Cloud Security Reports

5 Security Oversights to Avoid with IAM Configurations
sponsored by Beta Systems
EGUIDE: When it comes to cloud security, permissions are everything. As such, configuring your IAM module for said cloud must be done meticulously, making sure every base is covered. Study this expert guide containing 5 common security oversights to avoid with IAM configuration pertaining to provisioning, process automation and more.
Posted: 04 Nov 2021 | Published: 20 Jan 2021

Beta Systems

Fast Forward IAM
sponsored by Beta Systems
PRODUCT OVERVIEW: In the era of cloud computing, every aspect of the organization – especially cybersecurity – needs to be scalable and cloud-focused. In this product overview, take a closer look at Beta System’s Fast Forward IAM, designed to protect, provision and manage access at the scale of cloud.
Posted: 04 Nov 2021 | Published: 05 Nov 2020

Beta Systems

The future of enterprise IT: Social, mobile, analytics and cloud
sponsored by ComputerWeekly.com
EGUIDE: Mobile and data technologies are allowing organisations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organisations in Australia.
Posted: 09 Sep 2021 | Published: 15 Aug 2016

ComputerWeekly.com

MicroScope – September 2021: Stepping forward after Covid
sponsored by MicroScope
EZINE: In this issue, discover what the lasting impact of Covid-19 is likely to be as the channel emerges into a post-pandemic world. Also discover more about disaster recovery for SMEs and how best to make a plan to protect your business, and read about an uptick in cloud-based contact centre-as-a-service solutions
Posted: 02 Sep 2021 | Published: 03 Sep 2021

MicroScope

The Complete Pocket E-Guide to Cloud Security
sponsored by Nexum
EGUIDE: As today’s organizations come to rely on cloud applications, capabilities and environments in order to conduct their business, cloud security has become a necessity. Read this e-guide to learn about today’s cloud security challenges and how to develop your own cloud security strategy.
Posted: 26 Aug 2021 | Published: 26 Aug 2021

TOPICS:  Cloud Security
Nexum

How to transition security to the cloud in 2021
sponsored by Cisco Secure
WHITE PAPER: Find out why cloud-native security is better able to provide visibility into internet activity across all locations, users and devices, on and off-network.
Posted: 18 Aug 2021 | Published: 15 Mar 2021

TOPICS:  Cloud Security
Cisco Secure

DRaas and the key decision points in DR-as-a-service
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Cloud Market Report Australia
sponsored by ComputerWeekly.com
EGUIDE: What is the state of Australia's cloud market? Inside this market report, industry experts share their thoughts on how the key players measure up and find out how Bendigo Bank, Frisk, Pizza Hut, RMIT Online, Unit4 are maximising their cloud investments.
Posted: 29 Jul 2021 | Published: 30 Jul 2021

ComputerWeekly.com

Public cloud in India: A guide to building digital resiliency
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the rise of India as a cloud powerhouse, what major suppliers are doing in the market and an expert's take on the importance of having a cloud operating model to drive business outcomes from cloud initiatives.
Posted: 26 Jul 2021 | Published: 27 Jul 2021

ComputerWeekly.com

How to Create a Cloud Security Policy, Step by Step
sponsored by AWS
EGUIDE: The key to modern cloud success lies in effective cloud security policies. Read this e-guide to learn more about the importance of cloud security policies, their core components, and a step-by-step guide for creating them.
Posted: 22 Jul 2021 | Published: 16 Jul 2021

TOPICS:  Cloud Security
AWS

IT Security Alert for Insurers: 8 Ways to Reduce Risk, Optimize Costs Right Now To Enable Transformation
sponsored by Ensono Limited
RESOURCE: As customers demand greater flexibility, options and mobile service, insurers' technology investments must improve agility, speed to market and data insights. Download this checklist to find out 8 ways Ensono can help insurers optimize and modernize mainframes, infrastructure and cloud.
Posted: 02 Jun 2021 | Published: 02 Jun 2021

Ensono Limited

IT Priorities 2020: Covid-19 accelerates cloud investments by UK IT leaders
sponsored by ComputerWeekly.com
EGUIDE: The updated 2020 IT Priorities Survey from Computer Weekly and TechTarget shines a light on how the Covid-19 coronavirus pandemic has reshaped IT leaders' technology investment plans.
Posted: 06 May 2021 | Published: 06 May 2021

ComputerWeekly.com

Cloud Security 101: Best Practices & Self-Assessment
sponsored by Palo Alto Networks
EGUIDE: In this eguide, review best security practices in the age of cloud, and read through two cloud security quizzes from industry experts.
Posted: 13 Apr 2021 | Published: 16 Mar 2021

Palo Alto Networks

CASB, CSPM, CWPP Emerge as Future of Cloud Security
sponsored by Palo Alto Networks
EGUIDE: In this eguide, learn about the emergence and the future of Cloud security tools that will help bring successful and securely protected cloud environments.
Posted: 13 Apr 2021 | Published: 16 Mar 2021

TOPICS:  Cloud Security
Palo Alto Networks

Multi-Cloud: A Blessing or Curse? What Security Teams Need to Keep in Mind
sponsored by Palo Alto Networks
EGUIDE: In this eguide, read through a glossary of terms related to multi-cloud security, discover the risks of single vs multi-cloud security, and gain insight into different multi-cloud security strategies.
Posted: 13 Apr 2021 | Published: 16 Mar 2021

Palo Alto Networks

Cloud Security 101: Best Practices & Self-Assessment
sponsored by TechTarget
RESOURCE: This e-guide walks you through security best practices in the age of cloud. Also inside, put your security knowledge to the test with two cloud security quizzes from our experts.
Posted: 01 Apr 2021 | Published: 02 Apr 2021

TechTarget

Webinar - Securing IAM: The New Cloud Perimeter is Broken
sponsored by Palo Alto Networks
WEBCAST: It’s no secret that the cloud is vulnerable, but professionals must become aware of just how vulnerable the cloud can be. In this webinar, learn how one simple misconfiguration in identity and access management allowed researchers to compromise a massively-scaled cloud environment and bypass just about every security control.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

Palo Alto Networks

Your Hybrid Infrastructure Is Under Attack
sponsored by Palo Alto Networks
WHITE PAPER: In a recent survey, 85% of IT pros selected hybrid cloud as their ideal operating model. However, these clouds come with their share of complexity. Namely, they require a high level of interconnectivity, which increases the risk of malware attacks, or worse. Don’t delay – Leverage this white paper to learn how to secure your hybrid environment.
Posted: 15 Mar 2021 | Published: 10 Nov 2020

Palo Alto Networks

Multicloud Architecture Migration and Security
sponsored by O'Reilly
WHITE PAPER: Multicloud’s growth is outpacing even hybrid cloud solutions in today’s market. The next step is understanding how to best manage multicloud environments, as well as keep them secure. Inside this 58-page O’Reilly report, discover the benefits and challenges of using multicloud edge solutions.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

O'Reilly

The State of Cloud Native Security
sponsored by Palo Alto Networks
ANALYST REPORT: As more and more applications are migrated into the cloud, and organizations focus less on their own on-premises hardware, countless cloud and app security questions have arisen. This State of Cloud Native Security Report delves into the current market landscape for cloud and cloud-native security.
Posted: 08 Feb 2021 | Published: 16 Jul 2020

Palo Alto Networks

Dutch Insurance Provider Deploys Barracuda Firewalls from Data Unit
sponsored by Barracuda
CASE STUDY: Aevitae, a leading Dutch insurance provider company, was not satisfied with any of their existing firewalls solutions. They sought a solution that would provide seamless, end-to-end data visibility across their hybrid environment. In this case study, learn why Aevitae ultimately decided to partner with Barracuda Networks.
Posted: 08 Feb 2021 | Published: 15 Jul 2020

Barracuda

Securing Your Cloud Solutions for Government Adoption
sponsored by Coalfire
ANALYST REPORT: FedRAMP establishes cybersecurity requirements for CSPs that deliver solutions to the federal market and utilizes independent experts to advise organizations and assess their compliance. In this report, assess the market and industry dynamics that affect both FedRAMP and cloud adoption in the federal government.
Posted: 08 Feb 2021 | Published: 13 Jul 2020

Coalfire

The Cisco Umbrella Advantage
sponsored by Cisco Secure
EBOOK: Today, “the office” can be anywhere, and traditional security just can't keep up. That's where Cisco Umbrella comes in. Powered by predictive intelligence, Umbrella acts as your first line of defense against threats. Read this e-book to learn how this unique advantage can make a difference for your organization.
Posted: 08 Feb 2021 | Published: 29 Aug 2022

Cisco Secure

Remote Work in the Age of Covid-19
sponsored by BROADCOM, Inc
WHITE PAPER: The average 100,000 person organization has between 1,500 and 3,000 applications that run the business. In examining the applications in your organization, do they provide ample threat protection while still being able to run smoothly? Learn recommended steps to evolve your network strategy to support long-term remote work.
Posted: 08 Feb 2021 | Published: 25 Jun 2020

BROADCOM, Inc

Conquering cloud security threats with awareness and tools
sponsored by SearchSecurity.com
EZINE: The global market for cloud security products and services is booming, and so are threats. Increasingly, a company must beware of nation-state hackers, though the problem of vulnerabilities caused by human error within the organization persists.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

SearchSecurity.com