Cloud Security

RSS Feed   
Cloud Security Reports
1 - 25 of 1245 Matches Previous Page  |  Next Page
Protecting Your Sensitive Data
sponsored by Symantec
VIDEO: Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud.
Posted: 20 Feb 2018 | Premiered: 14 Feb 2018

Symantec

6 Ways a CASB Makes Cloud Apps Safe for Business
sponsored by Symantec
WHITE PAPER: By 2022, 65% of business productivity tools are expected to have moved to the cloud, according to the Symantec Internet Security Threat Report. This resource offers 6 ways a cloud access security broker (CASB) enables cloud control across all apps and data.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Symantec

Secure Transformation of the Data Center in Healthcare
sponsored by HyTrust
RESOURCE: According to Ponemon Institute's 2017 Cost of a Data Breach study, the average cost of a breach is about $3.62 million. This resource offers best practices for avoiding costly data breaches and securing the transformation of the data center within the healthcare industry.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

HyTrust

Cloud Security: Making Sense of the Shared Responsibility Model
sponsored by Oracle Corporation
WHITE PAPER: For enterprises using cloud services, there's a lot of confusion surrounding the shared responsibility model, particularly with what security measures the enterprise must provide. This resource explores the root cause behind this confusion and offers examples of how enterprises are successfully addressing and embracing the model.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

Oracle Corporation

Developing a Cloud Sourcing Strategy
sponsored by Leaseweb
WHITE PAPER: Download this paper for help in accurately determining the true TCO of cloud services—going beyond just financial cost—with a look at 7 elements that make up your TCO, how to make a meaningful comparison between hosting and on-prem with your current setup, and more.
Posted: 20 Feb 2018 | Published: 31 Dec 2017

Leaseweb

Cloud Apps and Data Security: Are You Safe from the New Threats?
sponsored by Symantec
RESOURCE: How do you plan to conquer cloud chaos within your organization? This resource reveals how a cloud access security broker (CASB) can augment your cloud security approach, while embracing productivity-boosting cloud apps and services.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Symantec

Mitigate the top nine cloud threats with a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

Making the case for a cloud access security broker (CASB)
sponsored by Oracle Corporation
WHITE PAPER: CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Oracle Corporation

8 Essential Secure Web Gateway Characteristics
sponsored by Symantec
WHITE PAPER: According to Symantec's Shadow Data Report, most CIOs think their organizations use around 30 to 40 cloud apps; in reality, the average number is 1,232. This resource offers 8 essential characteristics of secure web gateways to ensure effective cloud security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Symantec

ASEAN IT Priorities 2018
sponsored by ComputerWeekly.com
EGUIDE: This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure.
Posted: 18 Feb 2018 | Published: 19 Feb 2018

ComputerWeekly.com

Reducing Cybersecurity Costs & Risk through Automation Technologies
sponsored by Juniper Networks
WEBCAST: According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.
Posted: 16 Feb 2018 | Premiered: Feb 16, 2018

Juniper Networks

Simplify GDPR Readiness
sponsored by IBM
VIDEO: Watch this webcast as IT leaders from 3 organizations explore the requirements and ramifications of GDPR compliance. Then, learn about how one cloud provider partnered with 2 other technologies to deliver protection for virtual workloads and ensure that the penalties of the GDPR never land at your doorstep.
Posted: 16 Feb 2018 | Premiered: 26 Oct 2017

IBM

Forcepoint CASB: Visibility and Control of Cloud Applications
sponsored by Forcepoint
VIDEO: Watch this webcast to learn about 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they can provide.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018

Forcepoint

Give your Web and Cloud Experiences a Security Tune-Up
sponsored by Symantec
WHITE PAPER: Securing a growing number of devices, operating systems, users and connections is a big challenge. Explore this resource to uncover 7 ways to optimize and get the most out of your secure web gateway.
Posted: 16 Feb 2018 | Published: 16 Feb 2018

Symantec

ANZ IT Priorities 2018
sponsored by ComputerWeekly.com
EBOOK: The IT Priorities 2018 survey results underscore what we already know about the ANZ IT landscape - more investments in software and cloud services to buttress digital transformation efforts, including the greater use of artificial intelligence, machine learning and robotics. But there were a few surprises as well
Posted: 15 Feb 2018 | Published: 16 Feb 2018

ComputerWeekly.com

Easily Extend Data Loss Prevention to the Cloud
sponsored by Symantec
RESOURCE: To avoid regulation penalties, companies need to know where sensitive and personal data resides. This resource offers a strategy for protecting sensitive data in many areas, including the cloud, endpoints, servers, network and email.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Symantec

Inside Commvault's Holistic Data Protection Center
sponsored by Commvault
RESOURCE: Click inside to learn how Commvault's Holistic Data Protection Center can help you protect your cloud data from attacks both inside and out, as well as defend against ransomware, prepare for the GDPR, and more.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

Commvault

What to Know about SIEM as a Service
sponsored by LogRhythm, Inc.
EGUIDE: Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach.
Posted: 15 Feb 2018 | Published: 06 Feb 2018

LogRhythm, Inc.

User Behavior Analysis & SIEM
sponsored by LogRhythm, Inc.
EGUIDE: In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.
Posted: 15 Feb 2018 | Published: 07 Feb 2018

LogRhythm, Inc.

Endpoint Detection and Response
sponsored by CrowdStrike
WHITE PAPER: Utilize this white paper as a guide to understanding EDR, where it fits in your security strategy and what is involved in maturing EDR capabilities so that your organization can derive the greatest benefit.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

CrowdStrike

Clear Data Mapping Starts in The Cloud
sponsored by IBM
WHITE PAPER: This white paper outlines how a multi-cloud SaaS approach can help grant you the visibility needed for GDPR compliance. Click inside to learn 3 steps to GDPR readiness that are boosted by a multi-cloud environment.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

IBM

How Sigma Group Grows Service Portfolio and Boosts IT Agility
sponsored by MicroFocus
CASE STUDY: Download this resource for a snapshot view of Sigma Group's case, in which you'll learn how they launched IaaS and PaaS solutions to provide its small and medium-size business customers more control over their IT via the cloud, using a cloud service automation and hybrid cloud management suite.
Posted: 15 Feb 2018 | Published: 31 Dec 2017

MicroFocus

IoT: Take Control of the Edge
sponsored by VMware
VIDEO: With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud.
Posted: 14 Feb 2018 | Premiered: 05 Feb 2018

VMware

Five Essential Elements of Next-Gen Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: Many endpoint strategies are fixated on stopping malicious attacks, rather than seeking out indicators of attacks that can point to breach activity, even when malware isn't present. Key into this white paper to uncover 5 essential elements of next-generation endpoint protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

CrowdStrike

6 Steps to Build a Holistic Security Strategy with Microsoft 365
sponsored by Microsoft
EBOOK: This e-book outlines how you can take advantage of the security tools built into Microsoft 365 to build a holistic security strategy in 6 steps.
Posted: 14 Feb 2018 | Published: 30 Nov 2017

Microsoft
1 - 25 of 1245 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement