Data Security Through the Cloud
By: Cisco Systems, Inc. View more from Cisco Systems, Inc. >>
Download this next:
CLOUD API SECURITY RISKS: HOW TO ASSESS CLOUD SERVICE PROVIDER APIS
By: TechTarget Security
Type: eGuide
Cloud APIs can greatly ease many cloud computing processes; however, they can also expose your critical data and applications to threats. Insecure interfaces and APIs have been listed as one of the top security threats to cloud computing. So what can you do to keep these APIs secure? This expert guide from SearchCloudSecurity.com takes an in-depth look at API security, answering critical questions and providing helpful tips for securing your cloud APIs.
These are also closely related to: "Data Security Through the Cloud"
-
Cloud Security 101: Best Practices & Self-Assessment
By: TechTarget
Type: Resource
As organizations big and small ramp up their use of cloud services and resources, cyberattackers are taking notice. With your business in the crosshairs, the need for effective, reliable cloud security has never been greater.
Take a minute to answer a few questions on your cloud security pain points and receive immediate access to our new eBook, Cloud Security 101: Best Practices & Self-Assessment. Highlights inside include:
- Single cloud vs. multi-cloud security challenges, compared
- 5 tools that enhance your cloud threat protection
- Cloud security quizzes: Put your knowledge to the test
Unlock all this and more by taking our quick Cloud Security survey now!
-
Addressing Data Security In The Cloud And Low Cost Large File Transfer
By: TechTarget Security
Type: eGuide
This expert resource helps you discover how to properly store data in the cloud. (Learning that ignoring the physical location of cloud data is one of the major mistakes made all too often.) This E-Guide also addresses how to transfer large files safely without having to pay the typical hefty price tag it typically takes to do so.
For example, download and discover the top security issues usually associated with large file transfers and the little-known low-cost options (e.g., cloud services, SSH FTP and the like) that are now available to ensure file transfer activity isn't a data breach waiting to happen. In short, you get a soup-to-nuts understanding of the of the best options to consider when securing the file transfer needs of a business, and gain valuable insights as to why failing to address insecure file transfer activity is such a major mistake that could cause sensitive data to leak out of a network at alarming rates. If you’re focused on storage, networking, security or related topics, this resource is a must read.
Find more content like what you just read:
-
Solution Spotlight: Evaluating Cloud Security Concerns
By: TechTarget Security
Type: eGuide
Access this expert e-guide that reveals successful strategies for protecting sensitive data in the cloud, as well as how to effectively defend against the latest threats and maintain compliance while taking advantage of the benefits of cloud computing.
-
July Essentials Guide on Cloud Computing
By: TechTarget Security
Type: eBook
This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.
-
How Cloud-Based Mobile Device Security Streamlines Data Protection
By: TechTarget Security
Type: White Paper
Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
-
Hosting Applications in the Cloud: What You Need to Know
By: TechTarget Security
Type: eGuide
The following E-Guide addresses important information on hosting apps in the cloud as well as security and requirement management.
-
HOW TO USE PCI SSC SUPPLEMENT TO ACHIEVE PCI COMPLIANCE IN THE CLOUD
By: TechTarget Security
Type: eGuide
This expert guide from SearchSecurity.com examines highlights of the PCI SSC's guidelines to help your business achieve PCI compliance in the cloud. Read on to learn how you can easily secure your applications and your customers' trust.
-
Understanding DLP in the cloud
By: TechTarget Security
Type: eGuide
In this tip, uncover how data loss prevention (DLP) for the cloud works and how it can actually enhance security and compliance beyond traditional DLP solutions for physical environments.
-
How to integrate SaaS with CASB
By: Palo Alto Networks
Type: Analyst Report
Today, organizations rely on the cloud for core business applications and data, but a layered approach has also increased complexity and brings new challenges. This ESG report digs into how integrating CASB with SaaS security providers aims to address these challenges by delivering key capabilities. Read on to get started.
-
Nixing Cloud Data Protection Pain Points 101
By: TechTarget Security
Type: eGuide
This expert SearchStorage.com E-Guide covers the pain points of cloud data protection and evaluates one vendor's response to the challenges of cloud data protection.
-
Overcoming Enterprise Data Protection Challenges
By: Palo Alto Networks
Type: eBook
Data usage and dependence has evolved rapidly in recent years – which has led to a rise in the necessity for effective data loss prevention (DLP), especially as organization migrate their data to the cloud. Access this exclusive e-book for a closer look at modern data protection challenges and requirements and an intro to cloud-based DLP.
-
The key underpinnings of cyber resiliency: What 1000 IT decision makers report
By: Dell Technologies
Type: Analyst Report
In this analyst report, explore the findings from Dell Technologies’ 2024 Global Data Protection Index, a survey of 1,000 IT decision makers and 500 IT security decision makers globally on how the modern business needs to navigate the complex terrain of data protection.
-
Own your data across any cloud
By: Veeam Software
Type: Webcast
92% of businesses operate with hybrid cloud infrastructure. While hybrid cloud delivers a multitude of benefits for business, it also comes with its share of challenges for backup. In this webcast, Veeam hybrid cloud backup experts Sam Nicholls and David Hill discuss key topics surrounding the state of hybrid cloud data. Watch now to learn more.
-
Hybrid Cloud Data Protection: Larger Enterprise
By: Cobalt Iron
Type: Analyst Report
Large enterprises are under scrutiny to better manage their growing volumes of data. With that goal in mind, this analyst report aims to assess how well solutions for hybrid cloud data protection are positioned to serve specific market segments and deployment models. Read on to learn how different vendors stack up.