ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • Incident response playbook in flux as services, tools arrive

    Sponsored by: TechTarget Security

    The enterprise incident response "playbook" is getting a rewrite. An IR playbook guides an enterprise security team's work, identifying triggering events and outlining best practices or regulatory requirements. Download this handbook to learn more about the essential playbook revisions that are putting new technologies and services to use.

  • Hybrid Backups Reap Benefits of Cloud and Local Backups

    Sponsored by: Hitachi Vantara Corporation

    Why not reap the benefits of both local and cloud backups? Save this e-guide to view the benefits of a hybrid backup strategy that combines a local backup cache with cloud backup—and that resolves the pain points of the two approaches while providing unified restores.

  • Off-site Backup Versus Cloud Backup: Comparing Your Options

    Sponsored by: Hitachi Vantara Corporation

    What's the difference between off-site backup and cloud backup? And, more importantly, which approach is right for your organization? Download this expert guide to find out with a head-to-head comparison of the two, as well as 4 considerations to help you select your strategy.

  • Choosing Between Public, Private and Hybrid Clouds

    Sponsored by: Focus Technology Solutions

    In this e-guide, evaluate the features of three major public cloud offerings and compare those offerings to other private and hybrid alternatives, to choose the best option for your organization.

  • AWS Highlights YoY Rise in Deal Sizes and Growth Opportunities for Cloud Channel Partners

    Sponsored by: AWS

    How can you take advantage of untapped cloud growth opportunities in the channel market? Download this e-guide to find out. You'll also learn how AWS is revamping partner incentives and support offerings to help its channel better support customers' digital transformation plans and to assist partners in cultivating leads.

  • AWS Marketplace Buyer and Seller FAQs

    Sponsored by: AWS

    In this e-guide, our experts answer 11 of the most frequently asked questions about the AWS Marketplace and shed some light on the expansiveness of the online store. Download your copy here for the answers, and to read an article included that will update you on the continued consolidation of cloud advisory companies.

  • How to Manage the Multi-cloud with Security and Strong Data Backup

    Sponsored by: TechTarget Storage

    The following e-book will help you with managing multi-cloud backup and security. Read it here to learn everything you need to know about securing a multi-cloud deployment, multi-cloud management must-haves, and more.

  • Complete Guide to Cloud Security in Health IT

    Sponsored by: Virtustream

    In this e-guide, uncover 4 ways that cloud service providers offer advanced protection. You'll also learn about the benefits and drawbacks of considering a cloud-based EHR system.

  • Startup Hammerspace Launches with Hybrid Cloud-era NAS Virtualization

    Sponsored by: HammerSpace

    Startup Hammerspace has come out with a product that aims to give customers access to unstructured data, anywhere and on-demand. Read this e-guide to learn more about Hammerspace, key use cases for this solution, and more on how it aims to simplify multi-cloud storage.

  • Ease the Data Volume Growing Pains with Expanding File System Options

    Sponsored by: Nasuni

    This expert guide presents several options to explore when your company's file system limits are reached, two of them being implementing a global file system interface and using a cloud file service for inactive data. Download your copy for the details and pricing.

  • Evaluate Desktop Management Tools

    Sponsored by: Dell Technologies

    Download this E-Guide to take a look at the use cases for cloud-based desktop management tools and IT asset management tools, to see which will help your organization the most.

  • Cloud Networking: What Every IT Pro Needs To Know

    Sponsored by: TechTarget Networking

    Speed or security? Cloud networking often requires balancing the two. Read this handbook to learn how you can have both speed and security.

  • Sound application development rests with secure APIs in the cloud

    Sponsored by: TechTarget Cloud Computing

    This handbook probes potential API security risks and puts forth a number of best practices for maintaining a secure, managed environment.

  • Three Questions to Ask Before you Migrate Apps to the Public Cloud

    Sponsored by: Oracle Dyn

    Many firms assume public cloud is the best place to host all apps, but that's not always the case. Find out why in this essential guide.

  • Why Web Application Attacks are a Growing Threat to the Cloud

    Sponsored by: Oracle Dyn

    New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.

  • Healthcare Cloud Concerns: What is Holding up Adoption?

    Sponsored by: Virtustream

    Inside this expert guide, you'll learn about 5 common concerns of cloud services in healthcare, how to tackle the concern, and the well-known benefits of using the cloud.

  • Making the Most of the Hyper-converged Cloud

    Sponsored by: Cohesity

    This expert guide from SearchConvergedIT.com will help you navigate the new hyper-converged cloud space. Download your copy to learn how vendor offerings differ from one another, and view one such product— Cohesity CloudSpin—that provides developers with quick access to back up data in the cloud for test/dev.

  • SAP Cloud Platform pushes to break new ground, extend ERP

    Sponsored by: TechTarget Health IT

    SAP Cloud Platform is the key technology in SAP's plan to drive digital transformation by linking legacy applications and data with next-generation technology.

  • How to Prevent Cloud Cryptojacking Attacks on your Enterprise

    Sponsored by: Cisco Umbrella

    Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.

  • Enterprises Wear Large Targets in Cloud Cryptomining Hacks

    Sponsored by: Cisco Umbrella

    Cryptojacking, the unauthorized use of a computer to mine cryptocurrencies, is on the rise and has put security teams on alert. For this reason, enterprises are adjusting their strategies and applying dedicated approaches to cloud security. Read on to find out how your organization can join this trend to protect its most sensitive data.

  • How To Secure a Multi-Cloud Architecture

    Sponsored by: TechTarget Cloud Computing

    If they don't already, most organizations will soon have resources deployed to more than one cloud. That requires an aggressive strategy and multiple levels of security.In this guide, get insight into the various options you'll need to choose between to secure a multi-cloud architecture, from the planning phase to the tools themselves.

  • Adapt Security for Hybrid Cloud Environments

    Sponsored by: Citrix

    In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.

  • Should IT Use Desktop Management Tools in the Cloud?

    Sponsored by: Goverlan

    With cloud-based desktop management tools now available, organizations have more to consider when choosing between on-premises and cloud management tools. In this e-guide take a look at the use cases, features and pricing options to choose the best desktop management option for your organization.

  • New Cloud Threats to Watch Out for in 2018

    Sponsored by: Juniper Networks

    Safeguarding your critical data is getting harder as threat actors embrace the advantages, and missteps, of cloud. Inside this expert guide, Kathleen Richards details what to watch out for in 2018.

  • How To Secure a Multi-Cloud Architecture

    Sponsored by: TechTarget Cloud Computing

    If they don't already, most organizations will soon have resources deployed to more than one cloud. That requires an aggressive strategy and multiple levels of security.In this guide, get insight into the various options you'll need to choose between to secure a multi-cloud architecture, from the planning phase to the tools themselves.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.