ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • Security Delivery Platform

    Sponsored by: Gigamon

    The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.

  • What CIOs Need to Know About IoT and Security Risks

    Sponsored by: MASERGY

    Perimeters have vanished. Organizations need to move past traditional security approaches and move to technologies like software-defined networking (SDN), which brings performance and efficiency advantages as well as security improvements. With so much to gain from the IoT, don't be scared away by fixable risks.

  • IDC Server Security: Virtualization and Cloud Changes Everything

    Sponsored by: TrendMicro

    Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.

  • Evaluating Hybrid Cloud Security Options to Control Network Security

    Sponsored by: MASERGY

    This e-guide helps you evaluate your hybrid cloud security options to best secure your data as it moves to the cloud. Learn what different organizations are implementing to help their situation, including host-based security tools, encryption and other security services.

  • Building a Cloud Network: What Does It Mean?

    Sponsored by: MASERGY

    Building a network that supports cloud computing appears, for many engineers, to be a path paved by fat pipes. But that's not always the case. Find out what it means – and what it will take – to build a cloud network for your business.

  • Cloud Computing & VDI In Facts and Figures

    Sponsored by: Dell, Inc.

    Since 2005, remote working users has increased by 80% opening up possibilities of security risks and vulnerabilities and requiring a cloud infrastructure solid to handle demand. VDI is key in keeping this infrastructure efficient and secure. Access this white paper to learn more benefits of VDI.

  • Cloud Security Requires Shared Responsibility Model

    Sponsored by: CloudPassage

    When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.

  • Keep Cloud Applications Secure During The DevOps Process

    Sponsored by: CloudPassage

    To minimize cloud application risks, make sure your security strategy accounts for each phase of a DevOps project. Find out why effective cloud app security starts with building security into every step of the development process and how you can make security a key part in each step of the DevOps process.

  • Data Sovereignty and Your Path to True Information Governance

    Sponsored by: Commvault

    Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.

  • Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance

    Sponsored by: TrendMicro

    In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.

  • Gartner Research Paper Enterprise Firewall

    Sponsored by: Fortinet, Inc.

    This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.

  • Assessing the Risk: Yes, the Cloud Can Be More Secure Than Your On-Premises Environment

    Sponsored by: Amazon Web Services

    Discover cloud security myths and a framework for assessing risk while comparing existing complex data center environments with new architectures in the cloud. You'll also learn three factors that contribute to cloud risk and security decisions.

  • 3 Ways to Migrate SAP to Microsoft Azure

    Sponsored by: Microsoft

    This white paper reveals 3 ways to migrate your mission-critical SAP applications to Microsoft Azure cloud. Explore these scenarios, and learn how you can overcome the risks of cloud migration to gain all the benefits.

  • IBM's Content-Focused Mobile App for Sales Teams – Powered by Box Platform

    Sponsored by: Box

    Not all applications are secure and seamless enough to handle the content your sales team needs, and on the fly. Learn about IBM's new app that can enable your sales teams to interact with your most pertinent customer content and data on-the-go with one PaaS mobile platform.

  • Content PaaS for Your Enterprise Applications

    Sponsored by: Box

    In this white paper, receive in introduction to Box Platform, a content platform as a service (PaaS). Explore how you can create better content experiences for your users, and introduce advanced collaboration to your apps with user-facing services that utilize granular permission control over all app content.

  • Best Practices for Securing Workloads in AWS

    Sponsored by: TrendMicro

    While the provider secures its own data centers, network, system hardware and typically the virtualization layer, your responsibility is the security of your OS and underlying infrastructure. Get more expert analysis from Gartner about how you can gain greater visibility into your IaaS solution and get the most of out of AWS.

  • How Amazon Web Services (AWS) Eases Enterprise Data Center Management

    Sponsored by: Red Hat

    Hybrid cloud computing service models add new challenges for your IT department, which is already battling the complexities of virtual infrastructure. Discover in this white paper how to leverage Amazon Web Services (AWS) to flexibly extend your data center capacity when needed, taking advantage of advanced cloud management.

  • The Basics of Cloud App Integration

    Sponsored by: Oracle Corporation

    Your organization is ready to move to the cloud in order to reap its benefits, so all you need to do is crank out applications—easy, right? Amy Reichert, seasoned software tester, elaborates on the types of cloud app integration, and you will discover the different challenges they present to testers and data integration.

  • Secure an Office 365 and Exchange hybrid setup

    Sponsored by: Symantec Corporation

    This e-guide shows you six important factors to consider for the larger picture in Exchange Server security with a hybrid setup. These factors take into consideration the high-level of security issues that can surface when you disrupt the critical business system.

  • Take Office 365 data security from the cloud into your own hands

    Sponsored by: Symantec Corporation

    This e-guide shows you four key security factors you must consider before you migrate into the cloud. Learn how to properly encrypt and backup sensitive information, without the risk of data leakage or breaches.

  • IDC: Protecting Your SaaS Applications

    Sponsored by: TrendMicro

    Learn why businesses that use SaaS services must proactively assess the status of their security program to maintain its effectiveness. Find out how to work with your employees and put effective controls in place to enforce your policies.

  • SMBs Drive Public Cloud Spending

    Sponsored by: CDW

    Find out why SMBs are spending more on public cloud services. Plus, learn why perception of public cloud security is changing, and discover recommendations on which cloud services to deploy first.

  • Data Masking and Subsetting

    Sponsored by: Oracle Corporation

    Copying production data for non-production purposes, such as test and development, is increasing the exposure of sensitive data, expanding the security and compliance boundary and the likelihood of data breaches. Learn how masking and subsetting data reduces the exposure of the sensitive production data for non-production environments.

  • Forward Thinking Backup Through Unified Data Protection

    Sponsored by: Veritas

    This white paper highlights a unified backup and recovery solution that manages workloads on multiple physical, virtual, and cloud platforms. Read on to see how this converged platform can enable your enterprise to manage and protect mixed workloads across your enterprise and reduce administration and infrastructure costs.

  • A Step-By-Step Guide to Finding the Right Safenet Data Protection Solution for Your Organization

    Sponsored by: Gemalto

    Deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it is data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.