ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • 5 Considerations for Securing Hybrid Clouds

    Sponsored by: Intel Security

    This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.

  • Your Blueprint to Securing Your Public and Hybrid Cloud

    Sponsored by: Fortinet, Inc.

    Discover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in.

  • Defining Security for Today’s Cloud Environments

    Sponsored by: Fortinet, Inc.

    Uncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn why organizations need to augment traditional firewalls and security appliances with expanded protection for east-west traffic, both within internal networks and across clouds.

  • The Transformative Impact of the Cloud: Hybrid Cloud, Public and Private IaaS, and More

    Sponsored by: Hewlett Packard Enterprise

    In the following research report from 451 Research, learn about the various adoption patterns with cloud computing and discover if these occurrences are something that will affect you sooner than later. Inside, uncover trends, insights into cloud's best practices, and more.

  • Cloud Computing Security Considerations and Requirements

    Sponsored by: Palo Alto Networks

    In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.

  • Analysts Reveal how to Secure SaaS

    Sponsored by: Palo Alto Networks

    This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.

  • TAG Cyber Report: 2017 Security Annual – Vol. 1

    Sponsored by: Digital Guardian

    This report provides CISO team members with detailed technical and architectural guidance based on fifty specific controls that support the reduction of cyber risk. It's a practical handbook and reference guide for the cyber security professional.

  • Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van

    Sponsored by: Ambra

    Discover why choosing the right cloud platform can make or break your PACS. Additionally, view the key benefits accrued from cloud PACS adoption, including the elimination of CDs, seamless cloud delivery and collaboration, reduced time-to-care delivery, and enhanced relationships with referring physicians.

  • How to Conquer Security on the Public, Private, and Hybrid Clouds

    Sponsored by: Fortinet, Inc.

    Learn about the key security considerations for all cloud environments, enforcing the value of agile and elastic cloud security. Discover the ingredients of a solid cloud security approach, including: scalability, underlying cloud infrastructure, micro-and internal segmentation, SIEM, and more.

  • Companies, Digital Transformation and Information Privacy: The Next Steps

    Sponsored by: Hewlett Packard Enterprise

    The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.

  • Securing Office 365 Is Easier Than You Think

    Sponsored by: Palo Alto Networks

    SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.

  • Case Study: Jefferson Radiology Implements Cloud VNA

    Sponsored by: Ambra

    See how Jefferson Radiology, a Connecticut-based innovative practice, revolutionized imaging workflows by replacing their legacy image exchange vendor and migrating to a new cloud-enabled PACS. Learn about best-in-class image management that will automate workflows and provide seamless cloud access to records.

  • Questions to Ask Your Cloud Service Provider: Know how your Data will be Protected in the Cloud

    Sponsored by: Intel Security

    As you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more.

  • IoT: Internet of Things or Internet of Threats?

    Sponsored by: Radware

    This research report aims to convey the challenges, threats, and opportunities that C-level security executives face when it comes to information security. Learn why the IoT is one of today's top concerns, and what organizations can do to ensure security.

  • Case Study: Disc Comfort Fuses Image Management and the Cloud

    Sponsored by: Ambra

    Wherein lays the path to seamless, secure medical image access? Learn how to improve patient care with a cloud imaging suite that will reduce time spent loading and viewing patient CDs. Additionally, discover how transitioning on premise CDs to the cloud for storage and retrieval will transform patient care.

  • CareWell Streamlines Patient Journey & Reduces Risk with Cloud-Enabled PACS

    Sponsored by: Ambra

    Discover how to streamline image management, reduce risk of data exposure, and eliminate barriers to siloed information across the network by cloud-enabling PACS. Learn from Carewell's case study how to streamline every aspect of the patient journey.

  • The New World of Unified Image Management

    Sponsored by: Ambra

    In order to truly embrace a collaborative care environment, the future of interoperable medical imaging lies in the cloud. Download this e-book to discover how implementing cloud-based PACS will enhance digital imaging workflows, boost storage capabilities, grow your network, and improve patient care.

  • Diagnosed with Silo Syndrome? A Cloud-Based Treatment Guide

    Sponsored by: Ambra

    In this guide, you'll discover the deleterious impact of silos on your organization, and take action by leveraging the latest cloud technologies to streamline image acquisition. Read on to learn why you should leverage cloud to unify, share, and store images, and imagine-enable your EHRs.

  • Hybrid Cloud workloads: The Essential Guide

    Sponsored by: ComputerWeekly.com

    Debate continues to rage within the enterprise about the long-term benefits of adopting a hybrid cloud method of IT consumption. This Essential Guide shows everything the enterprise needs to know.

  • How Graphiq Blocked Bot Data-Scrapers & Improved SEO

    Sponsored by: Distil Networks

    Uncover not only how to block bot data-scrapers, monitor suspicious activity, and eliminate spikes in traffic, but also how to significantly improve the user experience. Also learn how to deploy an automatically updating "known violators" database to keep up with the latest threats.

  • Secure Locations for Your IT Platforms

    Sponsored by: BT

    It is critical to maintain the balance between critical business data upkeep and facility security to host your IT systems. Learn about the cloud's role in making your network secure, sufficient, and sustainable while maintaining that necessary balance.

  • Securing Microsoft Office 365 - The Inside Track To Threat Protection

    Sponsored by: Proofpoint, Inc.

    This report explores Office 365 adoption concerns around issues such as threat protection, intelligence and response. Find out what additional security measures your organization can take to securely deploy Office 365 and reap its full benefits.

  • Nucleus Research Guidebook: IBM QRadar on Cloud

    Sponsored by: IBM

    Learn how to eliminate the need for expensive hardware and IT personnel oversight by utilizing the cloud. Deploy quickly and achieve faster time to value with a growing range of additional cloud security services. Realize the benefits of a managed cloud infrastructure and more through this brief resource.

  • The Holistic Patient Health Record: Image Enabling the EHR

    Sponsored by: Ambra

    Discover how to provide seamless access to data within the EHR with a unified cloud framework. Learn the most important functionalities to look for in a cloud-enabled EHR system that prioritizes quality imaging, including: single sign-on, mobile accessibility, seamless image exchange, and scalable disaster recovery.

  • Beyond Certificate Management for Enterprises

    Sponsored by: Certified Security Solutions (CSS)

    Discover how to manage PKI, why handling just the digital certificates might not be enough, and some best practices for controlling PKI operations to help reduce risk and improve efficiency. Learn the value of centralizing certificate sources, being able to prevent outages, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.