ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • 8 Cloud Adoption Best Practices to Ensure Compliance

    Sponsored by: Blue Coat Systems

    Learn 8 best practices to ensure compliance when adopting cloud apps and services. Access now to avoid being the next company to lose its way under the sway of Shadow IT.

  • 7 Steps to Take Charge of Your Cloud Strategy

    Sponsored by: Blue Coat Systems

    Discover 7 actions that IT departments can do to take back their organizations from shadow IT and ensure they are not leaving themselves vulnerable to attack. Access now to gain a blow-by-blow plan to take charge of your enterprise's cloud strategy and not let shadow IT slip through the cracks.

  • zPaper Accelerating Business

    Sponsored by: Relus Technoligies

    This resource shares the journey of zPaper's partnership with a cloud solutions service company that allowed them to assess their current AWS architecture through a best practice workshop. Also, to help prepare them for their upcoming audits, the service provider offered a complete Web Application Security Assessment.

  • Innovation for the Cloud Generation: Blue Coat Answers Your Top 6 Questions for 2016

    Sponsored by: Blue Coat Systems

    6 of your top cloud security concerns will be laid to rest as the era of the cloud generation comes to fruition. Learn how to handle compliance, shadow IT, secure your data against advanced threats, and more.

  • Data Center Modernization: Brief Overview of Migrating Your Applications to Hybrid Cloud

    Sponsored by: Hewlett Packard Enterprise

    To successfully leverage the cloud, IT must source the right mix of public, private, IaaS, and managed-cloud environments to match application workloads to the appropriate platform. Access this resource to learn the essential methodologies behind this hybrid cloud migration.

  • StorageCraft Cloud Backup at a Glance

    Sponsored by: StorageCraft Technology Corporation

    This white paper describes a cloud backup product and outlines key features surrounding its ease of use, security, recoverability and customization.

  • Dedicated to Information Security: The High-Stakes Role of the CISO

    Sponsored by: SearchSecurity.com

    Almost 20 years into its existence, the CISO job is still open to discussion. In this issue of Information Security, we look at the role's elevation and influence on broader security initiatives, plus challenges of the job and the changes ahead.

  • CW ASEAN - December 2016

    Sponsored by: SearchDataCenter.com

    In this month's CW ASEAN, read how Singapore is setting itself to be a leader in the digital age.

  • Get Control Over Your Cloud Security

    Sponsored by: LogRhythm, Inc.

    You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.

  • Devise a Cloud Strategy that Doesn't Cast a Shadow on App Performance

    Sponsored by: Riverbed Technology, Inc.

    Download this paper to learn how to devise a cloud strategy that doesn't cast a shadow on, or deter, app performance. Discover several cloud deployment models compared for their visibility and control, including private cloud, SaaS, and 2 more.

  • Facts About the Cloud

    Sponsored by: Sage Live

    By now, everyone should realize that the cloud is an essential part of every businesses strategy and will continue to be as we move forward. Access this infographic for some fast facts about the cloud and what to expect for the future usage of the technology.

  • Exchange to Office 365 Migration: The Good, the Bad, and Essentials Tools to Ease the Transition

    Sponsored by: Riverbed Technology, Inc.

    Discover how to set an effective strategy for Office 365 migration in this e-guide. By reading on, learn about the advantages of its advanced content management and collaboration, as well as iron out potential app migration headaches when moving from Exchange and non-Exchange platforms.

  • Crunching the Costs of Microsoft Exchange On-premises vs. Cloud Services

    Sponsored by: Riverbed Technology, Inc.

    Download this expert guide to learn how to calculate the costs of on-premises Exchange versus those of Office 365's mail service, and from this assessment deduce if the O365 cloud is your enterprise's best option for collaboration. Discover new cost factors such as electricity, bandwidth needs, personnel expenses, and more.

  • Definitive Guide to Cloud Access Security Brokers

    Sponsored by: BitGlass

    In this white paper get a handle on what a CASB should be doing for your enterprise, and how to best leverage the benefits afforded by them.

  • The Evolution of Cloud Security: Perception vs. Reality

    Sponsored by: BitGlass

    This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.

  • Application Performance Tools for Microsoft Office 365

    Sponsored by: Riverbed Technology, Inc.

    Access this resource to discover an app performance tool that will transform Office 365 by leveraging hybrid IT for new forms of operational and network agility. Learn how to enact complete performance awareness of O365 apps and make optimal use of network resources by analyzing design and traffic.

  • How to Facilitate a Successful Transition to Office 365: A Brief Video

    Sponsored by: Riverbed Technology, Inc.

    Discover a tool that will identify and mitigate hidden network constraints to ensure a smooth transition to O365. Here, learn how to analyze your network requirements with dependency mapping, capacity planning, and SLA analyses to ensure the best performance for all O365 end users.

  • The Intricacies of a CASB Revealed

    Sponsored by: BitGlass

    This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.

  • Top 6 Cloud Data Protection Challenges. Solved.

    Sponsored by: Commvault

    Discover solutions to your cloud worries and how to maximize the benefits of its adoption. Learn how to overcome: concerns about cloud security, applications that aren't cloud ready, unexpected costs, and more.

  • Exchange 2016 Upgrade Outlined and Considerations for Your Recovery Plan

    Sponsored by: Riverbed Technology, Inc.

    This expert guide illustrates five migration issues that IT admins must tackle in order to upgrade to Exchange 2016 without adversely affecting end users. Additionally, read on to formulate a recovery plan for Office 365 outages by asking yourself the seven essential questions outlined here.

  • The Future Of Data Security And Privacy: Growth And Competitive Differentiation

    Sponsored by: Absolute

    Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.

  • 5 Keys to Boosting Cloud Security Confidence

    Sponsored by: BitGlass

    Watch as some of the top cloud security professionals discuss the pros and cons of adopting the cloud, and dispel some of the fears that are preventing enterprises from taking advantage of it.

  • Market Guide for Cloud Access Security Brokers

    Sponsored by: BitGlass

    Learn the intricacies of the Cloud Access Security Brokers (CASBs) market. Discover how they relate and interact with compliance, data security, threat protection, and more.

  • Adjusting a Continuous Monitoring Strategy to a Hybrid Era

    Sponsored by: LogRhythm, Inc.

    Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.

  • Office 365: Enabling More Secure Collaboration

    Sponsored by: VMware

    How can you enable secure collaboration with Office 365? Learn 3 steps to make this possible, as well as 3 stages of adoption for security add-ons for Office 365.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.