Cloud Security

RSS Feed   
Cloud Security Reports
26 - 50 of 1099 Matches Previous Page  |  Next Page
Security in a Hybrid Cloud Environment
sponsored by CenturyLink
RESOURCE: In this blog post, learn how you can manage your different cloud platforms and resources from one single interface – so you can be sure of where your resources are located across your different cloud platforms, what those resources are doing, and how they are being secured.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

CenturyLink

10 Questions IT Leaders Should Address to Secure Content on the Office 365 Tenant
sponsored by Ascendum Solutions LLC
WHITE PAPER: Office 365 is the most popular cloud-based service for storing content, whether via email, document or even corporate chat format. Download this white paper for 10 key questions you must address to protect company content in Office 365.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

Ascendum Solutions LLC

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

Employing Application Identities to Secure Server Workloads with Aporeto
sponsored by Aporeto
ANALYST REPORT: Learn how Aporeto takes an application identity-based approach well aligned with the attributes of modern infrastructure to protect hybrid clouds from unauthorized access, a range of vulnerabilities, and threats.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

Aporeto

Informatica Eliminates SSH Key Management with Aporeto Cloud PAM on AWS
sponsored by Aporeto
CASE STUDY: In this case study, dive into the benefits and solutions that Informatica received when utilizing Aporeto’s Cloud PAM to provide them with comprehensive visibility and better control over their sprawling environment.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

Aporeto

High-Security Cloud Management
sponsored by Cloudcheckr
WHITE PAPER: Highly regulated industries like healthcare, financial services, and the public sector require high security standards when migrating to the cloud. Download this whitepaper to understand 4 key security advantages to using a cloud management tool during your adoption journey.
Posted: 30 Sep 2019 | Published: 10 Jun 2019

Cloudcheckr

API Security: What You Need to Do to Protect Your APIs
sponsored by Data Theorem
ANALYST REPORT: Despite growing awareness of API security, breaches continue to occur. API management and web application firewall vendors are addressing the problem. But, application leaders must design and execute an effective API security strategy to protect their APIs. In this Gartner report, discover recommendations for developing an API security strategy.
Posted: 27 Sep 2019 | Published: 28 Aug 2019

Data Theorem

A DevSecOps Guide
sponsored by Aqua Security
WHITE PAPER: After understanding the value of a DevOps mindset, making the cultural shift and reaping the benefits, many companies are aiming for the next big step: integrating development, operations, and security into one organization. In this white paper, learn how to successfully implement DevSecOps in your organization.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Aqua Security

Security Mistakes and the Culture of Innovation
sponsored by CloudPassage
RESOURCE: Software is a fast mechanism to deliver innovation, and public cloud infrastructure is an agile way to support rapid software development and delivery. Both of which can lead to significant cloud security mistakes. In this blog, learn how to avoid 5 common IaaS configuration mistakes that could expose your public cloud computing environment.
Posted: 27 Sep 2019 | Published: 18 Sep 2019

CloudPassage

Key Considerations when Making the Move to Office 365
sponsored by Smarsh
WHITE PAPER: In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Using the AWS Well-Architected Framework to Support DevSecOps
sponsored by nClouds
RESOURCE: In this blog, discover strategies for applying guidelines from the AWS Well-Architected Framework in a low-friction way to make it easier to prioritize security and advance your DevSecOps approach.
Posted: 25 Sep 2019 | Published: 19 Nov 2018

nClouds

Nops Helps 6connex Achieve Iso-27001 Compliance, Reduce Aws Cloud Costs by 50%
sponsored by nClouds
CASE STUDY: Security and compliance are critical for delivering on client satisfaction, which underscores the need for better cloud management visibility to ensure there are no infrastructure gaps. Click on this case study to see how nOps cloud management for AWS provided better security visibility and ended up cutting cloud costs by 50%.
Posted: 23 Sep 2019 | Published: 23 Sep 2019

nClouds

Security Visibility for Cloud Environments: Webinar
sponsored by CloudPassage
WEBCAST: In this webcast, cybersecurity experts Carson Sweet, CloudPassage CEO and founder, and Holger Schulze, Cybersecurity Insiders CEO and founder, will discuss technical factors and operational approaches for successfully achieving continuous, automated risk visibility when adopting public cloud infrastructure.
Posted: 19 Sep 2019 | Premiered: Sep 19, 2019

CloudPassage

How To Build A Well-Architected Cloud For U.S. Government Agencies
sponsored by DMI Inc
CASE STUDY: How do institutions like the Pentagon and Social Security get control of their data-driven needs? Download this case study which shows how notoriously slower-moving government agencies have boosted their delivery with projects like app development through DMI's cloud management dashboard.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

DMI Inc

How you connect to the cloud matters
sponsored by CenturyLink
RESOURCE: Learn about a highly secure cloud connection in this infographic built for public, private, hybrid, and multi-cloud infrastructures.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

TOPICS:  Cloud Security
CenturyLink

AWS Cloud Security Report
sponsored by CloudPassage
ANALYST REPORT: Despite massive investments in public cloud security, organizations still have reservations about the security of sensitive data, systems, and services in the cloud. This report reveals the survey results of cybersecurity professionals to gain more insight into the latest trends, key challenges and solutions for AWS Cloud Security.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

CloudPassage

Security for DevOps - Enterprise Survey Report
sponsored by Data Theorem
ANALYST REPORT: In order to get more insight into securing cloud-native applications, ESG surveyed IT and cybersecurity professionals responsible for evaluating, purchasing, and managing cloud security technology products and services. Read on for key research findings.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Data Theorem

The State of Data Protection and Cloud
sponsored by Veritas
WHITE PAPER: As the enterprise data environment becomes more complex, so does the challenge of ensuring cost-effective, efficient data protection. In a recent survey, 250 IT executives discussed how they were providing comprehensive backup and recovery across their virtual, physical and multi-cloud environments. Download this white paper to learn more.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Veritas

Six Biggest Migration Challenges
sponsored by VMware
WHITE PAPER: Getting started on the cloud can quickly become a tiresome project, as migrating requires several levels of shifting applications and processes to fit your public cloud vendor's environments. Download this migration whitepaper to learn the 6 biggest challenges of adopting the cloud, and start to create a proactive approach to mitigate them.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

VMware

Cloud Data Protection for VMware Cloud on AWS
sponsored by Druva Software
WEBCAST: Join this webinar to hear a trio of experts as they walk through how you can leverage Druva and VMware Cloud on AWS to seamlessly move and protect apps without rework, simplify data center migration into AWS, achieve robust backup and DR for hybrid environments, and more.
Posted: 12 Sep 2019 | Premiered: Aug 8, 2019

Druva Software

How a Leading Professional Services Firm Enhanced Collaboration with Cloud Security
sponsored by Cisco Umbrella
CASE STUDY: Global professional services firm, Arup, moved from Cisco Cloud Web Security to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go and reduced its exposure to malware. Download this case study to learn more.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Cisco Umbrella

Data Protection for Your VMware Hybrid Cloud
sponsored by Druva Software
WEBCAST: Watch this on-demand webinar to discover a tool that simplifies backup and DR for VMware Hybrid Cloud and that fully integrates with vSphere/ESXi environments: Druva Cloud Platform. A walkthrough of benefits and a comparison to traditional backup environments is also included.
Posted: 11 Sep 2019 | Premiered: Sep 11, 2019

Druva Software

6 Ways to Make Your Security Stack Work Harder
sponsored by Cisco Umbrella
WHITE PAPER: The average company uses more than 50 security vendors. And sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. In this white paper, check out 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Cisco Umbrella

CyberArk Privilege Cloud Reduces Risk with PAM SaaS
sponsored by CyberArk Software, Inc
RESOURCE: Creating and executing a successful privileged access security program can seem like a daunting task. Privileged access is pervasive throughout the enterprise and can be difficult to manage without the right tools. In this blog, learn how CyberArk Privilege Cloud can help organizations start their privileged access management journey.
Posted: 10 Sep 2019 | Published: 01 Aug 2019

CyberArk Software, Inc

NTT Provides Object Storage to Its Customers with Cloudian and HPE
sponsored by NTT
VIDEO: Tune into this video to hear Barun Agarwala, Enterprise Architect at NTT, explain why NTT integrated object storage into their service offerings and how doing so has not only improved their internal systems, but their customers' data access speeds, as well.
Posted: 10 Sep 2019 | Premiered: 08 Aug 2019

NTT
26 - 50 of 1099 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement