Research Library

Powered by

Cloud Security Research

  • Identifying the Benefits of Using SAP Business One on the AWS Cloud

    Sponsored by: UXC Oxygen

    Download this resource to discover the boons of using AWS for SAP Business One, Version for SAP HANA, including architectural considerations that highlight AWS' ability to lower TCO, boost agile infrastructure deployment and scaling, and more.

  • What Does the Future Hold for Medical Image Management?

    Sponsored by: Ambra

    What does the future hold for medical image management? Tune into this webinar to hear from the industry's physician thought-leaders regarding the current state of medical imaging, how digital innovations like cloud boost collaboration, and what the future holds for PACS and EHR.

  • Creating a Secure Infrastructure

    Sponsored by: Oracle Corporation UK Ltd

    Discover how you can gain higher levels of security, efficiency and performance for your data center. Encrypt and decrypt at full speed with zero performance impact and guard against top memory-based attacks.

  • Drive Innovation with Agile Cloud Medical Imaging

    Sponsored by: Ambra

    Tune into this video to learn how to streamline healthcare diagnostic image exchange, automate workflow processes, and allow anytime archival mobile viewing with cloud-based PACS. You'll see how 4 organizations utilize this platform to store, transfer, and access images across a complex web of care providers.

  • Inside The 6 Principal Layers of The Cloud Security Stack

    Sponsored by: Armor

    Learn not only the importance of establishing and maintaining a secure cloud infrastructure, but how to achieve your organization's cloud goals in today's cloud landscape.


    Sponsored by: Armor

    Learn how to instantly defend your Azure operating systems with the right tools, processes, threat intelligence, and analysis without the burden of cumbersome management or expensive deployments.

  • The DIY Guide to PCI Compliance

    Sponsored by: Armor

    Discover how to achieve complete control of your IT environment when you pursue PCI DSS compliance on your DIY cloud security environment. Learn the basics of compensating controls, gain an understanding of the latest version of PCI DSS, and more.

  • Where the 'Edge' and the Cloud Collide: Lessons Learned from Public Cloud Deployment and IoT

    Sponsored by: Hewlett Packard Enterprise

    As lock-in concerns become less prevalent, public cloud adoption continues to rise; however, organizations find that some workloads are best left in-house. Discover the boons and challenges associated with public cloud deployment, and additionally learn how to leverage it to eliminate latency and increase response times for IoT apps.

  • Partners In Health Streamlines Global Transfer of Medical Images

    Sponsored by: Ambra

    Improve the reliability of image transfer systems, as well as scale services as needed, by migrating PACS to the cloud. Download this case study to see a complete elimination of image transfer issues and a meaningful reduction in CT upload times, creating more time to foster dedicated patient care.

  • Medical Imaging and the Enterprise: A Breakdown of Disparate Systems

    Sponsored by: Ambra

    Image-enable your EHRs. Discover the benefits of cloud-based PACS in this case study of New England Baptist Hospital, in which you will learn to overcome cumbersome EHR access and error prone CD uploads with universal viewing of imaging available throughout the entire network.

  • Secure and Efficient Infrastructure for Scale-Out and Cloud

    Sponsored by: Oracle Corporation UK Ltd

    This webcast introduces a system that focuses on key attributes that they developed into their system including: security, core efficiency, and accelerated performance. Access now to learn how to create a cloud infrastructure that is secure by default and has superior core efficiency for Java, database, and big data.

  • The CASB Challenge: APIs or Proxies?

    Sponsored by: Palerra Inc.

    Access this resource to understand the two approaches enterprises have been taking to Cloud Access Security Brokers - proxy and API – and which would be the best for your enterprise.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • The Essential Guide to Microsoft Azure Compliance

    Sponsored by: Softchoice Corporation

    In this guide, you'll get a deep dive into security with Microsoft Azure and find answers to your compliance and regulations concerns in regards to moving into the cloud.

  • Barracuda NextGen Firewall Advanced Threat Detection

    Sponsored by: Barracuda Networks

    Discover how to protect against today's targeted malware using a cloud-based sandboxing that provide granular visibility into malware behavior. Learn how to stop today's advanced malware and ransomware attacks with dynamic analysis and detailed forensics.

  • Barracuda NextGen Firewall X: Simple Cloud-Based Network Management for Small to Midsized Businesses

    Sponsored by: Barracuda Networks

    Discover a next-generation firewall that can stand up to new and evolving cyber threats. Gain antivirus and web filtering functionality without the need for additional IT staff or special training.

  • How to Segment Cloud Workloads for Better Security

    Sponsored by: IBM

    Discover the benefits of microsegmentation to secure your dynamic workload environments and learn how to prepare your IT environment for the shift. Mitigate attacks on cloud workloads and quickly apply new policies as new threat vectors emerge.

  • Getting a Grip on Content: Empowered Content Collaboration in the Cloud

    Sponsored by: IBM

    Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.

  • DDoS Prevention For Attacks That Bypass DNS Rerouting

    Sponsored by: Radware

    In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.

  • Protecting and Empowering your Connected Organization

    Sponsored by: Microsoft

    This white paper explores how Microsoft Enterprise Mobility + Security helps protect your data in a cloud-first world. Learn how EMS can help you restrict and monitor user identities, receive security updates with an easy-to-read attack timeline, enable users to update passwords via a single portal, and more.

  • Content Security in the Cloud Era

    Sponsored by: Barracuda Networks

    Discover a cloud-based approach to content filtering and other benefits for network user and administrators. Learn the most effective new approaches to cloud security in the face of the changing security landscape.

  • Masergy's Unified Enterprise Security Solution

    Sponsored by: MASERGY

    This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency.

  • Complete Email Protection, Delivered in the Cloud

    Sponsored by: Trustwave

    How do you eliminate email threats before they reach the network? Access now to learn how you can use the cloud to achieve advanced protection against modern email threats and in-depth data security and compliance management.

  • Hosting Provider Elastx Transforms App Lifecycle Management with Scale-out Storage

    Sponsored by: NetApp SolidFire

    Avoid the performance variability challenges of legacy storage systems. Read this case study to discover how Elastx transformed their cloud hosting performance, eliminated I/O bottlenecks and the need for legacy SAN, and improved customer loyalty with the implementation of scale-out all-flash storage.

  • Cloud Migration Checklist: The Enterprise Guide

    Sponsored by: Attenda

    Migrating an enterprise's data and applications to the cloud includes a laundry list of considerations – from tools and costs to security. Learn six tasks that should be included on your checklist to ensure a successful cloud migration strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.