Cloud Security

RSS Feed   
Cloud Security Reports
76 - 100 of 1256 Matches Previous Page  |  Next Page
Locking Down Private Cloud Security
sponsored by Rackspace
WHITE PAPER: Over 60% of IT security professionals responded that access breaches are one of their primary concerns about the cloud. Discover how companies are leveraging the features of private cloud to reach their data security requirements and bring peace of mind to their security teams.
Posted: 29 May 2018 | Published: 07 Jun 2017


Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises
sponsored by
EZINE: In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how modern network security enables digital transformation at a range of companies. Read the issue now.
Posted: 25 May 2018 | Published: 25 May 2018

Security Transformation Requires a Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: Find out how to build your security transformation strategy for the growing attack surfaces of digital-first businesses that increasingly rely on IoT, SDN, mobile, and multi-cloud technologies.
Posted: 25 May 2018 | Published: 25 May 2018

Fortinet, Inc.

Top 10 public cloud security recommendations
sponsored by Palo Alto Networks
WHITE PAPER: Discover 10 considerations for securing your public cloud workloads and find out how security teams can take a proactive stance on public cloud security, maintaining as strict a defense for cloud infrastructure as they would for traditional data centers.
Posted: 25 May 2018 | Published: 31 Dec 2017

Palo Alto Networks

The GDPR Opportunity: Data Security and Privacy by Design
sponsored by Hortonworks
WHITE PAPER: In this resource, discover how Implementing privacy by design solution can allow organizations to embed GDPR-compliant procedures throughout their on-premises and cloud-based infrastructure and processes, resulting in improved data governance.
Posted: 24 May 2018 | Published: 24 May 2018


Security Operations Center: Build on the Native Security Features of AWS and Office 365
sponsored by Arctic Wolf
WEBCAST: This webcast explores the field of top cybersecurity threats and covers best practices for securing cloud deployments. Find out what cloud services providers like AWS and apps like Office 365 are already doing to secure information as well as how you can build on that foundation to further bolster your defenses.
Posted: 18 May 2018 | Premiered: Dec 31, 2017

Arctic Wolf

How to adapt security for IoT and cloud environments
sponsored by ForeScout Technologies, Inc.
RESEARCH CONTENT: While multi-cloud environments help organizations avoid vendor lock-in and leverage best-of-breed services from various IaaS vendors, there are serious challenges to ensure security – especially IoT endpoint security. Download this IDC research report to learn how you can adopt an agentless and vendor-agnostic security approach.
Posted: 17 May 2018 | Published: 30 Apr 2017

ForeScout Technologies, Inc.

The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era
sponsored by Citrix
EBOOK: In this e-book, find out how to select a modern ADC for digital transformation, designed to span physical, virtual, and containerized form factors in an increasingly cloud-first development world.
Posted: 16 May 2018 | Published: 16 May 2018


Securing Your Enterprise in the Age of Multi-Cloud
sponsored by Versa Networks
RESEARCH CONTENT: In this Gartner newsletter, learn about the potential benefits of SD-WAN, especially for securing cloud environments, and discover 4 paths to a secure SD-WAN architecture for your branch offices.
Posted: 15 May 2018 | Published: 15 May 2018

Versa Networks

A Data-Driven Transformation for AWS
sponsored by Informatica
WHITE PAPER: Migrating to AWS can be a challenge – in this white paper learn how a data management platform can help your along your data-driven transformation and discover 5 potential benefits of making the change.
Posted: 14 May 2018 | Published: 14 May 2018


Mobile Threat Detection Through Machine Learning
sponsored by MobileIron
WHITE PAPER: Find out why some common solutions are less effective against modern threats and how machine learning security compares to cloud-based threat detection and traditional antivirus solutions.
Posted: 11 May 2018 | Published: 11 May 2018


2018 Cloud Security Report
sponsored by HelpSystems
RESEARCH CONTENT: Access this 31-page 2018 Cloud Security Report to reveal current cloud security challenges, tools and adoption trends.
Posted: 11 May 2018 | Published: 11 May 2018


How to secure cloud and software-defined data centers
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Find how you can meet the added security challenges that stem from increasing virtualization with unified visibility and automated, policy-based controls across your physical and virtual infrastructure.
Posted: 10 May 2018 | Published: 31 Dec 2017

ForeScout Technologies, Inc.

The Enterprise Journey to the Hybrid Cloud
sponsored by Cavirin
RESOURCE: Explore the steps required to build a world-class hybrid cloud infrastructure and why you must take into account the risks of having all these systems and applications accessing and manipulating data.
Posted: 09 May 2018 | Published: 09 May 2018


Acrobat DC Security Overview
sponsored by Adobe Systems, Inc.
WHITE PAPER: Explore Adobe's comprehensive approach to security as it relates to Acrobat DC, to help protect your information and experience even further by taking security to a whole new level.
Posted: 09 May 2018 | Published: 30 Jun 2017

Adobe Systems, Inc.

Cloud Security Integrated with SD-WAN: Critical Enablers of Digital Transformation Across Distributed Enterprises
sponsored by Riverbed Technology, Inc.
RESEARCH CONTENT: In this IDC research report, learn about the important role played by SD-WAN and integrated cloud security tools in reshaping network infrastructure for the era of cloud.
Posted: 08 May 2018 | Published: 30 Apr 2018

Riverbed Technology, Inc.

A Modern Approach to Securing Hybrid Clouds
sponsored by Cavirin
WHITE PAPER: According to Gartner, through 2020, 95% of cloud breaches will be due to customer misconfiguration, mismanaged, credentials, or insider theft, not cloud provider vulnerabilities. This 35-page white paper explores a modern approach to securing hybrid clouds.
Posted: 08 May 2018 | Published: 08 May 2018


Going Cloud-First? Start by Rethinking Your Approaches to Networks and Security: An E-Book
sponsored by Riverbed Technology, Inc.
EBOOK: This e-book explores how to update your network and overcome a variety of security and management challenges that come on the heels of cloud adoption. Learn about a next-gen architecture that's designed to help cloud security and cloud networking tools work together.
Posted: 07 May 2018 | Published: 31 Jan 2018

Riverbed Technology, Inc.

IT Priorities 2018 - What's happening in security?
sponsored by
VIDEO: In this video, Computer Weekly's editor-in-chief, Bryan Glick, discusses what's happening in security according to our 2018 IT Priorities survey taken by over 250 IT decision makers and managers.
Posted: 02 May 2018 | Premiered: 02 May 2018

New Cloud Threats to Watch Out for in 2018
sponsored by Juniper Networks
EGUIDE: Safeguarding your critical data is getting harder as threat actors embrace the advantages, and missteps, of cloud. Inside this expert guide, Kathleen Richards details what to watch out for in 2018.
Posted: 30 Apr 2018 | Published: 30 Apr 2018

Juniper Networks

Cloud Network Security for Financial Services
sponsored by Nokia
CASE STUDY: Learn about a SDN-based approach to delivering a cloud-ready, multilayered security and networking infrastructure.
Posted: 27 Apr 2018 | Published: 31 Dec 2017


Adapt Security for Hybrid Cloud Environments
sponsored by Citrix
EGUIDE: In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.
Posted: 23 May 2018 | Published: 18 May 2018


The Changing Face of Privileged Access Management
sponsored by One Identity
VIDEO: Hear from Kelly Hardy and Tyler Reese from One Identity about the importance of privilege access management (PAM) and how you can maintain frictionless security for your organization.
Posted: 18 May 2018 | Premiered: 15 May 2018

One Identity

Should IT Use Desktop Management Tools in the Cloud?
sponsored by Goverlan
EGUIDE: With cloud-based desktop management tools now available, organizations have more to consider when choosing between on-premises and cloud management tools. In this e-guide take a look at the use cases, features and pricing options to choose the best desktop management option for your organization.
Posted: 03 May 2018 | Published: 30 Apr 2018


Does Secure Cloud Backup Exist and How Can it Be Safer?
sponsored by Commvault
EGUIDE: Questions of security, which vendors once thought were put to bed, are rising again in the wake of cloud-based backup's growing popularity. So just how safe are these tools? Read this expert-guide to find out.
Posted: 27 Apr 2018 | Published: 23 Apr 2018

76 - 100 of 1256 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement