ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:CloudPassage

  • Assessing the Security and Compliance Posture of an AWS Account and Its Assets

    CloudPassage Halo is a cloud security platform for severless, server-based and containerized assets in public and hybrid cloud environments. In this video, watch a demo of how Halo Cloud Secure can assess the security and compliance posture of an AWS account and the assets it contains.

  • Security Mistakes and the Culture of Innovation

    Software is a fast mechanism to deliver innovation, and public cloud infrastructure is an agile way to support rapid software development and delivery. Both of which can lead to significant cloud security mistakes. In this blog, learn how to avoid 5 common IaaS configuration mistakes that could expose your public cloud computing environment.

  • Security Visibility for Cloud Environments: Webinar

    In this webcast, cybersecurity experts Carson Sweet, CloudPassage CEO and founder, and Holger Schulze, Cybersecurity Insiders CEO and founder, will discuss technical factors and operational approaches for successfully achieving continuous, automated risk visibility when adopting public cloud infrastructure.

  • AWS Cloud Security Report

    Despite massive investments in public cloud security, organizations still have reservations about the security of sensitive data, systems, and services in the cloud. This report reveals the survey results of cybersecurity professionals to gain more insight into the latest trends, key challenges and solutions for AWS Cloud Security.

  • The Security of Software Containers & Sandboxing

    Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.

  • Tips for managing containers in your virtual environment

    Take a look at this E-guide to learn some of the most common and helpful container use cases, as well as our best tips for managing containers after adoption.

  • Avoiding Compliance and Shadow IT Risks in the Cloud

    This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.