Cloud Security

RSS Feed   
Cloud Security Reports
1 - 25 of 1176 Matches Previous Page  |  Next Page
How to Make SASE Real for Your Organization
sponsored by Forcepoint
EBOOK: SASE may be in its pioneering stages, but it’s shaped to revolutionize the way corporate networks are securely accessed. With network and security moving through the cloud through SASE, traffic is kept away from your network, keeping it safe from intruders.Dive into this e-book for a glimpse at SASE technology and what it could provide.
Posted: 14 Jul 2020 | Published: 12 Jun 2020

Forcepoint

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

The Challenges of Trusted Access in a Cloud-First World
sponsored by Thales
CASE STUDY: The 2020 Access Management Index is a survey of 300 IT professionals across the U.S. and Brazil with responsibility for, or influence over, IT and data security.In this case study, read how these professionals answered questions regarding cloud access management as well as next steps and guidelines for adopting access management solutions.
Posted: 13 Jul 2020 | Published: 30 Jun 2020

Thales

Brother Secures Access and Reduces Costs with Cloud-based Authentication
sponsored by Thales
CASE STUDY: In order to address the remote access security issues needs of their rapidly expanding support team, Brother Industries began exploring their security options for a partner who would be cost-effective, agile and secure. Download this case study to see how & why Brother partnered with Thales to implement SafeNet Trusted Access (STA).
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Thales

Secure Access to Virtual Environments and Private Clouds
sponsored by Thales
PRODUCT OVERVIEW: As business environments become more distributed, securing and managing the growing population of endpoints presents an increasingly difficult security strategy. In this white paper, take a closer look at the SafeNet Access Management and Authentication offering, designed to deliver secure access to modern environments.
Posted: 13 Jul 2020 | Published: 30 Jun 2020

Thales

The Changing Face of Data Security: 2020 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.
Posted: 13 Jul 2020 | Published: 31 Mar 2020

Thales

DataVisor Scales Multicloud Security & Compliance for Customers
sponsored by Lacework
CASE STUDY: In this case study, discover how DataVisor, a rapidly growing organization that offers AI-based fraud detection and risk management, was able to ensure security, productivity and compliance across their expanding multicloud environment.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Lacework

Build Online Collaboration and Secure Access for Remote Workers
sponsored by Equinix
DATA SHEET: A leading global pain point for many organizations is the need to add capacity from VPN concentrators for employees now working from home. In this brief, learn how Equinix can help enterprises enable thousands of employees working from home to access mission-critical applications and connect with partners and networks to keep business moving.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Equinix

Cloud Foundation 4, Networking & Security Built In
sponsored by VMware
WEBCAST: One of the key components that VMware have invested in with VMware Cloud Foundation to help drive simplification, consistency and developer experience is built-in networking and security at every layer of the stack. In this webcast, hear from VMware experts as they discuss the networking and security benefits of Cloud Foundation 4.0.
Posted: 13 Jul 2020 | Premiered: Jul 13, 2020

VMware

Securing Your Cloud Solutions for Government Adoption
sponsored by Coalfire
ANALYST REPORT: FedRAMP establishes cybersecurity requirements for CSPs that deliver solutions to the federal market and utilizes independent experts to advise organizations and assess their compliance. In this report, assess the market and industry dynamics that affect both FedRAMP and cloud adoption in the federal government.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Coalfire

Protect Business Critical Cloud Apps in a Multi-Cloud World
sponsored by Oracle Communications
WEBCAST: Employees are required to work from home, and enterprise networks are footing the bill. Are your cloud applications are running with the best combination of security and performance available? Watch this webcast to get an in-depth look at cloud functionality and protection for mission-critical business apps and use cases across multiple industries.
Posted: 10 Jul 2020 | Premiered: May 28, 2020

Oracle Communications

Workload Security: Visibility and Analysis for Cloud and Container Workloads
sponsored by Lacework
PRODUCT OVERVIEW: The modern cloud infrastructure requires a shift in the approach to workload security. Download this solution brief to learn more about Lacework’s automated approach to enabling visibility and analysis for cloud and container workloads.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Lacework

Radar for File-Based Cloud Storage
sponsored by Zadara Storage
WHITE PAPER: Access this white paper to study the GigaOm Radar which takes a look at leading vendors in the file storage space and categorizes them based on their strengths and weaknesses.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Zadara Storage

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

The Little Book of Big Success with Snowflake: Data Lakes
sponsored by Snowflake
WHITE PAPER: Many organizations seeking to handle data spread out across an ecosystem of disparate, varied, and siloed sources are now turning to Snowflake. With its scalable architecture and easy integration capabilities, it is replacing or complimenting many legacy data lakes. Read on to learn more about Snowflake’s Cloud Data Platform.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Snowflake

Migrating Oracle Database to Snowflake: Reference Manual
sponsored by Snowflake
WHITE PAPER: Many companies are leaving their old databases behind and migrating to new, cloud platform services. But this process isn’t easy and requires significant preparation by your company. Check out this Snowflake white paper to learn how and why companies migrate from Oracle databases to Snowflake’s Cloud Data Platform.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Snowflake

Jitterbit Secures Dynamic Cloud Environment, Containers, and Microservices at Scale.
sponsored by Lacework
CASE STUDY: In this case study, discover how Jitterbit, and API service provider, was able to address issues related to monitoring activity within their expanding platform by partnering with Lacework to enable holistic activity tracking, streamlined compliance reporting and comprehensive security – without disruption.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Lacework

Insider’s Guide to Cost-Effective Storage Solutions for Higher Education
sponsored by Cloudian
WHITE PAPER: Access this white paper to learn how Cloudian’s cloud storage compares to traditional SAN and NAS systems by looking at its versatile use cases and by discovering its 7 major benefits within higher ed.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Cloudian

The Little Book of Big Success with Snowflake: Healthcare and Life Sciences
sponsored by Snowflake
WHITE PAPER: Even as data revolutionizes healthcare delivery, methodology, and diagnostics, hospitals and other healthcare clinics find themselves relying on rigid and outdated data infrastructure. Read on to learn how cloud data management can eliminate these regulatory compliance issues, among other benefits it offers healthcare professionals.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Snowflake

Wavefront Secures DevOps Environments at Scale with Lacework
sponsored by Lacework
CASE STUDY: Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

Carson Living Secures Rapidly Growing Cloud Environment
sponsored by Lacework
CASE STUDY: Due to the rapid growth in adoption (400% in the past year) of their AWS-hosted application, Carson Living was facing issues related to ensuring cloud compliance and maintaining security configurations. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: Each year, Thales conducts a study into the trends, challenges and tactics of access management in order to better understand their efficacy and usage. The following infographic highlights the key findings from this year’s survey – which features topics like password credentials, cloud transformations, user convenience, and more.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Thales

Cloud Migration Challenges
sponsored by BigID
PRODUCT OVERVIEW: Cloud migrations are nearing the point of necessity – even for highly regulated and risk-averse organizations. So, how can these organizations minimize risk, ensure data privacy and avoid costly disruptions? Read on to learn more about the challenges of cloud migration and how BigID is helping organizations overcome these obstacles.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

BigID

Making the case for cloud-based security
sponsored by ComputerWeekly.com
EGUIDE: Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

ComputerWeekly.com

Reece Group Protects Endpoints and Automates Threat Management
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

BlackBerry
1 - 25 of 1176 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info