Cloud Security

RSS Feed   
Cloud Security Reports
1 - 25 of 1309 Matches Previous Page  |  Next Page
Cloud Services and the Healthcare Alphabet Soup
sponsored by Flexential
WHITE PAPER: As a cloud provider you have to be able to meet any of your client's demands; including strict data protection and privacy regulations. Read this white paper to learn about the healthcare industry's biggest regulation: HIPAA and what it takes to remain within its good graces.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

Flexential

8 Steps to Zero Trust
sponsored by Akamai Technologies
RESOURCE: Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive & concrete zero trust architecture, to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time & reducing your migration risk profile.
Posted: 22 Jun 2018 | Published: 31 May 2018

Akamai Technologies

Traditional Code Signing: 5 Critical Vulnerabilities
sponsored by DigiCert
RESOURCE: Casual code-signing can be very risky for an enterprise. Find out how you can manage those risks, without them negatively affecting your organization.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

DigiCert

Club Automation Case Study
sponsored by Barracuda
CASE STUDY: Find out how IT teams dealt with their security challenges within their hybrid cloud, as well as the positive outcomes they've had from switching platforms.
Posted: 22 Jun 2018 | Published: 31 Dec 2017

Barracuda

Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk
sponsored by Akamai Technologies
WHITE PAPER: A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper to learn how to transition to a perimeter-less world in an incredibly easy way.
Posted: 21 Jun 2018 | Published: 30 Mar 2018

Akamai Technologies

Best Practices: Protect Your Apps from Cyberattckcs
sponsored by F5 Networks
WHITE PAPER: The skyrocketing popularity of websites and web-based applications has come with a corresponding explosion in the numbers, types, magnitudes, and costs of attacks that specifically target app vulnerabilities. Continue reading to reveal who is behind the security breaches, and what you can do to protect your apps.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

F5 Networks

Network Security: Spotlight on Australia/New Zealand
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

ComputerWeekly.com

How Government Goes All-In on the Cloud
sponsored by Equinix
WHITE PAPER: Like any organization, concerns about data security, procurement capabilities, and costs are slowing government agencies path to the cloud. In this case study, learn how a high-profile law enforcement agency decided on a cloud migration strategy that satisfied their sensitive data needs.
Posted: 20 Jun 2018 | Published: 14 Jun 2018

Equinix

Barracuda CloudGen WAF for AWS
sponsored by Barracuda
RESOURCE: This resource explains how the Barracuda CloudGen WAF blocks application layer DDoS and other attack vectors directed at web-facing applications hosted in AWS while protecting against data loss.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Barracuda

Cloud Deployments Demand Cloud Generation Firewalls
sponsored by Barracuda
RESOURCE: When you're building cloud environments, you need a security solution built for the cloud. Find out how cloud generation firewalls are engineered to support specific deployment models and use cases of today's cloud environments.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Barracuda

Microsoft Teams up with Equinix for Greater Cloud Data Security
sponsored by Equinix
RESOURCE: In this blog, find out why enterprises should consider a vendor-neutral HSM-as-a-Service and how it can provide key management, encryption and tokenization across multiple cloud platforms.
Posted: 19 Jun 2018 | Published: 13 Jun 2018

Equinix

Mobile Encryption Provider Turns to Cloud Security Services to Secure Customers' Privacy
sponsored by Radware
CASE STUDY: When hit with a series of massive multi-vector DDoS attacks, leading encryption provider Myntex experienced severe service interruptions that negatively impacted its customers. In this case study, find out how Myntex adopted cloud security services in order to step up their protection against multi-vector threats.
Posted: 19 Jun 2018 | Published: 30 Jun 2016

Radware

Private Storage for Cloud: Solving the Issues of Data Privacy and Sovereignty
sponsored by Equinix
WHITE PAPER: What if you could keep the cloud services you already use to deliver fast data access, without compromising on the safety of that information? In this white paper, learn how 2 vendors are partnering to deliver highly available, secure hybrid cloud environments.
Posted: 19 Jun 2018 | Published: 31 Dec 2016

Equinix

DLP and CASB Aren't Enough: A Better Model for Data Security
sponsored by Vera
VIDEO: Protecting the information that matters the most to your organization, such as sensitive customer data, is one of the main priorities and concerns when using cloud platforms. Listen to this webcast to uncover how you can ensure security of your company's data.
Posted: 18 Jun 2018 | Premiered: 12 Jun 2018

Vera

Cloud Security: Top Threats and Key Defenses
sponsored by TierPoint - VMware
WHITE PAPER: This white paper will teach you about some of the top threats facing clouds today. Then, once you're familiar with how cybercriminals are getting in, learn how you can get them out using techniques such as intrusion detection software, endpoint and anti-virus protection, and much more.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

TierPoint - VMware

7 Things Every Growing Business Needs in Its ERP Cloud
sponsored by Oracle Corporation
WHITE PAPER: Transitioning your ERP system to the cloud early on can increase operational efficiency and cut costs, while also ensuring that your business has plenty of room to grow. Tap into this resource to learn the 7 characteristics of a successful ERP cloud solution for SMBs.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Oracle Corporation

Remote Access Redefined: Managing the Rise of Third-Party Users
sponsored by Akamai Technologies
WHITE PAPER: The explosion of mobile workers and 3rd party users means that organizations may need a new strategy to guarantee secure and convenient access to enterprise applications, whether users are behind-the-firewall or in the cloud. Learn how to tame the problem with a content delivery network service.
Posted: 18 Jun 2018 | Published: 31 Dec 2017

Akamai Technologies

HSM Reimagined: Cloud Ready Encryption, Key Management and Tokenization as a Service
sponsored by Equinix
RESOURCE: More data in multi-cloud environments present increased security challenges, including the inability to obtain total control of encryption keys and data, malicious attacks and more. Learn how HSM as a Service provides cloud-ready encryption, key management and much more to help you stay protected.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Equinix

SOC: Build It or Buy It?
sponsored by Armor
WHITE PAPER: This white paper breaks down staff roles and responsibilities, technology requirements and associated costs, so your organization can operate a successful SOC whether you decide to build it or buy it.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Armor

Selecting Secure Hosting Services: Ultius case example
sponsored by Armor
CASE STUDY: In a GDPR world, it's essential for you to have a secure cloud hosting provider with threat management capabilities to bolster confidence among any users who trust you with either payment or identity related information.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

Armor

Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER: The moat-and-castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is more simple, secure, and convenient way to protect the enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017

Akamai Technologies

The Container Ecosystem: Why Full Stack Container Security Makes Sense
sponsored by Cavirin
WHITE PAPER: Find out the benefits of a full-stack container security approach, so you confidently continue to use containers as the building blocks in any development stage.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Cavirin

Building a Security and Compliance Strategy for the Cloud
sponsored by Armor
WHITE PAPER: Gartner predicts that 95% of cloud failures through 2020 will be due to customers and their mismanagement of cloud resources. Download this white paper to avoid becoming a statistic.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Armor

Managed File Transfer
sponsored by HelpSystems
RESOURCE: Managed File Transfer (MFT) provides companies a safe and audited method for transferring information within and outside of their enterprise. Check out this resource for ways MFT can help your enterprise.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

HelpSystems

Closing the Hybrid Cloud Security Gap
sponsored by Cavirin
RESOURCE: How can you gain visibility and control capabilities to reduce a growing attack surface area and assure compliance with industry regulations? Find out inside.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

Cavirin
1 - 25 of 1309 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement