Cloud Security

RSS Feed    Add to Google    Add to My Yahoo!
Cloud Security Reports
76 - 100 of 947 Matches Previous Page  |  Next Page
BYOD & the Cloud: Security Harmony
sponsored by NaviSite, Inc.
WHITE PAPER: This white paper examines how enterprise mobility management (EMM), desktop-as-a-service (DaaS), and a managed Office 365 implementation help address these challenges play a critical role in making BYOD a success. Discover how to enhance your BYOD strategy in this resourceful white paper.
Posted: 21 Dec 2015 | Published: 08 Dec 2015

NaviSite, Inc.

What to Look for in a Cloud Vulnerability Management Solution
sponsored by Tenable Network Security
RESOURCE: This guide is designed to help IT professionals who want to ensure the security of upcoming cloud-based cyber security projects.
Posted: 21 Dec 2015 | Published: 21 Dec 2015

Tenable Network Security

Definitive Guide to CASBs
sponsored by BitGlass
WHITE PAPER: This white paper outlines how Cloud Access Security Brokers (CASBs) can improve cloud application security by intermediating traffic between apps and user devices.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

Defending Your Office 365 Data: Five Threats That Microsoft Can't Defend Against, But You Can
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses where Office3 365's built-in security capabilities fall short and how you can shore up your defenses. Gain the knowledge you need to stay secure while taking advantage of all Office 365 has to offer.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Datto, Inc.

Definitive Guide to Office 365 Security
sponsored by BitGlass
WHITE PAPER: This exclusive white paper reveals how to fill the security gaps in your Office 365 applications. Discover the top 4 ways to secure Office 365 like a pro.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

The Untapped IT Strategy: Unleashing Citizen Development
sponsored by Intuit
WEBCAST: In this webcast, learn how IT can leverage low-code platforms to spread development to the far corners of their organization, thus enabling "citizen development" to remove pressure from IT and reduce backlogs. Additionally, learn how businesses like Expedia are turning to citizen development for innovation.
Posted: 18 Dec 2015 | Premiered: Dec 18, 2015

Intuit

Case Study: Ad Agency Makes Office 365 Secure
sponsored by BitGlass
WHITE PAPER: This case study discusses how a global ad agency found a solution to its Office 365 security concerns. Take a look to see what security measures this organization implemented and how you can do the same.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

Hybrid Cloud Storage Security Brief
sponsored by Microsoft
WHITE PAPER: This brief white paper explores 4 common scenarios of hybrid cloud security concerns for StorSimple hybrid cloud storage solution and how security measures address these scenarios. Read on to learn more.
Posted: 11 Dec 2015 | Published: 31 Mar 2014

Microsoft

Resiliency in the Cloud
sponsored by IBM
WHITE PAPER: This white paper discusses the reality of cloud resilience and how you can take a structured approach to cloud resiliency. Download now to learn four key steps to plan and manage cloud resiliency.
Posted: 09 Dec 2015 | Published: 24 Jun 2015

IBM

Survey: The State of Wireless Security Today
sponsored by Fortinet, Inc.
WHITE PAPER: Learn more about what your peers are doing – or not doing – to secure the wireless infrastructure. Additional data points covered in this report include plans for cloud-managed WLANs and IT decision-maker confidence in relying on third-party hosted management.
Posted: 09 Dec 2015 | Published: 15 Oct 2015

Fortinet, Inc.

Rethinking Network Security and Access to Meet Today's Business Demands
sponsored by Fortinet, Inc.
WHITE PAPER: This paper outlines comprehensive Fortinet's Secure Access offering across 3 deployment modes, which provides the same comprehensive security in both controller-managed and cloud-managed environments. Read how this suite delivers flexibility and simplicity in both the wired and wireless network while ensuring that security is never compromised.
Posted: 09 Dec 2015 | Published: 09 Oct 2015

Fortinet, Inc.

Evaluating File Sync and Share: 12 Questions to Ask About Security
sponsored by Dropbox for Business
WHITE PAPER: In this white paper, learn the top 12 security questions you should be asking before choosing a file sync and share tool, including: How is data encrypted? What kind of permissions control is available? And more.
Posted: 09 Dec 2015 | Published: 31 Dec 2014

Dropbox for Business

The Big Bang – How cloud is changing the face of resiliency
sponsored by IBM
WHITE PAPER: This white paper discusses how the cloud may be the key to robust disaster recovery and mitigating cybersecurity threats and downtime. Read on and discover how implementing the right cloud strategy can help improve your enterprise's business continuity management and ensure stronger data protection.
Posted: 08 Dec 2015 | Published: 31 Dec 2014

IBM

Migrating to the Cloud: A Cookbook for the Enterprise
sponsored by New Relic
WHITE PAPER: In this white paper, you will discover suggested approaches to help you understand the existing state of your applications, and how to approach the migration of those applications. Read on now to migrate new and existing apps to public, private, and hybrid cloud platforms.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

New Relic

5 Steps to Empowering Employees for Secure Cloud Service Usage
sponsored by IBM
WHITE PAPER: This brief infographic highlights five necessary steps to secure cloud service usage. Find out how you can discover, identify, and track cloud application usage and ultimately empower employees to safely use cloud services.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

IBM

How Can I Become an Always-On Business?
sponsored by IBM
WHITE PAPER: This white paper details the 3 prevailing strategies to being an always-on organization to address security threats and protect data without downtime.
Posted: 07 Dec 2015 | Published: 25 Nov 2015

IBM

Why SaaS Security is Hotter than Ever
sponsored by IBM
WHITE PAPER: Access this research reprint to get the latest in multifaceted SaaS security products that decision-makers can expect to see in the near future, and learn ways to embrace SaaS apps without bringing in loads of point products to secure them.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

IBM

The Great Debate: One Integrated Business System vs. Siloed Applications
sponsored by NetSuite
WHITE PAPER: This white paper analyzes the inefficiencies caused by running disparate business applications and systems across your various departments, and demonstrates how a cloud-based software can unify your critical-business processes.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

NetSuite

Why the Security Industry Needs to Adjust to the New CASB Market
sponsored by IBM
EGUIDE: Learn from experts Rob Wright and Dave Shackleford as they discuss the domination of startups in the suddenly hot cloud access security broker market and what will happen if larger vendors decide to join the party.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

IBM

Steps to Reducing the Shadow Cloud Threat
sponsored by IBM
EGUIDE: Shadow cloud threatens enterprise security but there are ways to lessen the risks and protect organizations' systems and applications. Read this expert eGuide to discover how to protect yourself. Uncover key steps to reducing the shadow cloud threat in your business.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

IBM

Data Privacy In The Cloud: Five Current Issues in Compliance
sponsored by OpenText
WHITE PAPER: This in-depth resource can help you navigate compliance laws around the world and adhere to even the most complex regulations in your cloud environment.
Posted: 03 Dec 2015 | Published: 31 May 2015

OpenText

It's Not You, It's Me: Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper discusses why public cloud security is a shared responsibility and explains exactly what your role is when securing public cloud data.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

Alert Logic

Cloud Access Security Brokers in the Enterprise
sponsored by IBM
EGUIDE: In this e-guide, discover why the proper evaluation of cloud access security brokers (CASBs) is critical to finding the best match for you organization's needs. Additionally, expert Dan Sullivan discusses the benefits and outlines key criteria to keep in mind during CASB assessment.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

IBM

When Policy and Productivity go Hand-in-Hand
sponsored by IBM
WHITE PAPER: Access this article and learn how to accommodate the new ways employees collaborate, while also maintaining a level of control and visibility over what corporate data can and cannot be shared with third-party cloud apps.
Posted: 01 Dec 2015 | Published: 22 Sep 2015

IBM

The Mobile Cloud: How Cloud Services Cast Dark Shadows on Mobile Activity
sponsored by IBM
WHITE PAPER: This article explains how cloud app security brokers solutions (CASBs) are giving CISOs visibility into employee usage of cloud apps in the enterprise. Read on to learn the benefits of integrating this technology with enterprise mobility management (EMM) tools.
Posted: 01 Dec 2015 | Published: 04 Nov 2015

IBM
76 - 100 of 947 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement