Cloud Security

RSS Feed   
Cloud Security Reports
76 - 100 of 1256 Matches Previous Page  |  Next Page
Mobile Security Innovation
sponsored by MobileIron
WHITE PAPER: Download this white paper to see how a highly secure mobile and cloud strategy can provide the in-depth focus and expertise to deliver a highly productive user experience, innovation and scalability.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

MobileIron

Digital Revolution: Moving towards agility
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.
Posted: 20 Mar 2018 | Published: 21 Mar 2018

ComputerWeekly.com

How to Get Your Cloud Migration Strategy Right
sponsored by Splunk
WHITE PAPER: The security challenges of navigating the cloud are widespread. This resource offers strategies for successful cloud migration and provides tips for gaining full visibility in operations, security and cost management.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

Splunk

Effectively Balancing DevSecOps
sponsored by Flux7 Labs
WHITE PAPER: As cyberattacks continue to shake the headlines, security needs to be at the forefront of every organization. This white paper explores how to achieve security with agility in the cloud as well as how to effectively balance DevSecOps.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Flux7 Labs

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

Protecting Your Distributed Data With The Cloud
sponsored by Druva Software
EBOOK: Download this ebook to find out if your organization is at risk and learn how cloud-based data protection can protect your distributed data to minimize risk.
Posted: 13 Mar 2018 | Published: 13 Mar 2018

Druva Software

6 Reasons Cloud Storage is Now as Secure as Traditional Data Center Storage
sponsored by Nasuni
EBOOK: Read the e-book to find 6 reasons why worrying about the security of your data in the cloud is an outdated way of thinking, and why today's cloud storage is as secure as a traditional data center.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Nasuni

Data Classification Services and Keeping Cloud Data Secure
sponsored by Data443
EGUIDE: In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.
Posted: 12 Mar 2018 | Published: 31 Aug 2016

Data443

Cloud migration: Choosing the right strategy and tools
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

ComputerWeekly.com

Scalable NAS and Cloud File Services Product Comparison
sponsored by Nasuni
WHITE PAPER: This white paper compares the business and technical attributes of traditional enterprise NAS and emerging cloud file services solutions—all with the goal of helping you find the file storage system that's right for your enterprise. Download now for the full analysis of these 5 systems.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Nasuni

Accelerate Cloud Transformation
sponsored by Cloud Spectator, LLC
WEBCAST: Watch this video for a comprehensive cloud readiness framework to help map out where your organization stands and accelerate your transformation to the cloud.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Cloud Spectator, LLC

How to Keep Your Containers Secure
sponsored by Aqua Security
WEBCAST: In a containerized deployment, how do you safely pass secrets - like passwords and tokens - between containers without compromising their safety? Watch this webcast to uncover the risks, and learn best practices for keeping your secrets secure.
Posted: 09 Mar 2018 | Premiered: Sep 28, 2017

Aqua Security

The Honeypot Project
sponsored by Armor
WHITE PAPER: As the cloud gains momentum, protecting sensitive data no longer means simply safeguarding on-premises infrastructure. Take a look at this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Armor

A Cloud Readiness Framework to Accelerate Your Cloud Transformation
sponsored by Cloud Spectator, LLC
WHITE PAPER: Read this whitepaper for an overview of the Cloud Readiness Framework and process that will allow your organization to ensure that you're prepared and ready to begin your cloud transformation, while ensuring critical gaps are addressed.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

Cloud Spectator, LLC

Video: Cloud Infrastructure on IBM Power Systems
sponsored by IBM
WEBCAST: Tuning into this video grants you access to see an infrastructure platform designed to support a variety of cloud models, including private, hybrid, and public cloud. You'll learn the advantages of using this purpose-built platform, featuring OpenStack-based management and open source automation.
Posted: 07 Mar 2018 | Premiered: Nov 30, 2017

IBM

Secure Digital Documents in the Cloud and on the Go
sponsored by Adobe Systems, Inc.
WHITE PAPER: Learn about Adobe Acrobat DC and Adobe Document Cloud's security features for enabling secure, mobile-friendly, digital document management.
Posted: 07 Mar 2018 | Published: 30 Jun 2017

Adobe Systems, Inc.

IBM Power Systems and the Cloud
sponsored by IBM
WHITE PAPER: Downloading this resource grants you access to an infrastructure platform designed to support private, hybrid, and public cloud. Inside, you'll learn the advantages of using this purpose-built platform's OpenStack-based management, open source automation, and benchmark availability.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

IBM

Trends in Hybrid Cloud Security: Minding the Gap
sponsored by Aqua Security
RESEARCH CONTENT: According to an ESG survey of security pros worldwide, 80% of organizations will use containers in their production environments by 2020. Explore this resource to learn about trends, challenges, and future plans of hybrid cloud and container security.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Aqua Security

Why Cloud Strategy Matters: The Cloud Strategy Imperative
sponsored by Cloud Spectator, LLC
WHITE PAPER: Does your organization have a well-defined cloud strategy? Download this white paper to uncover five archetypes to assist you in developing and revising your organization's cloud strategy at every stage of the adoption journey.
Posted: 07 Mar 2018 | Published: 31 Aug 2017

Cloud Spectator, LLC

If You Think Compliance is Expensive, Try Violations
sponsored by Oracle
WHITE PAPER: You don't need to be a victim of a cyberattack for your information systems to be on the wrong side of compliance regulations. Explore this white paper to discover how to prepare your sensitive data in the cloud for compliance regulations.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Oracle

4 Architectures for Securely Connecting your Network to a Cloud Data Center
sponsored by Cato Networks
EBOOK: Discover 4 ways to securely and reliably connect your network to a cloud data center so that you can make your infrastructure more agile, cost-efficient, and scalable.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

Cato Networks

Multicloud Management: What does it Take?
sponsored by Intel
EGUIDE: In this expert-guide, explore how the growth of the multicloud has impacted networking strategies from security to provisioning. Then, read on to learn how a cloud management platform can help you solve these challenges, as well as what capabilities it must have to be effective.
Posted: 20 Mar 2018 | Published: 14 Mar 2018

Intel

Build Multilayered Defense for the Cloud and Endpoints
sponsored by ConvergeOne
EGUIDE: Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.
Posted: 14 Mar 2018 | Published: 12 Mar 2018

ConvergeOne

Cloud Storage Adoption Decisions: Weighing Capacity, Cost, and Top Platform Tips
sponsored by Nasuni
EGUIDE: This expert guide from the team at SearchStorage.com will grant you access to a hand-curated list of their top 10 cloud storage platform tips, with additional research content on how your peers are weighing cloud costs and capacity considerations. Access your copy here.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Nasuni

Building the Business Case for Enterprise File Sync-and-Share
sponsored by Nasuni
WHITE PAPER: Based on market research, this guide uncovers the many purchase drivers nudging organizations in the direction of EFSS. Read on, as the content inside covers the features businesses are looking for in EFSS, the business problems EFSS can solve, the risks of going without EFSS (9 are detailed inside), and more.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Nasuni
76 - 100 of 1256 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement