ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • BT Cloud Compute Security: Together, We Make The Cloud Secure

    Sponsored by: BT

    Discover the threats every cloud user potentially faces, introductions to advanced security measures to counteract them, and the policies and procedures to help you safeguard your valuable information. You'll also find tips to facilitate the responsibility you must necessarily take for the protection of your own data.

  • Sending and Sharing Large Files: Optimizing Existing IP Networks

    Sponsored by: Signiant, Inc.

    Discover in this paper an advanced file acceleration protocol that works with your business' existing IP networks to eliminate latency, optimize available bandwidth, and overcome throughput bottlenecks when moving large files over distance, like video and high-resolution images.

  • Cool Vendors in Cloud Security Services

    Sponsored by: OpenDNS

    In this resource discover key findings of cloud security, in-depth analysis into cloud security providers, and unbiased recommendations to CISOs who are evaluating technology trends and planning future needs.

  • Enterprise cloud applications – can we trust them?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.

  • From Why to Why Not: The Top 5 Risks of Delaying a Move to the Cloud

    Sponsored by: Infor

    Cost savings are the primary reason that most people are making the switch to cloud, but there are 4 more significant reasons why putting off cloud adoption creates risk for those delaying the inevitable. Access this paper to discover in-depth insight into these top 5 risks.

  • Agility and Communication in the Cloud: Stay on Top of ERP Updates

    Sponsored by: Infor

    This report illustrates how top performing manufacturers ensure that their ERP solutions remain current to provide essential functionality and support growth. Read on to consider cloud deployment for delivery of your ERP solutions to perform automatic software updates, and more.

  • The Cloud: Securing Your Enterprise both Before and After Migration

    Sponsored by: Armor

    In this e-guide, get an in-depth look at the kinds of attacks threatening the cloud. You'll learn about advanced persistent threat (APT) groups targeting the public cloud, how not all cloud services are the same and some harbor unique risks, and how to set up your cloud migration correctly from the get-go.

  • The Art and Science of Value Realization in the Cloud

    Sponsored by: Infor

    Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.

  • Accelerated i/O for Cloud Storage

    Sponsored by: Signiant, Inc.

    Discover in this white paper how to automate secure data movement to and from AWS S3 and Microsoft Azure Blob cloud object storage. Learn how to inject large amounts of data into the cloud while taking care to maintain the order of the data stream in the event of data loss.

  • Tips for Streamlining Financial Processes and Providing Real Time Reporting

    Sponsored by: Infor

    Discover how to address the growing gap between what a modern financial department should be able to and what they are actually able to accomplish with their current toolset. See detailed breakdowns of time spent, how to set a strategy, how to banish silos, and how to maximize ROI.

  • Cloud Security 2016 Spotlight Report

    Sponsored by: CloudPassage

    Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. Uncover the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.

  • How to Harden Your Servers In Elastic Infrastructures

    Sponsored by: CloudPassage

    Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Find out how you can deploy systems through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.

  • Trustwave Global Security Report

    Sponsored by: Trustwave

    Understanding the motivations and resources of professional cybercriminals is key to defending against them. This report gives you an inside look at the business behind malware with stats from breach investigations around the world.

  • A DevSecOps Playbook

    Sponsored by: CloudPassage

    There is a fundamental struggle between the speed that cloud services provide and security. In this white paper discover the concept of DevSecOps, a departure from traditional thoughts about speed vs. security.

  • Securing Agile IT: Common Pitfalls, Best Practices and Surprises

    Sponsored by: CloudPassage

    Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general such as security as a "secondary layer", removing layers from the bottom up, reducing attack surface, and more.

  • 7 Best Practices to Secure Your Data on AWS

    Sponsored by: Rackspace

    This webinar features two AWS-certified professionals who will help you understand how to secure your data on the AWS platform. They will discuss seven best practices for securing data at rest and how those strategies can decrease your risk of a catastrophic data leak.

  • How Linux Containers Change the Development and Delivery of Applications

    Sponsored by: Red Hat

    Discover how to adopt a cloud model for production and consumption of services to facilitate productive DevOps implementation using Linux containers. Read now to deliver the cloud through this container technology, and affect a cost-efficient means of delivering next-gen applications.

  • How to Implement Sound Security for VM and Cloud Environments

    Sponsored by: Armor

    Explore the advantages of outsourcing VM security control responsibilities to a cloud service provider or MSSP. Learn how this strategy can ensure each VM's contents are safeguarded through a combination of vulnerability mitigation and attack detection methods.

  • Two Approaches to Cloud Security: API vs. Proxy

    Sponsored by: Palerra Inc.

    Uncover the difference between two different Cloud Access Security Broker (CASB) deployment strategies, API and Proxy, and what they can do to provide cloud security for your enterprise. You'll find a comparison of their features, learn how to decipher multimode CASBs, and more.

  • AWS Cautionary Tales and How to Avoid Becoming One

    Sponsored by: Palerra Inc.

    AWS can provide a number of security concerns for enterprises, and knowing the pitfalls and possible solutions to them can prove to be invaluable knowledge. Explore real-life cautionary tales of the dangers that AWS can provide, and ways to mitigate these cloud threats.

  • Salesforce Shield for Healthcare

    Sponsored by: Salesforce.com

    Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.

  • Unifying Cloud Security Across Infrastructure and Applications

    Sponsored by: Palerra Inc.

    The threats that the acceptance of the cloud as an integral part of business cannot readily be understated. Discover the challenges of unifying your enterprise's cloud security across infrastructure and applications, and the critical questions of elasticity and the cost of securing sprawl, visibility while maintaining context, and more.

  • Security Tips for HIPAA-Compliant Cloud Storage and Texting

    Sponsored by: Optum

    Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.

  • Pairing SuccesFactors with a HCM Suite to Introduce Innovation to HR Operations

    Sponsored by: Accenture

    Explore how SAP SuccessFactors users can leverage a modern HCM suite to enhance productivity, reduce costs, improve HR operations, transfer data sets securely between systems in the cloud, and more.

  • Virtual Workspace:Finding the Right Workspace Aggregator

    Sponsored by: Matrix42

    This feature white paper expands on some of the questions you may still have about finding the right workspace aggregator. It addresses some of the questions you may have about choosing the right workspace aggregator.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.