Cloud Security

RSS Feed   
Cloud Security Reports
1 - 25 of 1011 Matches Previous Page  |  Next Page
How Cloud Desktops Support Workforce Agility
sponsored by VMware
WHITE PAPER: In this white paper, learn how cloud-hosted desktops and apps help IT meet the needs of an increasing IT workload and find guidance on how to utilize them across different deployment options in your organization.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

TOPICS: 
VMware

How Freshwater Systems Slashed Their AWS Bills with GorillaStack
sponsored by GorillaStack
CASE STUDY: View the study here for the details on an EC2 scheduling solution with GorillaStack that reduced Freshwater Systems' monthly spending by double-digit percentages without compromising performance or availability.
Posted: 20 Feb 2019 | Published: 22 Jan 2018

TOPICS: 
GorillaStack

Game Changing Defensive Strategies for 2019
sponsored by Fidelis
WEBCAST: Security boundaries have extended to cloud service provider environments where perimeters no longer exist. Therefore, organizations cannot defend themselves with the same strategies they did. In this webcast, learn how organizations can evolve their security approach to defend them from the threats of today.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

TOPICS: 
Fidelis

Demystifying AWS EC2 Reserved Instances
sponsored by Nutanix
WHITE PAPER: This guide is designed to help cloud engineers leverage Reserved Instances (RIs) to optimize AWS cloud costs, increase ROI, and reserve capacity for when needed. Download for the full RI rundown, 3 reasons to buy RIs, and bringing RI into practice.
Posted: 20 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Nutanix

China Gateway: Building a China-ready Business
sponsored by Alibaba Cloud
WHITE PAPER: This paper offers proven guidance on how to strategically partner with a cloud provider to expand your business to China. Additionally, read on to access 5 case studies from organizations that have successfully established business in the Chinese market by partnering with CSP Alibaba Cloud.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

TOPICS: 
Alibaba Cloud

Expanding your Business to China? 8 Key Solutions to Succeed!
sponsored by Alibaba Cloud
RESOURCE: Access the following infographic to learn how Alibaba Cloud can provide your organization with support at every stage of entering the Chinese market, from testing the waters to scaling up and customer engagement.
Posted: 19 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Alibaba Cloud

What Attacks Aren't You Seeing?
sponsored by Cisco Umbrella
RESOURCE: We work everywhere, yet traditional network security solutions still focus on protecting employees while on the corporate network. In this resource, learn about the risks of only relying on legacy defenses. Also, discover how Cisco Umbrella can help your organization by providing visibility into all internet requests across your network.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

TOPICS: 
Cisco Umbrella

Top 10 Cloud Security Trends for 2019
sponsored by Nutanix
WHITE PAPER: As enterprise operations expand to multi-cloud environments, data protection tactics must also evolve to address the growing number of possible threats. In this white paper, learn how you can strengthen security by addressing the top 10 cloud security trends for 2019, today.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

TOPICS: 
Nutanix

How Express Connect Helps Enterprises Build Dedicated Connections Between Different Clouds
sponsored by Alibaba Cloud
WHITE PAPER: This paper introduces you to a solution that will help you build secure and stable connections between different cloud environments and on-prem. Read on for a breakdown of features and top 7 benefits highlighted.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

TOPICS: 
Alibaba Cloud

How To Secure IaaS/PaaS Effectively: Customer Responsibilities in the Shared Security Model
sponsored by MASERGY
WHITE PAPER: In this white paper, learn about the impact of IaaS/PaaS on your security focus, your responsibilities under shared security models, and a security analysis of IaaS/PaaS vs. on-premise environments.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

TOPICS: 
MASERGY

Untold Studios Chooses WekaIO Matrix on AWS for Simplicity in Cloud Implementation
sponsored by WekaIO
VIDEO: Samuel Reid, Head of IT, shares Untold Studios' journey in this video, and reveals how WekaIO Matrix, a cloud-native file system that can tier to Amazon S3, proved to be the most cost-effective storage solution for their VFX workflow. Take a look here.
Posted: 18 Feb 2019 | Premiered: 25 Jan 2019

TOPICS: 
WekaIO

Your Journey to China: Evaluating Entry Strategies
sponsored by Alibaba Cloud
WHITE PAPER: Click here to view the contents of this action-oriented white paper, which details several entry strategies to the China market for cloud providers. In addition to those 4 entry options, you'll be privy to how to establish a market presence and selecting a partner to get you there.
Posted: 18 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Alibaba Cloud

Propel PLM: Cloud Security in 5 Minutes
sponsored by PropelPLM
VIDEO: Is my data safe in the cloud? For those considering cloud-based PLM, questions of security always come to mind. In this 5-minute video, Propel Marketing VP addresses common cloud myths, and answers common cloud security questions. Download now to access the full video, and put your mind at ease.
Posted: 15 Feb 2019 | Premiered: 12 Jun 2018

TOPICS: 
PropelPLM

Neustar SiteProtect Customer Success Stories
sponsored by Neustar
CASE STUDY: DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability. In this case study, learn why organizations are turning to Neustar SiteProtect to keep their infrastructures secure.
Posted: 15 Feb 2019 | Published: 08 Feb 2018

TOPICS: 
Neustar

Cloud migration tips
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn from the forerunners in cloud adoption and migration across ASEAN, what a cloud migration factory is, and how to build a cloud security strategy.
Posted: 15 Feb 2019 | Published: 15 Feb 2019

TOPICS: 
ComputerWeekly.com

How Neustar Security Solutions Helps MLB Advanced Media Defend and Deliver Baseball Content
sponsored by Neustar
CASE STUDY: In recent years, MLB Advanced Media (MLBAM) has released a number of mobile apps and a subscription streaming service. In order to continue offering reliable access and prevent DDoS attacks, MLBAM was looking for a new security solution provider. In this case study, learn how Neustar was able to meet these pressing needs.
Posted: 14 Feb 2019 | Published: 08 Nov 2017

TOPICS: 
Neustar

5 Things You Need to Know about a Web Application Firewall
sponsored by Neustar
WHITE PAPER: Web Application Firewall (WAF) is a priority item for IT professionals who are struggling to protect their customer-facing and mission-critical applications. WAFs detect and protect web applications from attacks that try to exploit vulnerabilities. In this white paper, learn 5 things you need to know before buying a WAF.
Posted: 14 Feb 2019 | Published: 13 Apr 2018

TOPICS: 
Neustar

Neustar UltraDNS Customer Success Stories
sponsored by Neustar
CASE STUDY: Neustar UltraDNS delivers performance and security for thousands of enterprises. They enjoy fast, accurate responses and few dropped queries, along with protection from DDoS attacks and other cyber threats. In this case study, discover how Neustar UltraDNS has helped a number of companies improve their DNS performance.
Posted: 14 Feb 2019 | Published: 20 Oct 2017

TOPICS: 
Neustar

6 Critical Reasons for Office 365 Backup
sponsored by Veeam Software
EBOOK: Continue reading to find out the six vulnerabilities that hundreds of IT pros have identified in their own Office 365 environments— and how to patch any data protection holes in your own instance.
Posted: 14 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Veeam Software

ASICS Automates Incident Management and Resolution With Real-Time Log Analysis
sponsored by Splunk Services UK Ltd
CASE STUDY: In order for ASICS to combat cyberthreats and address incidents at the very moment they occur, ASICS required a central platform to manage, correlate and analyze logs generated from multiple systems. In this case study, learn about the ASICS' experience using Splunk Enterprise.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
Splunk Services UK Ltd

South African Financial Services Company Gears Up for the Multi-cloud
sponsored by Nutanix
CASE STUDY: This IDC paper spotlights a South African financial services company that laid the foundation for an effective multi-cloud strategy with hyper-converged infrastructure. Read here for the takeaways.
Posted: 14 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Nutanix

Cloud Based Asset Management
sponsored by Axonius
RESOURCE: When companies move to cloud instances like Amazon ECS/EKS/EC2, and Microsoft Azure, they are often faced with a compromise. They realize the reliability, flexibility, and cost savings of the cloud often sacrifice the security and visibility they have invested in for on-premise assets. In this infographic, learn how Axonius can help.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Axonius

Backup and Disaster Recovery for AWS Workloads
sponsored by Veeam Software
WEBCAST: Watch this session to learn the essentials of protecting critical data and workloads in AWS, including discussions on the native AWS data backup options, low-cost alternatives for protecting data in AWS, and compliance and ransomware concerns.
Posted: 13 Feb 2019 | Premiered: Jun 21, 2018

TOPICS: 
Veeam Software

Veeam Builds Your Availability All the Way to the Cloud
sponsored by Veeam Software
VIDEO: Alex Fraser and Nick Furnell from Veeam Software provide guidance on leveraging the public cloud as part of your organization's overall backup, recovery, and availability strategy. Tune in as they walk you through a demonstration of the benefits of Veeam Cloud Connect.
Posted: 13 Feb 2019 | Premiered: 23 May 2018

TOPICS: 
Veeam Software

Incident response playbook in flux as services, tools arrive
sponsored by SearchSecurity.com
EBOOK: The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
SearchSecurity.com
1 - 25 of 1011 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement