ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • Machine Learning in Cyber Security

    Sponsored by: Recorded Future

    AI systems are helping security operations centers function quicker and assess problems faster. Read this white paper to discover how your security posture can benefit from predictive analytics and threat intelligence.

  • Access Management Handbook

    Sponsored by: Gemalto

    When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.

  • Unified Endpoint Management: Security & Productivity for the Mobile Enterprise

    Sponsored by: Citrix

    In the era of the evolution of mobile devices and BYOD, client management tools must evolve in order to enhance security platforms. Read this white paper to find out how to provide security to your device's operating system using UEM.

  • The New Face of Cloud-Based Access management

    Sponsored by: Gemalto

    Each new app added to your cloud environment only enhances cloud and compliance risks. Read on to learn about a system that addresses these challenges by combining the convenience of single sign-on with granular access policies.

  • Hybrid Active Directory Security and Governance

    Sponsored by: Quest

    Discover how to know in real time when suspicious activities occur in the cloud and on your Microsoft Active Directory by improving your security posture.

  • A Tactical Guide to Finding the Right IDaaS Provider

    Sponsored by: Simeio

    The breadth and depth of services Identity as a Service (IDaaS) providers offer can vary greatly, creating some confusion about what to look for. This guide can answer some of your top questions about how to choose the right IDaaS provider for your organization.

  • Strengthen Your Defenses Against Cybercrime

    Sponsored by: Mimecast

    With the rapid evolution of cyberthreats, ransomware, and phishing, busineses must update their security platforms. Read this whitepaper to discover how to protect your cloud from cyberattacks

  • Hybrid Active Directory Security Detection and Alerting

    Sponsored by: Quest

    Changes to Active Directory are being made daily without your knowledge. Read this e-book to uncover how to suspect inappropriate changes and take action to protect yourself.

  • Hybrid Active Directory Security Investigation and Recovery

    Sponsored by: Quest

    Discover how to ensure user security while working with Active Directory as well as identify changes across multiple systems.

  • Equinix Delivers Security Intelligence with Cloud-Based SIEM

    Sponsored by: Splunk

    Read this case study to uncover how Equinix, a large technology company, enhanced their security posture with Splunk.

  • 4 Steps to Cloud Access Management

    Sponsored by: Gemalto

    While more organizations than ever are leveraging cloud-based services, that doesn't reduce security issues, it simply creates new ones. In this white paper, learn 4 easy steps to gain full cloud access control to help you keep your environment safe a profitable.

  • One More Reason to Use HCI: Bolstering Security

    Sponsored by: VMware

    As businesses scramble to find new ways to secure their system in the cloud era, hyper-converged infrastructure has risen as a top contender. In this article learn how a software-defined, hardware-independent approach means security can simplify deployment, scaling, automation and orchestration capabilities across the entire infrastructure.

  • Accelerate Your Glide Path to AWS Cloud Migration

    Sponsored by: Rackspace

    Learn how to take your cloud strategy to the next level in this resource, which will help you plan your AWS cloud migration. By reading on, you'll gain access to advice on app migration paths, improving app security, and when to involve a migration partner.

  • Customers Showcase Security Success

    Sponsored by: Splunk

    Data security is vital for companies in protecting sensitive business and customer data. Read this e-book to uncover 15 customer success stories and learn more about analytics-driven security and how to maintain an uninterrupted business.

  • It's Time to Replace your Antivirus

    Sponsored by: Carbon Black

    Discover how the NGAV approach incorporates endpoint security that goes beyond malware to protect its users while integrating features that target tools, techniques, tactics, and procedures.

  • What is Next-Generation Antivirus, or NGAV?

    Sponsored by: Carbon Black

    Next Generation Antivirus (NGAV) prevents cyberattacks on a large spectrum and provides more coverage with less resource requirements. Learn more about NGAV in this webcast.

  • Remedying the Email Security Gaps in Microsoft Office 365

    Sponsored by: Mimecast

    Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.

  • Private Cloud Users Stack Up Third-Party Platform Delivery vs. DIY

    Sponsored by: Red Hat

    Private cloud users speak out, illustrating why they chose to deploy OpenStack cloud platform with a partner vs. DIY private cloud to increase operational efficiency and extend app versatility. Read on to learn how to complement legacy workloads with an open source private cloud partner, and more.

  • Tooling and Automation Support for AWS

    Sponsored by: Rackspace

    By downloading this resource, you'll learn how to automate day-to-day AWS tasks with a tool that will own app migration to AWS, design and maintain your architecture to scale smoothly, and more. Read on to get a detailed rundown of its technical features.

  • Cloud Security: 2017 Spotlight Report

    Sponsored by: Quest

    Access this e-book to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud.

  • Security Considerations For Unstructured Data In The Cloud

    Sponsored by: Panzura

    What kind of data security and recovery can cloud services offer? This e-book discusses a 3-part data security model to keep in mind when you're looking to leverage the cloud. Discover the importance of confidentiality, integrity, and availability in securing the cloud.

  • 10 Steps to Success with Public Cloud Adoption

    Sponsored by: Rackspace

    This white paper lays out 10 steps to a successful public cloud adoption. Inside, you will learn everything you need to know to get your public cloud initiative off the ground, from building a business case to executing your migration.

  • The Imperative for Hybrid IT: Cloud and Innovation in the Modern Era

    Sponsored by: Red Hat

    Today, nearly 90% of enterprises overall use at least one form of cloud. This research report uncovers the what, why and how of the new approaches to IT to understand how companies are coping with public and private cloud.

  • Enterprise Defense at the Speed of Data

    Sponsored by: ThreatConnect

    Discover 5 key factors for efficient security operations, including: using multi-sourced threat intelligence, using advanced analytics to operationalize security intelligence and more.

  • Clearing Public Cloud Hurdles: An Infographic

    Sponsored by: Rackspace

    By downloading this infographic, you'll learn to conquer the top 5 challenges businesses face on the path to public cloud adoption. Read on to access this high-level view of successful implementation, and use public cloud to support forward-leaning compute-intensive workloads like AI and IoT, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.