ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • Multicloud Management: What does it Take?

    Sponsored by: Intel

    In this expert-guide, explore how the growth of the multicloud has impacted networking strategies from security to provisioning. Then, read on to learn how a cloud management platform can help you solve these challenges, as well as what capabilities it must have to be effective.

  • Build Multilayered Defense for the Cloud and Endpoints

    Sponsored by: ConvergeOne

    Creating a multilayered defense system within a network is necessary for advanced security protection. In this e-guide, security experts Frank Siemons and Ed Tittel discuss intrusion detection and prevention for the cloud and provide key criteria to evaluate endpoint security products for malware protection.

  • All You Need to Know about SSO

    Sponsored by: HYPR

    The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.

  • Data Classification Services and Keeping Cloud Data Secure

    Sponsored by: Data443

    In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.

  • Cloud Storage Adoption Decisions: Weighing Capacity, Cost, and Top Platform Tips

    Sponsored by: Nasuni

    This expert guide from the team at SearchStorage.com will grant you access to a hand-curated list of their top 10 cloud storage platform tips, with additional research content on how your peers are weighing cloud costs and capacity considerations. Access your copy here.

  • Building the Business Case for Enterprise File Sync-and-Share

    Sponsored by: Nasuni

    Based on market research, this guide uncovers the many purchase drivers nudging organizations in the direction of EFSS. Read on, as the content inside covers the features businesses are looking for in EFSS, the business problems EFSS can solve, the risks of going without EFSS (9 are detailed inside), and more.

  • The New Age of Microsegmentation

    Sponsored by: Illumio

    Why has a microsegmentation security strategy become so popular? In this e-guide, experts Andrew Froehlich and Dave Shackleford discuss the benefits and drawbacks of microsegmentation and how to get the most of your security approach.

  • What to Know about SIEM as a Service

    Sponsored by: LogRhythm, Inc.

    Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach.

  • User Behavior Analysis & SIEM

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.

  • Compare enterprise file-sync-and-sharing software and deployment options

    Sponsored by: Insight

    Download this e-guide to take a look at different EFSS technologies and cloud deployment models. You'll learn how different vendors stack up in terms of security, user experience, collaboration capabilities, file synchronization and more.

  • Compare the top enterprise file-sync-and-sharing vendors

    Sponsored by: Insight

    Enterprise file sync-and-sharing allows for simpler file access and sharing on the consumer and business level, but with so many vendors in the market it can be difficult to compare options. Download this e-guide to learn about the different capabilities of various vendors and what they can do for your mobile EFSS needs.

  • Cloud-based backup services are a safety net in tricky times

    Sponsored by: TechTarget Data Backup

    Use this handbook to explore how cloud backup can help you better secure your information against ransomware, 5 critical questions to ask a cloud vendor before adopting, and the benefits merging your backup and disaster recovery services provides.

  • Cloud Computing in Healthcare: CIOs Embrace the Benefits and Value

    Sponsored by: Salesforce.com

    Healthcare orgs are now seeing the value of cloud computing and its role in value-based care, pop health and patient engagement. Inside this expert guide, uncover opinions of 4 CIOs on 3 well-known cloud computing options and benefits of cloud computing in healthcare. Plus, explore a Q&A with Joshua Newman, Chief Medical Officer at Salesforce.

  • Enterprise Mobility Management: Top considerations and challenges

    Sponsored by: Microsoft

    Download this expert e-guide to take a look at the top 5 considerations for implementing an EMM strategy, and learn how to overcome challenges such as managing too many devices, BYOD, and lack of policies.

  • Tackling cloud sprawl: Considerations for deploying a multicloud management platform

    Sponsored by: Citrix

    Cloud management software may help organizations tackle cloud sprawl, but there's a lot to consider before deploying a multicloud management platform. Download this e-guide to find out how you can act now and tackle cloud sprawl before you lose control.

  • Balancing ECM User Experiences with IT Control and Security

    Sponsored by: Citrix

    In this expert e-guide, we explore how you can deliver quality ECM user experiences without sacrificing IT control or security. Learn how to strike the balance and discover 7 features that help you deliver a better user experience.

  • SIEM Analyst Research Bundle

    Sponsored by: AT&T Cybersecurity

    No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.

  • What You SIEM is What You Get

    Sponsored by: AT&T Cybersecurity

    A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.

  • Disaster recovery methods: Legacy DR vs. the cloud

    Sponsored by: Colospace Inc.

    When it comes to choosing a disaster recovery method, there's a lot to consider. Cost, RTO and expertise are all important factors to take into account. Download this e-guide to compare legacy DR vs. the cloud and decide which is best for your organization.

  • 4 criteria for evaluating public cloud storage providers

    Sponsored by: Druva

    Before selecting a public cloud storage provider, you must ensure its offerings are a good fit for your organization Use this expert guide to discover the 4 key considerations to take into account before choosing a public cloud storage provider.

  • IT Security Trends to Know

    Sponsored by: Cisco Umbrella

    The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.

  • Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

    Sponsored by: Cisco Umbrella

    Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.

  • Hybrid Cloud: Avoiding Implementation Mistakes and Re-examining Your Toolset

    Sponsored by: Lenovo and Intel

    In this guide compiled by the editors at SearchCloudComputing.com, you'll discover how to avoid hybrid cloud implementation missteps, with advice on pairing the right type of public cloud with the most appropriate on-prem storage. Download now to gain this, and three additional articles, as well.

  • The state of DaaS in recent years: Challenges and use cases

    Sponsored by: Nerdio

    In this e-guide, independent industry analysts Jack Madden and Gabe Knuth, discuss the state of the DaaS industry in recent years and examine how the technology has matured. They dive into the challenges and benefits of DaaS, as well as common use cases.

  • A Look at the Shared Responsibility Model for Cloud Providers

    Sponsored by: SolarWinds, Inc.

    Click inside this expert guide by Dave Shackleford, founder of Voodoo Security, to learn how the shared responsibility business model is currently understood and used by MSPs, as well as one of its major blind-spots.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.