ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • Network Security Alternatives for the Cloud

    Sponsored by: TrendMicro

    Discover a blow-for-blow comparison of how to best deploy IDS/IPS functionality to protect cloud instances. Learn the differences in approaches, what organizations do to meet compliance requirements, how they defend against threats, and more.

  • Compliance Glossary of the Cloud

    Sponsored by: VMware

    Discover a comprehensive glossary of compliance standards for the cloud. Learn what your enterprise needs to remain compliant in the following fields: Audit/Assurance, Management, Finance, and more.

  • Day in the Life of a Security Admin

    Sponsored by: RSA Softcat

    Luckily for your CISO, it's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements directed by the CISO for each application for any user, from anywhere, to anything.

  • Cloud Communications Security and Privacy

    Sponsored by: Cisco

    Discover the security and privacy capabilities of a cloud based collaboration platform. This is in addition to the standard messaging, calling, file sharing and meeting capacity that makes collaboration technology invaluable to any enterprise.

  • Security Solution Trends 2016

    Sponsored by: Juniper Networks, Inc.

    In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.

  • Streaming Cloud Deployments

    Sponsored by: VMware

    Cloud computing is now a mandatory strategy for global businesses but requires more dept. restructuring than any other technology/trend. So how can organizations seamlessly migrate workloads and create VMs in the cloud? Access this white paper to learn about a cloud network program that enables cost effective delivery of hybrid cloud services.

  • Removing the Risk from Compliance in the Cloud

    Sponsored by: VMware

    Within this white paper, learn how to mitigate cloud security compliance concerns by aligning with the right cloud service provider. Ensure responsibilities are shared for meeting compliance and security requirements and maintain a stringent information security policy.

  • Cloud App Development: Finding the Right Mix

    Sponsored by: Velostrata

    In this e-guide, discover what needs to be done internally with your hybrid cloud environment to better suit it for modern, fast app development and testing, such as DevOps and continuous integration.

  • You May Need Additional Backup to Prevent Data Loss From Your SaaS Solutions

    Sponsored by: Druva Software

    Gartner's latest research results compare and contrast the pros and cons of SaaS solutions for backup/recovery. Find out why SaaS may (or may not) fall short in preventing data loss as Gartner reviews Google Apps v. Microsoft Office 365 v. Salesforce.

  • Insider’s Guide To Minimizing The Impact of Ransomware

    Sponsored by: Druva Software

    This white paper provides 6 steps you can take to reduce the impact of ransomware and other malware attacks. Learn how you can restore data quickly from time-indexed copies in order to reduce vulnerability and its costs.

  • Data Sovereignty Challenges

    Sponsored by: VMware

    As countries adopt their own unique data sovereignty laws, its important companies remain cognizant of where their data is stored to avoid international ramifications. In this brief infographic, learn about the projected growth of cloud, international data flow and key steps countries have taken to instate compliance measures for data access.

  • Perspective: The art and science of value realization in the cloud

    Sponsored by: Infor

    Discover how to optimize your enterprise's cloud expense and see just how much business value it creates. See such value added as physical records saving, workforce hours, and streamlined workloads.

  • Don't Let The Cloud Cast A Shadow On Security

    Sponsored by: Cisco Systems, Inc.

    Discover how cloud adoption is exploding, how risks to enterprise data on the cloud are equally exploding, and how to protect your organization's livelihood after it migrates. Most importantly, learn how to turn your network into a sensor for enhanced security across your entire cloud infrastructure.

  • Overcome Cloud Security Challenges With These Five Expert Tips

    Sponsored by: Hewlett Packard - Intel Xeon

    Security is the number one concern for enterprise IT when it comes to public cloud. In this exclusive e-guide, explore five tips to determine the security tools and strategies that will work best for you.

  • Addressing Cyber Security Concerns of Data Center Remote Monitoring Platforms

    Sponsored by: Schneider Electric

    This informational white paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. Access this information now to evaluate the merits of remote monitoring vendors and their solutions.

  • Implementing IaaS as a Private Cloud

    Sponsored by: Red Hat

    This video demonstrates how to implement infrastructure-as-a-service (IaaS) as a private cloud. Through the example of a web application company, learn how to gain scalability for future expansion, increased density for cost savings, and much more.

  • Evaluating Hybrid Cloud Management Vendors

    Sponsored by: Red Hat

    This report by Forrester evaluates the strengths and weaknesses of 11 hybrid cloud management vendors. See how each vendor scored on core criteria, and uncover which 7 vendors lead the way.

  • Cloud Migrations: Realize the Power of a Next-Gen Infrastructure

    Sponsored by: Red Hat

    The name of the game is delivery—the highest quality at the lowest price. Many are seeing a cloud migration as the best game plan, but are unsure about how to get there. Read on to learn about a consulting service that guides you every step of the way in your migration to the cloud.

  • File Governance and Sync/Share Made Easy

    Sponsored by: Red Hat

    Learn about a tool that extends secure enterprise file sharing and corporate drop-box services to your private cloud and scale-out storage environments—with easy access from web, desktop, or mobile. Access this resource to utilize the ease of drop-box style folder access alongside the scale and flexibility of object storage.

  • Optimize Application Life Cycle with a Hybrid Cloud Strategy

    Sponsored by: NetApp

    In this white paper, you will discover how to create a seamless app development process by leveraging a hybrid cloud strategy. Access now to uncover a 3-phase approach to a faster app lifecycle.

  • What does cloud computing look like in 2016?

    Sponsored by: ComputerWeekly.com

    Cloud computing today is in a phase of rapid take-up. Technology as a service is a top priority for CIOs in Southeast Asia.This guide gives examples of how cloud computing is being harnessed within the region.

  • What does cloud computing look like in 2016?

    Sponsored by: ComputerWeekly.com

    Through our own research and local interviews this guide uncovers some of the benefits the cloud brings to organisations in Australia/New Zealand.

  • A Stronger Silver Lining in the Cloud

    Sponsored by: Palerra Inc.

    In this time-saving infographic, discover key figures on cloud usage among enterprises and IT professionals. Learn which services are being used, the true cost of a data breach, why security is lacking on the cloud, and what is being done about it.

  • Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay

    Sponsored by: TrendMicro

    In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.

  • Testing the Cloud: Ensuring Enterprise Data is Secure

    Sponsored by: TrendMicro

    In this e-guide, discover how to minimize threats through public cloud security testing. Plus, learn how penetration testing requirements differ for AWS, Google and Azure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.