Cloud Security

RSS Feed   
Cloud Security Reports
26 - 50 of 1321 Matches Previous Page  |  Next Page
Top 7 Office 365 Security Use Cases for a CASB
sponsored by McAfee, Inc.
RESOURCE: In this 67-page resource, you'll uncover 7 Microsoft Office 365 use cases for CASB to help consolidate security and compliance capabilities to keep your data safe and secure.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

McAfee, Inc.

Definitive Guide to Securing Workloads on Amazon Web Services
sponsored by McAfee, Inc.
RESOURCE: Cyberattacks to the cloud can be devastating to businesses that rely heavily on daily use of cloud applications. In this thorough resource explore everything from common cloud security challenges, to AWS best practices, and cloud access security brokers (CASBs).
Posted: 08 Aug 2018 | Published: 08 Aug 2018

McAfee, Inc.

Tailoring Intelligence for Automated Response
sponsored by IntSights
ANALYST REPORT: In this SANS product report, learn about enterprise threat intelligence and mitigation tools, and how they can be leveraged to detect or prevent malicious activity more rapidly.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

IntSights

Busting Cloud Security Myths
sponsored by Rackspace Microsoft
WHITE PAPER: Take a look at 3 common misconceptions about the cloud, security, and your data to figure out where you can draw the line between fact and fiction.
Posted: 06 Aug 2018 | Published: 20 Sep 2017

Rackspace Microsoft

Expect to get Hacked
sponsored by Rackspace Microsoft
RESOURCE: Limited security resources may be jeopardizing the safety of your network. Learn what makes cloud services a strong enterprise security option and how it can alleviate management pressure in the areas of security monitoring and threat analysis.
Posted: 06 Aug 2018 | Published: 13 Oct 2017

Rackspace Microsoft

Active Cyber Deception: Can it Improve Cloud Security?
sponsored by Rackspace Microsoft
EGUIDE: Explore this e-guide as Security expert, Dave Shackleford, explains how active deception techniques such as honey tokens, honey accounts, breadcrumbs, and so on can be placed to lure cyberattackers into fake company data, where you can catch incoming threats inside the cloud.
Posted: 03 Aug 2018 | Published: 30 Jun 2018

Rackspace Microsoft

CW Benelux ezine August 2018
sponsored by ComputerWeekly.com
EZINE: It's hardly surprising that the Netherlands is pioneering smart cities. The tech-savvy nation is already planning to have a digital port in Rotterdam with automated ships. Now, according to one Dutch academic, "almost every Dutch municipality is doing something with smart technology".
Posted: 03 Aug 2018 | Published: 09 Aug 2018

ComputerWeekly.com

Top 5 Criteria for Evaluating Cloud Security Tools
sponsored by Alcide
WHITE PAPER: No enterprise can, or ever should sacrifice security, even with the many benefits offered from cloud computing. Download this white paper to explore 5 top criteria for evaluating cloud security solutions so that your data, apps and networks are always protected in the cloud.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Alcide

The Hotel Hijackers
sponsored by Panda Security
WHITE PAPER: Between booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Panda Security

Data Protection for Salesforce
sponsored by Druva Software
PRODUCT OVERVIEW: In order to address the data protection gaps within Salesforce, read this paper, which details how cloud-to-cloud backup can provide Salesforce admins with the data availability they require and ensure that IT teams can meet their organizations' obligations for data resiliency, retention, and compliance.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Druva Software

10 Reasons Enterprises are Moving Security to the Cloud
sponsored by Zscaler
WHITE PAPER: Organizations have already recognized the value in moving apps to the cloud – now they're looking to migrate their security as well. Learn about the Zscaler Security Cloud and discover 10 reasons enterprises have started moving security to the cloud.
Posted: 01 Aug 2018 | Published: 31 Dec 2017

Zscaler

The Salesforce Data Protection Guide
sponsored by Druva Software
WHITE PAPER: Most organizations make the incorrect assumption that Salesforce has redundant and easily accessible copies of their data, and they don't need any additional data protection. Download this white paper to learn 5 reasons why you should integrate Salesforce with a cloud data protection system.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Druva Software

SoftNAS Cloud Editions Feature Matrix
sponsored by SoftNAS
RESOURCE: This feature matrix highlights the technical details of a cloud-native storage solution that provides a private storage virtualization environment to cloud-enable your data and apps. Download your copy here.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

SoftNAS

Connect Your Business Data to the Cloud with SoftNAS Cloud
sponsored by SoftNAS
WHITE PAPER: This white paper details a cloud-native, software-only solution that provides a private storage environment to cloud-enable your data and apps without custom coding or re-engineering. Read on to unlock the ability to migrate live business apps without performance or outage issues, and more.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

SoftNAS

Cybersecurity Compliance: Guide to Data Protection Regulatory Compliance
sponsored by Panda Security
WHITE PAPER: Violation of GDPR and PCI DSS could cause a lot of damage to your organization--ranging from hefty fines to a loss of confidence from customers, contractors and employees. Learn about Panda Security's advanced cybersecurity platform and managed services, which are designed to protect your data and maintain compliance.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

Securing Critical Infrastructure: Hacking Prevention in Different Industries
sponsored by Panda Security
WHITE PAPER: In the digital age, everyone is constantly connected. But that also means that everyone and every industry—ranging from oil pipelines to airport telephone systems—are susceptible to hackers. Download this white paper to learn about the damage hacking does to different industries, as well as what steps you can take to prevent an attack.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

Datasheet: SoftNAS Cloud Platinum Edition
sponsored by SoftNAS
DATA SHEET: The following datasheet addresses the cost problems that plague broader cloud storage adoption with a fully-integrated cloud data platform that cuts storage costs up to 67% through auto-tiering and native support for both block and object storage on AWS and Azure. Read on for the detailed features.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

SoftNAS

Addressing the Hybrid Cloud Security Conundrum for Financial Services
sponsored by IBM
RESOURCE: Explore how an effective security framework can allow financial services organizations to confidently move forward with hybrid cloud while remaining compliant.
Posted: 30 Jul 2018 | Published: 30 Jun 2017

IBM

How to Choose Between On-Premises and IDaaS Delivery Models for Identity and Access Management
sponsored by OneLogin
ANALYST REPORT: In this Gartner report, uncover key challenges and recommendations for IAM leaders, as well as critical how to choose between on-premises and IDaaS delivery models.
Posted: 27 Jul 2018 | Published: 24 Nov 2017

OneLogin

How to Avoid Being Spooked by Shadow IT
sponsored by Kaseya
RESOURCE: Shine the light on shadow IT and find out how your organization can protect its data with vulnerability management software and automated patching.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Kaseya

Simplified Data Protection for Remote & Branch Offices
sponsored by Druva Software
WHITE PAPER: Any company with ROBOs requires a data protection solution with the flexibility to support the differing needs of both their central and distributed sites. This white paper reveals how centralized cloud backup can do so. Download now.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Druva Software

A Modern Approach to Securing Your Hybrid Cloud
sponsored by Dimension Data
RESOURCE: In this e-book, find out how you can deliver automated and elastic security to keep assets and data protected in a hybrid cloud environment.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Dimension Data

Moving from Capex-Reliant Data Backup and Management to Cloud-native Backup
sponsored by Druva Software
RESOURCE: Some legacy storage providers offer platforms "in the cloud." However, these solutions often lack scalability and simplicity, because they are still designed around traditional tape backup approaches. For an alternative, read this resource, which examines a cloud-native backup, archival, and DR solution.
Posted: 27 Jul 2018 | Published: 30 Jun 2018

Druva Software

Introduction to Azure Infrastructure Services
sponsored by Microsoft
RESOURCE: Tune in to get introduced to Azure IaaS. Whether you're well-acquainted with Azure or have never met, you'll get a glimpse at a collection of scenarios within an enterprise where an IaaS platform can shine, such as deploying virtual machines, monitoring and security, disaster recovery, and more.
Posted: 27 Jul 2018 | Published: 31 Mar 2018

Microsoft

Streamlining VM Backups with the Public Cloud
sponsored by Druva Software
WHITE PAPER: Read this paper to learn about cloud-native backup and recovery for VMs. You'll examine how this method overcomes the limitations of tape and disk-based storage, with 5 real-world reasons to back up your VMs to a single, cloud-native backup, archival, and DR platform.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Druva Software
26 - 50 of 1321 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement