Research Library

Powered by

All Research Sponsored By:TechTarget Security

  • What to Look for in Cloud Access Security Brokers

    This buyer's guide on CASBs offers an overview of the emerging technology, explains how it works, and highlights the key features a CASB should have, including guidelines on some "nice-to-have" features. Learn what is currently available for this technology and discover the IT evaluation process to helop you select the best CASB for your company.

  • Locking up the Cloud with IAM

    In this exclusive e-book, you will learn from malware analyst Dejan Lukan, security expert Dave Shackelford and systems architect Dan Sullivan as they walk you through: IAM in the cloud through the use of public and private keys, 4 tips on hardening the security of cloud keys, and best practices for managing access and identity in the cloud age.

  • Top 3 Cloud Security Developments

    This Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.

  • Securing Your Cloud Deployment with Today's Top Strategies

    In this Insider Edition, InfoSec Pros will learn how to achieve better cloud security. It reviews existing cloud security standards and how to assess, and manage, the risk of a cloud deployment.

  • Ten tips for judging, choosing cloud email service providers

    A cloud-based service provider can save company money, but will it compromise security? Learn how to reduce risks and optimize benefits when migrating email to the cloud.

  • Security University: Cloud Security

    Learn strategies for how to positively influence the security of cloud computing projects in your organization.

  • Cloud Compliance Technical Guide

    Check out this expert technical guide for a global perspective on emerging cloud compliance issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.