Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
76 - 100 of 1027 Matches Previous Page  |  Next Page
Protecting Traditional and Cloud Data Centers with Security Intelligence
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper discusses the need for a high level of security in both traditional and cloud data centers and offers solutions to common challenges that can arise, such as security inefficacy or insufficient firewall performance. Access now to learn how security intelligence services can provide your enterprise with many benefits.
Posted: 26 Oct 2015 | Published: 31 Oct 2014

Juniper Networks, Inc.

It's Not You, It's Me: Understand the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Review the top 3 threats to public cloud environments in order to craft your security strategy to mitigate malware. Explore the shared security responsibility model to learn what steps you need to take to avoid falling victim to data breaches.
Posted: 26 Oct 2015 | Published: 11 Feb 2015

Alert Logic

Computer Weekly – 27 October 2015: Blockchain Sparks Change in Banking Industry
sponsored by
EZINE: In this week's Computer Weekly, find out why blockchain, the technology that underpins bitcoin, is making waves in the banking sector. Also learn why EasyJet says digital is increasingly important for airlines, and take a look at the forces driving digital disruption and why some sectors are changing faster than others.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

NetApp Data Fabric Fundamentals
sponsored by NetApp
WHITE PAPER: Data Fabric is NetApp's vision for the future of data management. Read this technical report to find out how you can build your own data fabric by using technologies that enable data management and seamless data movement across the hybrid cloud.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

TOPICS:  Cloud Security

The Cloud is Casting a Shadow Over IT
sponsored by Centrify Corporation
WEBCAST: In the following webinar, join Chris Christiansen, Program Vice President for IDC's Security Product and Services Group, and Chris Webber, Security Strategist from Centrify, as they discuss shadow IT and the many problems it can bring to the table. Tune in now and uncover insights into how to overcome these issues.
Posted: 23 Oct 2015 | Premiered: Oct 23, 2015

Centrify Corporation

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015


Shielding Office 365 from Advanced Threats
sponsored by Proofpoint, Inc.
WEBCAST: Office 365 comes with built-in security features, but relying on those alone won't protect your data. In this webinar, learn how to secure your Office 365 environment and defend users and data from advanced threats and phishing attacks.
Posted: 22 Oct 2015 | Premiered: Oct 13, 2015

Proofpoint, Inc.

Jargon Busting: What Exactly Is Cloud Computing?
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper breaks down the basics of cloud computing, offers insights into its benefits, and delves into the security of the cloud. Access now to build on your knowledge of the cloud.
Posted: 22 Oct 2015 | Published: 22 Oct 2015

Sage (UK) Limited

Network Security Considerations for Private vs. Public Clouds
sponsored by Palo Alto Networks
WHITE PAPER: The purpose of this white paper is to present security-related information which companies should consider when deciding whether to pursue public or private cloud deployment. Compare cloud models against several criteria, including physical and virtual attack surfaces, data migration, incident management, and more.
Posted: 20 Oct 2015 | Published: 31 May 2015

Palo Alto Networks

Cloud IAM is Set to Break the Sound Barrier
sponsored by Centrify Corporation
WEBCAST: Join guest speaker Andras Cser, VP, Principal Analyst serving security and risk professionals from Forrester Research, and Chris Webber, Security Strategist from Centrify, as they walk through key trends and guidance for the Cloud IAM market.
Posted: 20 Oct 2015 | Premiered: Apr 2, 2015

Centrify Corporation

Deploying a Next-Gen Platform for Managed Security Service Providers (MSSP)
sponsored by Palo Alto Networks
CASE STUDY: This case study explains how to reduce your security operating expenses by 50% by upgrading your network security services into the cloud. Learn how to onboard customers seamlessly and deliver faster service for your customers.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Palo Alto Networks

Cloud Computing Without Security Compromises
sponsored by Intel and IBM
WHITE PAPER: Learn how new innovations offer sensitive cloud workloads better security—while maintaining the same flexibility.
Posted: 15 Oct 2015 | Published: 15 Oct 2015

TOPICS:  Cloud Security
Intel and IBM

Security Based on Trust, Not Fear: The Importance of a Trusted Cloud and Internet Ecosystem
sponsored by Qualys
WHITE PAPER: Security can no longer be about fear. Instead, it needs to be about enabling innovation. This white paper discusses how that can happen.
Posted: 13 Oct 2015 | Published: 31 Aug 2012


Overcome the Complexity of Managing Cloud Apps in the Enterprise
sponsored by BlackBerry
WHITE PAPER: This white paper demonstrates how you can solve IT management challenges with an Enterprise Identity platform, simplifying the management of cloud-based apps with a single point of control. Learn how to enable single sign-on for remote users.
Posted: 13 Oct 2015 | Published: 13 Oct 2015


A Guide to Security and Privacy in a Hosted Exchange Environment
sponsored by Intermedia.Net
WHITE PAPER: This white paper will assist you in choosing the right hosted Exchange environment for you, with top-notch provider security. Access this white paper to improve your Exchange experience and get exclusive access to a checklist comparison of hosted Exchange providers' security offerings.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Cloud Computing Without Security Compromises
sponsored by Intel and IBM
WHITE PAPER: In this resource, you'll discover how to guarantee data security in the cloud, from your servers to your applications without ad-hoc, cumbersome fortification. Read on to learn what bare-metal security measures your list of potential cloud providers should be offering to secure your sensitive data.
Posted: 12 Oct 2015 | Published: 23 Sep 2015

Intel and IBM

Signed, Sealed, Delivered: Making Cloud-based Email Secure
sponsored by
EBOOK: In this Technical Guide, experts examine the security implications and general ins and outs of moving company email to a cloud-based service. Read on to explore 10 useful tips for choosing a cloud email service provider with security in mind.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

Fit for Purpose, Cloud Services for SAP
sponsored by Dimension Data
WHITE PAPER: Access this white paper now to discover how upgrading your SAP enterprise application could be as easy as switching to the cloud. Access this white paper now to deploy you SAP apps on a secure, flexible, resilient, highly available infrastructure supported with full disaster recovery.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

Dimension Data

Analyzing the Critical Capabilities of Enterprise Mobility Management
sponsored by VMware, Inc.
ANALYST REPORT: Analyze the top EMM contenders and their positions in the market to learn how one EMM vendor sizes up in its ability to support a wide range of platforms.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

VMware, Inc.

Employing Video Collaboration in the Fight Against Cancer: A Case Study
sponsored by VBrick
WEBCAST: In this webcast, John Maass, Manager of Conferencing Technology IT Infrastructure & Operations at the Moffitt Cancer Center, demonstrates how his team harnessed the power of video and streaming to capture and present their town hall meetings. Learn how to unify and store your enterprise information in the cloud.
Posted: 08 Oct 2015 | Premiered: Oct 8, 2015


State of File Collaboration Security
sponsored by FinalCode
WHITE PAPER: Access this research report on file collaboration security for insights into file data leakage risks, security processes and control maturity, perceived cloud-based file platform threats, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015


The Essential Executive Starter Guide to Microsoft Azure
sponsored by Softchoice Corporation
ESSENTIAL GUIDE: Access this essential guide to examine five steps necessary to ensure a successful move to Microsoft Azure. Inside you'll discover best practices, tips, and industry examples of how to deploy Microsoft Azure and learn key obstacles organizations face in delivering Azure and how to overcome them.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

Softchoice Corporation

A Comprehensive Guide to Selecting the Right Hosted Communications Solution
sponsored by Cisco
WHITE PAPER: This white paper offers a three-step process that will allow you to make an informed decision on which cloud partner and hosted communications solution you should choose.
Posted: 07 Oct 2015 | Published: 31 Dec 2013


The Essential Guide to Microsoft Azure Security
sponsored by Softchoice Corporation
ESSENTIAL GUIDE: Access this essential guide to examine the security issues relating to Microsoft Azure and details Azures strengths in those areas.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Softchoice Corporation

Office 365 Playbook: How to Ensure Security through Cloud Access Security Brokers
sponsored by Imperva
WHITE PAPER: This playbook provides you with a practical guide for defining, developing, and executing an Office 365 security plan. It includes choosing and optimizing the appropriate solution to mitigate your Office 365 risk while also meeting all of your compliance obligations, be they regulatory requirements or best practice guidelines.
Posted: 06 Oct 2015 | Published: 17 Jun 2015

76 - 100 of 1027 Matches Previous Page    2 3 4 5 6 7    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement