Cloud Security

RSS Feed   
Cloud Security White Papers (View All Report Types)
101 - 125 of 548 Matches Previous Page  |  Next Page
9 Considerations for Securing Web Apps in the Cloud
sponsored by Alert Logic
WHITE PAPER: Organizations need to re-think their IT security strategies to meet the growing demand for web applications. In this white paper, learn the 9 key considerations for securing web apps in the cloud to prevent data breaches and application-layer attacks.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

Alert Logic

Security for your Cloud-based Web Applications
sponsored by Alert Logic
WHITE PAPER: This Aberdeen Research paper explores the complexity and change in security of cloud-based Web applications and how a "stacked" security approach can prevent DDoS attacks.
Posted: 11 Sep 2017 | Published: 30 Apr 2017

Alert Logic

The New Economics of Cloud Security
sponsored by Alert Logic
WHITE PAPER: In this white paper, learn the 4 principles of a fully managed Security-as-a-Service (SECaaS) to help protect cloud applications without breaking the bank or compromising customer satisfaction.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Alert Logic

5 strategies for modernizing security policy
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of proactive security policies, evolving compliance needs, and expanding corporate infrastructure have all made traditional security policies ineffective. Inside, discover 5 strategies for upgrading your existing policies to remediate these threats, and help make your decision makers confident in your cybersecurity again.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Fortinet, Inc.

Accelerate Data Migration to the Cloud and Boost Security and Efficiency
sponsored by Delphix
WHITE PAPER: Discover how to accelerate and simplify cloud migration without sacrificing data security by incorporating tactics for data governance, self-service, DevOps automation, and beyond.
Posted: 31 Aug 2017 | Published: 31 Jul 2017

Delphix

Is Your Cloud Delivering What Your Customers And Stakeholders Need?
sponsored by Microsoft
WHITE PAPER: A cloud service provider is the way for independent software vendors to differentiate themselves in an increasingly competitive market. This Frost & Sullivan white paper identifies five attributes to look for when evaluating a cloud service provider to support your software development businesses.
Posted: 31 Aug 2017 | Published: 30 Jun 2017

Microsoft

A Guide to Improving Availability and Data Protection in the Hybrid Cloud
sponsored by Veeam Software
WHITE PAPER: The hybrid cloud enables organizations to reduce costs and increase agility – however, you must ensure you are making the shift to the cloud safely, securely, and strategically. Learn how to do so in this white paper.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Veeam Software

How to Move Data Protection to the Cloud
sponsored by Druva Software
WHITE PAPER: Read this resource to discover 5 considerations for moving your virtual systems data protection to the cloud, including improved business agility, simplified management, and more.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

Druva Software

Hackers Have Moved onto the Cloud Exploiting OAuth
sponsored by Cisco Umbrella
WHITE PAPER: In the wrong hands, OAuth can be a weapon. Access this infographic to gain insight into the recent Google OAuth attack, the growing risk, and what can be done to protect your organization from similar attacks.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Cisco Umbrella

Recovering your Company's PCs Affected by Ransomware
sponsored by Acronis
WHITE PAPER: After a ransomware strike on a PC, your company data is at a serious risk. Read this white paper to learn how to safely protect your company's PCs after a ransomware strike.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Acronis

Accelerate Your Glide Path to AWS Cloud Migration
sponsored by Rackspace - AWS
WHITE PAPER: Learn how to take your cloud strategy to the next level in this resource, which will help you plan your AWS cloud migration. By reading on, you'll gain access to advice on app migration paths, improving app security, and when to involve a migration partner.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Rackspace - AWS

Rethink Your Strategy to Defeat Evasive Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Malware is rapidly changing, and security policies need to change alongside it. Inside, learn about why implementing an analytics-based threat detection system is your best bet at keeping your network safe.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Palo Alto Networks

The Road to a Secure, Compliant Cloud
sponsored by HyTrust
WHITE PAPER: Corporations must innovate to stay ahead of the competition, deliver new services to attract and keep new customers, and keep their costs low. Uncover how a well-designed virtualized cloud offers businesses a solution, by keeping their crucial data secure while providing agility and adaptability.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

HyTrust

Don't Just Respond – Prevent Attacks before They Happen
sponsored by Cisco Umbrella
WHITE PAPER: Discover how to use cloud-delivered security services to prevent damaging attacks before they're launched. Learn how to create an advanced threat and malware detection strategy that can proactively identify attack infrastructure with statistical models and pre-emptively protect against most zero-day threats.
Posted: 25 Jul 2017 | Published: 31 Dec 2016

Cisco Umbrella

Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World
sponsored by HyTrust
WHITE PAPER: Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future?
Posted: 25 Jul 2017 | Published: 25 Jul 2017

HyTrust

Protect Your Enterprise From Ransomware With Intelligent Hybrid Cloud Storage
sponsored by Panzura
WHITE PAPER: As the ransomware threat grows, it's becoming increasingly obvious that traditional methods of protection aren't keeping our data safe. Read on to learn how adopting an intelligent hybrid cloud storage system could be the key to mounting a real defense against ransomware.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Panzura

Cloud Security: 6 Tips to Ensure Critical Data is Secure
sponsored by WinMagic
WHITE PAPER: With new legislation such as the EU's GDPR putting demands on your organization, how can you gain the visibility, efficiency, and real-time control to secure data in the cloud? Uncover 6 tips to improve cloud security and compliance.
Posted: 13 Jul 2017 | Published: 06 Jul 2017

WinMagic

The Road to a Secure, Compliant Cloud
sponsored by Intel
WHITE PAPER: In the spirit of business innovation, virtualized cloud enables business decision-makers increased agility in terms of available resources for their workloads and data. Access this white paper to learn about the use cases enabled by a virtualized cloud infrastructure, what benefits you can expect to realize, and more.
Posted: 11 Sep 2017 | Published: 29 Dec 2016

Intel

Data Loss Prevention – Now with CASB
sponsored by Symantec
WHITE PAPER: Data is often maliciously targeted through cloud applications. This resource will help you determine strategies for using DLP and CASB to protect your company in the cloud.
Posted: 22 Aug 2017 | Published: 31 Dec 2016

Symantec

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec

Enterprise Defense at the Speed of Data
sponsored by ThreatConnect
WHITE PAPER: Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ThreatConnect

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Why a Virtual Browser is Important For Enterprise Security
sponsored by Authentic8, Inc.
WHITE PAPER: More malware enters via the web browser than any other place across the network. Find out how to create more sophisticated and granular security controls with a cloud-based, virtual browser. Learn what features virtual browsers should offer, what their potential pitfalls are, and more.
Posted: 28 Jul 2017 | Published: 28 Jul 2017

Authentic8, Inc.

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

The Truth Behind 7 Common DaaS Myths
sponsored by Dizzion
WHITE PAPER: Many people have preconceived notions about Desktop as a Service (DaaS), making them miss out on a modern tech solution that can become a key business driver. Download this white paper to uncover seven of the most common concerns about cloud delivered virtual desktops and the truth behind the myths.
Posted: 07 Jul 2017 | Published: 07 Jul 2017

Dizzion
101 - 125 of 548 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement