ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • Protecting Your Sensitive Data

    Sponsored by: Symantec

    Protecting users across various environments can be a challenge. Access this brief webcast to uncover 4 tangible steps to protecting users across endpoints and the cloud.

  • 6 Ways a CASB Makes Cloud Apps Safe for Business

    Sponsored by: Symantec

    By 2022, 65% of business productivity tools are expected to have moved to the cloud, according to the Symantec Internet Security Threat Report. This resource offers 6 ways a cloud access security broker (CASB) enables cloud control across all apps and data.

  • Secure Transformation of the Data Center in Healthcare

    Sponsored by: HyTrust

    According to Ponemon's 2017 Cost of a Data Breach study, the average cost of a breach is about $3.62 million. This resource offers best practices for avoiding costly data breaches and securing the transformation of the data center within the healthcare industry.

  • Making Sense of the Shared Responsibility Model

    Sponsored by: Oracle Corporation

    According to an Oracle study, 77% of organizations have already adopted cloud services and 10% of those companies describe themselves as heavy users.This resource explores the root cause behind the confusion of the shared responsibility model and offers examples of how enterprises are successfully addressing and embracing the model.

  • Developing a Cloud Sourcing Strategy

    Sponsored by: Leaseweb

    Download this paper for help in accurately determining the true TCO of cloud services—going beyond just financial cost—with a look at 7 elements that make up your TCO, how to make a meaningful comparison between hosting and on-prem with your current setup, and more.

  • Cloud Apps and Data Security: Are You Safe from the New Threats?

    Sponsored by: Symantec

    How do you plan to conquer cloud chaos within your organization? This resource reveals how a cloud access security broker (CASB) can augment your cloud security approach, while embracing productivity-boosting cloud apps and services.

  • Mitigate the top nine cloud threats with a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    Today's enterprises run 41% of their workloads in a public cloud, and 38% in a private cloud, according to the 2017 State of the Cloud Survey. This white paper offers strategies for mitigating the top 9 cloud threats with a cloud access security broker (CASB).

  • Making the case for a cloud access security broker (CASB)

    Sponsored by: Oracle Corporation

    CASBs are one of the fastest growing security technologies today. According to Gartner, by 2020, 85% of large enterprises will use a cloud access security broker for their cloud services. Explore this resource to learn about why CASBs are important for improving your cloud security and explore key cost considerations.

  • 8 Essential Secure Web Gateway Characteristics

    Sponsored by: Symantec

    According to Symantec's Shadow Data Report, most CIOs think their organizations use around 30 to 40 cloud apps; in reality, the average number is 1,2321. This resource offers 8 essential characteristics of secure web gateways to ensure effective cloud security.

  • ASEAN IT Priorities 2018

    Sponsored by: ComputerWeekly.com

    This year's survey results reveal that respondents across ASEAN have earmarked some of the hottest emerging technologies as their top IT priorities for 2018. Organisations are also on the frontline when it comes to hybrid IT, an increasingly popular IT operating model for those that want the best of public and on-premise infrastructure.

  • Reducing Cybersecurity Costs & Risk through Automation Technologies

    Sponsored by: Juniper Networks

    According to a Ponemon Institute study, 59% of respondents believe cyber automation will reduce operating costs and 55% believe it will reduce personnel cost. This webcast offers insight into reducing cybersecurity costs through automation technologies.

  • Simplify GDPR Readiness

    Sponsored by: IBM

    Watch this webcast as IT leaders from 3 organizations explore the requirements and ramifications of GDPR compliance. Then, learn about how one cloud provider partnered with 2 other technologies to deliver protection for virtual workloads and ensure that the penalties of the GDPR never land at your doorstep.

  • Forcepoint CASB: Visibility and Control of Cloud Applications

    Sponsored by: Forcepoint

    Watch this webcast to learn about the 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they provide. Finally, discover a vendor who may be able to provide you the data governance, audit protection, and more you need.

  • Give your Web and Cloud Experiences a Security Tune-Up

    Sponsored by: Symantec

    Securing a growing number of devices, operating systems, users and connections is a big challenge. Explore this resource to uncover 7 ways to optimize and get the most out of your secure web gateway.

  • ANZ IT Priorities 2018

    Sponsored by: ComputerWeekly.com

    The IT Priorities 2018 survey results underscore what we already know about the ANZ IT landscape - more investments in software and cloud services to buttress digital transformation efforts, including the greater use of artificial intelligence, machine learning and robotics. But there were a few surprises as well

  • Easily Extend Data Loss Prevention to the Cloud

    Sponsored by: Symantec

    To avoid regulation penalties, companies need to know where sensitive and personal data resides. This resource offers a strategy for protecting sensitive data in many areas, including the cloud, endpoints, servers, network and email.

  • Inside Commvault's Holistic Data Protection Center

    Sponsored by: Commvault

    Click inside to learn how Commvault's Holistic Data Protection Center can help you protect your cloud data from attacks both inside and out, as well as defend against ransomware, prepare for the GDPR, and more.

  • What to Know about SIEM as a Service

    Sponsored by: LogRhythm, Inc.

    Recently, SIEM products residing in cloud environments have caught the attention of users looking to improve their security posture. In this e-guide, expert Frank Siemons touches upon SIEM as a service and what you need to know before deploying this approach.

  • User Behavior Analysis & SIEM

    Sponsored by: LogRhythm, Inc.

    In this e-guide, expert Kathleen Richards touches upon how information security technologies are embracing user behavior analysis.

  • Endpoint Detection and Response

    Sponsored by: CrowdStrike

    Utilize this white paper as a guide to understanding EDR, where it fits in your security strategy and what is involved in maturing EDR capabilities so that your organization can derive the greatest benefit.

  • Clear Data Mapping Starts in The Cloud

    Sponsored by: IBM

    This white paper outlines how a multi-cloud SaaS approach can help grant you the visibility needed for GDPR compliance. Click inside to learn 3 steps to GDPR readiness that are boosted by a multi-cloud environment.

  • How Sigma Group Grows Service Portfolio and Boosts IT Agility

    Sponsored by: MicroFocus

    Download this resource for a snapshot view of Sigma Group's case, in which you'll learn how they launched IaaS and PaaS solutions to provide its small and medium-size business customers more control over their IT via the cloud, using a cloud service automation and hybrid cloud management suite.

  • IoT: Take Control of the Edge

    Sponsored by: VMware

    With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud.

  • Five Essential Elements of Next-Gen Endpoint Protection

    Sponsored by: CrowdStrike

    Many endpoint strategies are fixated on stopping malicious attacks, rather than seeking out indicators of attacks that can point to breach activity, even when malware isn't present. Key into this white paper to uncover 5 essential elements of next-generation endpoint protection.

  • 6 Steps to Build a Holistic Security Strategy with Microsoft 365

    Sponsored by: Microsoft

    This e-book outlines how you can take advantage of the security tools built into Microsoft 365 to build a holistic security strategy in 6 steps.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.