Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
76 - 100 of 1118 Matches Previous Page  |  Next Page
Protect Your Enterprise From Ransomware With Intelligent Hybrid Cloud Storage
sponsored by Panzura
WHITE PAPER: As the ransomware threat grows, it's becoming increasingly obvious that traditional methods of protection aren't keeping our data safe. Read on to learn how adopting an intelligent hybrid cloud storage system could be the key to mounting a real defense against ransomware.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Panzura

Workspaces of the Future
sponsored by Citrix
WHITE PAPER: Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments.
Posted: 19 Jul 2017 | Published: 31 Aug 2016

Citrix

The Top Cyber Security Trends in ANZ in 2017
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about Australia's plan for getting technology suppliers and service providers to decrypt encrypted messages, why threat intelligence is more than just ingesting data feeds into a security system and the risks that shadow IT can bring to organisations in Australia and New Zealand.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

ComputerWeekly.com

Building the Digital Workplace
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how your organization can benefit from a digital workspace with cloud-ready data, unified endpoint management, high quality user experience, improved security, and more.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

The Top Cyber Security Trends in ASEAN in 2017
sponsored by ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

Cloud Security: 6 Tips to Ensure Critical Data is Secure
sponsored by WinMagic
WHITE PAPER: With new legislation such as the EU's GDPR putting demands on your organization, how can you gain the visibility, efficiency, and real-time control to secure data in the cloud? Uncover 6 tips to improve cloud security and compliance.
Posted: 13 Jul 2017 | Published: 06 Jul 2017

WinMagic

Case Study: Virtual Environments and Endpoints Secured
sponsored by TrendMicro
CASE STUDY: In this case study, discover how Cancer Research UK secured more than 2,000 active users across physical machines, VMware virtual desktops and mobile devices.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TrendMicro

How to Gain Complete Protection for Cloud Workloads
sponsored by TrendMicro
WHITE PAPER: According to the Ponemon Institute, 36% of organizations' total IT and data processing requirements are met using cloud resources. Learn how to gain clear control over your cloud security and complete protection for cloud workloads.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

TrendMicro

Protecting Corporate Information in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Leaders need to secure the aspects of the cloud they can control – identity and information – to protect their intellectual property. Access this white paper to learn the three keys to maintaining control of data security in the cloud.
Posted: 13 Jul 2017 | Published: 31 Jul 2015

Symantec & Blue Coat Systems

Deliver Agile Security for the Cloud
sponsored by TrendMicro
WHITE PAPER: Cloud adoption is accelerating rapidly – is your security flexible enough to keep up? Explore an agile security strategy that can seamlessly integrate with cloud services and management tools to prevent data breaches, reduce costs, and more.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

TrendMicro

Protecting Your Servers in the Cloud Era
sponsored by TrendMicro
WHITE PAPER: While virtualization and cloud computing can help your organization achieve significant savings while improving business agility, security in these new environments can be a challenge. Explore how you can protect your servers in the cloud age.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

TrendMicro

The Truth Behind 7 Common DaaS Myths
sponsored by Dizzion
WHITE PAPER: Many people have preconceived notions about Desktop as a Service (DaaS), making them miss out on a modern tech solution that can become a key business driver. Download this white paper to uncover seven of the most common concerns about cloud delivered virtual desktops and the truth behind the myths.
Posted: 07 Jul 2017 | Published: 07 Jul 2017

Dizzion

Top 5 Reasons to Deploy Hybrid Cloud on Converged Systems
sponsored by IBM Tectight
RESOURCE: Download now to discover 5 concrete reasons to deploy hybrid cloud on converged infrastructure. Learn how to build a successful scale-out infrastructure as foundation for hybrid cloud, with options to deploy workloads in data center, private, or public cloud environments.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

IBM Tectight

30 Minutes to a More Secure Enterprise
sponsored by Comstor
WHITE PAPER: Traditional defenses are no longer enough as under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Given the strain on your staff and already tight budget, DNS-layer security is becoming more valuable, especially as your first line of defense.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Comstor

Transform Your Business with Cloud-Ready Storage
sponsored by IBM Tectight
PRODUCT OVERVIEW: Illuminated here is an all-flash array that's primed to prepare your enterprise for cloud migration, with integrated software that enables efficient, proven data virtualization. Read on to take advantage of this SSD suited for virtualized environments, and gain the tools needed to treat cloud as a growth engine for business.
Posted: 29 Jun 2017 | Published: 31 Dec 2015

IBM Tectight

6 Best Practices for Securing AWS Environments
sponsored by Centrify Corporation
WHITE PAPER: Discover how to extend key technologies like identity and access management (IAM) to the cloud for privileged access security (PAS) on AWS IaaS without increasing the risk of a data breach.
Posted: 28 Jun 2017 | Published: 31 Dec 2016

Centrify Corporation

Your In-Depth 2017 Cybersecurity Report
sponsored by Comstor
RESEARCH CONTENT: Out of all of the myriad solutions on the market, information remains one of the greatest weapons that an enterprise can arm itself with. In this expansive 110-page report discover a wealth of research, insights, and perspectives on the current state of cybersecurity.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Comstor

6 Best Practices: Privileged Access Security for AWS
sponsored by Centrify Corporation
RESOURCE: This infographic reveals 6 best practices for implementing and extending AWS security best practices to the cloud. Learn why you should Establish a common security model, consolidate identities, and 3 more ways to securely migrate a cloud environment.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

Rethink Security: A Massive Paradigm Shift in the Age of Access
sponsored by Centrify Corporation
EBOOK: Cyber criminals have increased resources at their disposal to get their hands on both end user and privileged user identities. In this e-book uncover the details about the massive shift occurring in the enterprise landscape and the security challenges this shift creates
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Centrify Corporation

Prevent Attacks, Don't React: Deploying a Preventative Security Model
sponsored by Comstor
WHITE PAPER: Discover how to implement a cloud-delivered, predictive security model that can block phishing attempts, bespoke malware, and other evolving threats from the moment attackers first start spinning up their attack infrastructure.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Comstor

Domino’s Building the Next Iteration of Their Global Online Ordering Platform on Microsoft Azure
sponsored by Rackspace
VIDEO: Domino's CIO Wayne McMahon has stressed that roughly 70% of their orders are made through the platform. While great for business, Domino's needed servers that could scale in this environment. Tune in to learn how moving their global online ordering platform onto Microsoft Azure made this possible.
Posted: 27 Jun 2017 | Premiered: 27 Jun 2017

Rackspace

Ivanti Workspace Management - Secure and Optimize the Citrix Workspace
sponsored by Citrix Ready
WEBCAST: Watch this webinar to find out how the Ivanti products can help protect and secure Citrix desktops against ransomware, control application usage, reduce the number of Citrix images, and personalize users environments regardless of how they access their desktop. Accelerate your move to Citrix platforms and the Citrix cloud with Ivanti solutions.
Posted: 26 Jun 2017 | Premiered: Jul 20, 2017

Citrix Ready

Moving Workloads from Your Data Center to a Hosted Private Cloud
sponsored by Rackspace
WHITE PAPER: Examine why certain workloads should reside in a data center vs. a hosted private cloud, with the respective challenges of each outlined. Access now to consider why companies are deploying more workloads in a hosted private cloud, including faster access to IT infrastructure, improved scalability, and more.
Posted: 26 Jun 2017 | Published: 18 Apr 2017

Rackspace

Success Stories in Enabling Cloud Mobility and Economic Recovery
sponsored by Rubrik
WHITE PAPER: In this white paper, written in conjunction with our experts and Rubrik, you'll learn from 4 organizations how to successfully navigate cloud migration with an innovative approach to cloud data management. Download now to migrate without burdening your already-stretched IT team, and ensure the right backup policies are in place.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Rubrik
76 - 100 of 1118 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement