do to better secure your organization.
Posted: 16 Mar 2015 | Published: 31 May 2014

Alert Logic

Managing the Complexity of Today’s Hybrid IT Environments
sponsored by Kaseya
WHITE PAPER: Fortunately, these challenges no longer have to be costly and time consuming. This white paper describes the key characteristics of the changing environment of IT. You can also discover new choices that IT managers have for meeting the growing set of management challenges.
Posted: 15 Mar 2015 | Published: 15 Mar 2015

Kaseya

Case Studies: Hands-on security monitoring delivers peace-of-mind
sponsored by Alert Logic
CASE STUDY: Check out the following brief series of short case studies to learn how Rackspace and Alert Logic helped 3 major companies improve intrusion detection and vulnerability scanning.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Alert Logic

7 Best Practices to Ensure Cloud Security
sponsored by Alert Logic
WHITE PAPER: Read this brief white paper to uncover the 7 best practices for cloud security.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  Cloud Security
Alert Logic

Explore Hybrid Cloud Computing's Uses and Best Practices
sponsored by NetApp
ESSENTIAL GUIDE: Inside this expert essential guide, explore the pros, cons, types, and benefits of hybrid cloud approaches. Learn what is driving enterprise IT to the hybrid cloud model and how to pick your hybrid cloud strategy's starting point based on public or private cloud computing. Find out how the enterprise market is shaping AWS hybrid cloud strategy.
Posted: 09 Mar 2015 | Published: 09 Mar 2015

NetApp

Case Study: A Global 1000 Enterprise Adapts Its Security
sponsored by IBM
WHITE PAPER: Read this exclusive report to discover how a global 1000 company successfully adapted their security for the BYOD era.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM

Managed Cloud Environment Security FAQ
sponsored by Dimension Data
WHITE PAPER: Access this white paper to get answers to how security is maintained in multi-tenanted and dynamic environments.  Read on to explore how to evaluate the security of managed cloud environment providers.
Posted: 03 Mar 2015 | Published: 10 Sep 2014

Dimension Data

Cloud Planning Mistakes You'll Make in 2015
sponsored by Rackspace
EGUIDE: This expert e-guide from SearchCloudComputing.com examines common blunders that most organizations make during a cloud deployment – specifically when it comes to security, governance and performance.
Posted: 26 Feb 2015 | Published: 16 Feb 2015

Rackspace

Back to Basics: Securing Business Information on the Cloud
sponsored by Box
WHITE PAPER: View this white paper to learn how the cloud can enable us to go back to security basics to manage distributed computing.
Posted: 25 Feb 2015 | Published: 04 Feb 2015

Box

7 Steps to Securing Healthcare Infrastructures Using a Cloud Security Plan
sponsored by NaviSite
WHITE PAPER: This resource outlines the 7 steps you need to follow in order to secure infrastructures using a cloud security plan. By adhering to the following seven-step plan, you can bank on a proven methodology for cost-effectively and securely leveraging cloud services.
Posted: 19 Feb 2015 | Published: 18 Feb 2015

NaviSite

Cloud IT: The Impact of Cloud Supply Chain Platforms on the Role of IT
sponsored by GT Nexus
WHITE PAPER: In this valuable white paper learn more about the impact of cloud supply chain platforms on the role of IT and how you can better prepare your team for the challenges they may face.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

GT Nexus

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

Build your services business with Veeam and Microsoft Azure Marketplace
sponsored by Veeam Software
WHITE PAPER: Access this white paper to discover how to build your IT service business using cloud provider programs.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Veeam Software

IDC Essential Guidance: Securing the Enterprise: Multifunction Printer Risks and Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This analyst brief reveals the consequences of nonsecure MFPs, and offers essential guidance on how to secure them.
Posted: 10 Feb 2015 | Published: 31 Jul 2014

Hewlett-Packard Company

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Next-Generation Security in a Mobile Era
sponsored by SearchCIO.com
EBOOK: In this SearchCIO handbook, learn how enterprise mobility management and next-generation security tools can help your enterprise mitigate an ever-growing number of mobile risks.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

SearchCIO.com

In Cloud Storage, Options Abound
sponsored by SearchCloudComputing.com
EBOOK: Examine cloud-based storage in terms of cost, manageability, security and latency/availability.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

SearchCloudComputing.com

Securing Your Cloud Deployment with Today's Top Strategies
sponsored by SearchCloudSecurity.com
EZINE: In this Insider Edition, InfoSec Pros will learn how to achieve better cloud security. It reviews existing cloud security standards and how to assess, and manage, the risk of a cloud deployment.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchCloudSecurity.com
76 - 100 of 857 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement