ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • Cloud computing storage key management

    Sponsored by: TechTarget ComputerWeekly.com

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

  • Cloud security risks and the countermeasures you need now

    Sponsored by: Interactive

    Are you up on cloud security risks and the countermeasures available to you? Cloud risk statistics and other research make clear that security teams must stay alert and continually update their mitigation tactics. This guide shows where cloud threats come from and how best to counteract them.

  • How to Keep Each Cloud Workload Accessible and Secure

    Sponsored by: Interactive

    While the shared responsibility model of cloud security is still relevant, responsibility for keeping cloud workloads safe is increasingly falling more on the shoulders of the in-house security team and management. Download this handbook for everything you need to know about keeping your cloud workloads accessible and secure.

  • CW Nordics - November 2019: Robots help social workers in Sweden

    Sponsored by: TechTarget ComputerWeekly.com

    Software robots are being used by more than 20 local authorities in Sweden to carry out repetitive tasks previously done manually, such as document and data checks, freeing up social workers to make life-changing decisions for the needy.

  • Cloud Security that Strikes the Perfect Chord

    Sponsored by: AWS Palo Alto Networks

    It can be hard to synchronize your security instruments to detect threats and automatically respond to attacks. Security services from AWS paired with products from Palo Alto Networks can help you harmonize your cloud environments, accounts, and pipelines to keep them working together for comprehensive security.

  • Computer Weekly - 7 April 2020: Adapting IT to the new normal

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.

  • 9 essential elements of network security

    Sponsored by: TechTarget ComputerWeekly.com

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

  • How to implement a strong COVID-19 cybersecurity plan

    Sponsored by: TechTarget Security

    Cybercriminals aren't slowing down during the pandemic, and neither can your security. Learn about the biggest threats right now and how to stop them cold.

  • VMs vs. containers: Which is better for security?

    Sponsored by: TechTarget ComputerWeekly.com

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • All Clouds Are Not Equal

    Sponsored by: Forcepoint

    As everyone turns to the cloud for everything, security is no exception. It's no wonder more and more companies and government agencies are employing cloud-based security solutions to gain many advantages.

  • Securing Your Whenever, Wherever Workforce

    Sponsored by: Forcepoint

    How do we secure what the company doesn't control or even own? How can we protect against intentional and unintentional data leakage from users accessing cloud applications from a variety of devices, including their own personal ones?

  • Cyber attackers exploiting poor cloud security

    Sponsored by: TechTarget ComputerWeekly.com

    More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene

  • What Is Software-Defined Storage and How You Can Benefit from It?

    Sponsored by: OVH

    As infrastructure elements are now abstracted from their hardware layers and controlled by software, highly resilient, shared datastores can help you grow as go. Download this white paper to learn the 5 benefits of adopting software-defined storage (SDS) and how an SDS approach can fulfill your growing datastorage needs.

  • Navigating VMware and Cloud Backups

    Sponsored by: Clumio

    VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.

  • Buyer's guide to multicloud

    Sponsored by: TechTarget ComputerWeekly.com

    Enterprise's shift towards multicloud is ever-increasing. Computer Weekly looks at the importance of software-defined wide area networks in successful migration, the complications that come with juggling clouds and Microsoft's journey into multicloud support.

  • How to Prepare Your IT Staff for a Transition to the Cloud

    Sponsored by: Intel

    Educating and addressing IT staff roles as they fit into the new cloud infrastructure are essential to achieving operational efficiency within your new cloud environment. Download this guy for 3 essential topics to address with employees before migrating to the cloud.

  • 7 Key Characteristics of Cloud Computing

    Sponsored by: Intel

    Download your copy of this cloud e-guide that outlines the 7 key characteristics to cloud computing for better operational efficiency as the use-cases for cloud grow more complex.

  • A Computer Weekly buyer’s guide to perimeterless network security

    Sponsored by: TechTarget ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Cloud Migration: How to do so safely and securely

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a closer look at what enterprises need to consider before pressing play on their cloud migration plans. Not only to ensure their move to the off-premise world goes as smoothly as possible, but also to make sure it brings the maximum amount of benefit to their business.

  • Key Terms for Cloud Disaster Recovery

    Sponsored by: Druva

    We've pulled together 9 must-know cloud DR terms in the following e-guide to help you re-orient yourself in the ever-growing sea of terminology. Download the guide to see for yourself which terms should be top of mind as you pursue a cloud DR strategy.

  • Top 20 Cloud Backup Services for 2019

    Sponsored by: Druva

    To keep your pulse on the latest cloud backup developments, download this e-guide. Inside, our experts share 7 considerations for selecting a cloud backup service, examine 20 top cloud backup services to simplify the selection process, and explain how the public cloud is improving data protection.

  • New NVMe Western Digital SSDs Target Cloud, Hyperscale, and the Edge

    Sponsored by: Western Digital

    View the following expert guide to examine the benefits of running read-intensive workloads in public and private clouds, hyperscale data centers, and edge computing deployments on NVMe.

  • Experts Address Your Cloud Security and Data Protection Concerns

    Sponsored by: IBM

    In this essential guide, our experts address your cloud backup security concerns and explain what you're required to protect vs. the cloud provider's responsibilities and 3 ways to use the cloud as a data protection target. Download now or risk missing out on the essentials you can put into practice at your company.

  • Multi-cloud Management: 6 Must-have Features and Cost Considerations

    Sponsored by: Cisco Systems, Inc.

    Managing multi-cloud environments can be daunting, especially as applications grow more complex, users become more distributed, and compliance standards become stricter. So, how you maximize each cloud platform's capabilities while also minimizing costs? Read this TechTarget-produced expert guide to find out.

  • Data Protection, Backup and Replication in the Age of the Cloud

    Sponsored by: Velosio

    This expert guide examines the data protection conundrum in the age of the cloud, with special attention given to meeting SLAs, the benefits and downsides of public cloud backup, and ransomware and security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.