All resources sponsored by:

CloudPassage

7 Matches
Assessing the Security and Compliance Posture of an AWS Account and Its Assets
sponsored by CloudPassage
VIDEO:CloudPassage Halo is a cloud security platform for severless, server-based and containerized assets in public and hybrid cloud environments. In this video, watch a demo of how Halo Cloud Secure can assess the security and compliance posture of an AWS account and the assets it contains.
Posted: 10 Oct 2019 | Premiered: 10 Oct 2019
Get This Now


Security Mistakes and the Culture of Innovation
sponsored by CloudPassage
RESOURCE:Software is a fast mechanism to deliver innovation, and public cloud infrastructure is an agile way to support rapid software development and delivery. Both of which can lead to significant cloud security mistakes. In this blog, learn how to avoid 5 common IaaS configuration mistakes that could expose your public cloud computing environment.
Posted: 27 Sep 2019 | Published: 18 Sep 2019
Get This Now


Security Visibility for Cloud Environments: Webinar
sponsored by CloudPassage
WEBCAST:In this webcast, cybersecurity experts Carson Sweet, CloudPassage CEO and founder, and Holger Schulze, Cybersecurity Insiders CEO and founder, will discuss technical factors and operational approaches for successfully achieving continuous, automated risk visibility when adopting public cloud infrastructure.
Posted: 19 Sep 2019 | Premiered: Sep 19, 2019
Get This Now


AWS Cloud Security Report
sponsored by CloudPassage
ANALYST REPORT:Despite massive investments in public cloud security, organizations still have reservations about the security of sensitive data, systems, and services in the cloud. This report reveals the survey results of cybersecurity professionals to gain more insight into the latest trends, key challenges and solutions for AWS Cloud Security.
Posted: 18 Sep 2019 | Published: 18 Sep 2019
Get This Now


The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE:Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018
Get This Now


Tips for managing containers in your virtual environment
sponsored by CloudPassage
EGUIDE:Take a look at this E-guide to learn some of the most common and helpful container use cases, as well as our best tips for managing containers after adoption.
Posted: 23 Jan 2018 | Published: 23 Jan 2018
Get This Now


Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE:This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014
Get This Now


7 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement