ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • The 6 Phases of a DDoS Incident Response Plan

    Sponsored by: Arbor Networks

    Any enterprise that operates online needs to have robust defenses to detect and mitigate DDoS attacks. Key into this white paper to learn about how you can protect your organization against harmful DDoS attacks.

  • Economics of DDoS Attacks

    Sponsored by: Arbor Networks

    DDoS attacks are cheaper than ever for the perpetrator, extremely lucrative for the attack service provider, and financially devastating for the target. Read this white paper to gain insight into DDoS attacks to prevent your company from having to pay the steep fines.

  • What You SIEM is What You Get

    Sponsored by: AlienVault

    No matter the company size, a properly executed SIEM strategy is difficult to achieve. Explore these white papers to uncover how to implement a successful SIEM strategy for your organization

  • A Minute in the Life of Google's Security Infrastructure

    Sponsored by: Google Cloud

    Defending the world's largest network against persistent and constantly evolving cyber threats has driven Google to architect, automate, and develop advanced tools to help keep us ahead. This report outlines how we've built and evolved our defenses so you can apply the same architectural decisions to your own business.

  • Cisco and Splunk: Innovation through the Power of Integration

    Sponsored by: Splunk

    In this webcast, gain a better understanding of the partnership between Cisco and Splunk. Then find out how IT network pros are able to leverage better cloud security and quickly troubleshoot issues and outages.

  • Compliance-as-a-Crisis: Managing Cloud Compliance

    Sponsored by: Hosting.com

    The average investment to meet cloud compliance obligations is $250,000 per year, and the fees for not complying can be as much as $100,000 a month. This webcast reveals cloud compliance pains, compliance considerations in the public cloud, and security best practices within compliance.

  • The Truth about Information Governance and the Cloud

    Sponsored by: IBM

    Uncover the 4 pillars of successful hybrid public cloud information governance. Learn how, with these 4 pillars in place, your organization can have the flexibility to move with speed and confidence.

  • Virtualization's Next Phase: Unleashing Innovation by Extending VMware into the Cloud

    Sponsored by: Rackspace

    Read this IDC white paper to examine six steps that will pave the way toward an effective and efficient private cloud environment. Inside, you'll discover the boons of moving VMware workloads to a private cloud, guidance on which workloads you should move, and more.

  • What You SIEM is What You Get

    Sponsored by: AlienVault

    A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.

  • Considering Data Recovery in the Cloud: Infographic

    Sponsored by: Rackspace

    Download this infographic to gain an overview of the tangible benefits realized from implementing cloud DR, how it enables apps to function in a replicated environment until hardware stability can be restored, as well as a few tips on testing and documenting your DR plans.

  • Transitioning IT Projects to the Cloud with a Managed Cloud Partner

    Sponsored by: Rackspace

    By accessing this e-book, you'll learn how to successfully transition your projects and workloads to the cloud without disruption, using the 12-action item list included inside as guidance. Read on to get your copy.

  • Study: A Private Cloud Solution to Power Fujitsu's Transformation

    Sponsored by: Rackspace

    Access this study to learn why Fujitsu General chose to employ a fully managed private cloud to replace their unreliable infrastructure, in order to mitigate poor performance, outages, security vulnerabilities, and more. You'll see their success, and discover if partnering with a cloud provider works for your enterprise, as well.

  • The 4 Critical Areas You Must Address for Cloud Security

    Sponsored by: Symantec & Blue Coat Systems

    As companies grapple with the demands imposed by this shifting security landscape, it's critically important to consider the best risk mitigation steps to take. Dive into this white paper to uncover the 4 most commonly exposed risk points for cloud security.

  • Enterprise Cloud Applications & Services Adoption, Use, and Content and Threats

    Sponsored by: Symantec & Blue Coat Systems

    In this Symantec CloudSOC Shadow Data Report, uncover the key challenges that enterprises face when trying to ensure their sensitive data in cloud apps remains secure.

  • Amazon Web Services: Overview of Security Processes

    Sponsored by: Amazon Web Services

    You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.

  • An Overview of the AWS Cloud Adoption Framework

    Sponsored by: Amazon Web Services

    Cloud migration offers a lot of strategic advantages, but these can only be leveraged when a team knows what it is doing. AWS cloud adoption framework (AWS CAF) helps organizations understand how cloud adoption transforms the way they work, and it provides structure to identify and address gaps in skills and processes.

  • How to Get the Most Value from an Office 365 Investment

    Sponsored by: Citrix

    Download this infographic to learn in a nutshell how to achieve faster Office 365 migration, easier maintenance, and improved security with a desktop management suite that will also automate app compatibility tests, encrypt data in motion, and more.

  • 11 Steps IT Needs to Take When Adopting Cloud Apps and Services

    Sponsored by: Symantec & Blue Coat Systems

    Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.

  • Symantec™ Cloud Generation Malware Analysis

    Sponsored by: Symantec & Blue Coat Systems

    Hackers continue to show endless ingenuity in penetrating corporate networks with malware, which means organizations need to fight back harder than ever. By reading this white paper, you'll learn more about defeating malware.

  • The Business of IT Transformation

    Sponsored by: Rackspace

    Tune into this webcast to hear from the CIO and Digital CTO at Rackspace, who in detail dissect the term "digital transformation" and highlight the challenges driving businesses like yours to the cloud. They also run down an actionable cloud implementation checklist, for you to use as guidance.

  • Managing Cloud Sprawl in the Age of Cloud Services

    Sponsored by: Citrix

    While many organizations are adopting multiple cloud deployments, and for good reason, you need to avoid cloud sprawl. You want to benefit from the cloud without putting your sensitive data at risk. Read on to learn about a digital workspace that enables you to avoid cloud sprawl.

  • Extend Your DLP to the Cloud

    Sponsored by: Symantec & Blue Coat Systems

    With the rise of the cloud, your sensitive and compliance related data is at risk now more than ever. Find out how integrating your on premise Data Loss Prevention with CASB technology can enhance your cloud security.

  • Infographic: The Cost of Cloud Expertise

    Sponsored by: Rackspace Intel

    On average, 5% of total global revenue per enterprise is lost each year due to a lack of cloud expertise. Use this infographic as a means to cut through your cloud concerns, discovering how to bridge the expertise gap in your organization to avoid any cloud-related revenue loss.

  • Why You Need to Control Shadow IT, Not Just Discover it

    Sponsored by: Symantec & Blue Coat Systems

    The rapid, often uncontrolled, growth in the adoption of cloud apps creates a need for improved visibility – it's impossible to control what you cannot see. Read this white paper to uncover how to ensure your organization's safe migration to the cloud.

  • The Cost of Cloud Expertise: Report

    Sponsored by: Rackspace Intel

    Is a lack of expertise stifling your investment in cloud computing? In this report, you'll discover the full ramifications the lack of expertise could be costing your business. Read on to see sections on how to overcome multi-cloud complexity, to know when to partner with managed providers, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.