Cloud Security Research
-
Exchange 2016 Upgrade Outlined and Considerations for Your Recovery Plan
Sponsored by: Riverbed Technology, Inc.This expert guide illustrates five migration issues that IT admins must tackle in order to upgrade to Exchange 2016 without adversely affecting end users. Additionally, read on to formulate a recovery plan for Office 365 outages by asking yourself the seven essential questions outlined here.
-
Adjusting a Continuous Monitoring Strategy to a Hybrid Era
Sponsored by: LogRhythm, Inc.Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.
-
Go Beyond Just Securing Your Cloud, Make it Better
Sponsored by: McAfee, Inc.Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
-
Stay on Course for Cloud: Building a Foundational Application Migration Plan
Sponsored by: UXC Oxygen and Amazon Web ServicesWhen creating an app migration plan, there are 5 primary methods from which you should choose. Read on to discover them, and learn how to assess your workload requirements and run a pilot test to make an informed decision about which apps to first migrate, such as those that are standalone.
-
Three Reasons Cloud-hosted Virtual Desktops Haven't Taken Off
Sponsored by: CitrixDesktop-as-a-service (DaaS) technology has been around for a while now, but relatively few organizations have bought on to this cloud-hosted virtual desktop trend because of a few major DaaS concerns. This e-guide details three reasons cloud-hosted virtual desktops haven't taken off yet.
-
Overcoming Speedbumps During an AWS Migration: Don't Leave Behind Legacy Apps
Sponsored by: UXC Oxygen and Amazon Web ServicesOvercome the potential problems associated with AWS migration: In this guide, you will receive expert insight to ensure you've invested enough prep into configuration management before migrating to AWS. Additionally, identify 6 crucial steps in the AWS app migration process.
-
The Enterprise Guide to SAP HANA's Cloud Models and Migration Checklist
Sponsored by: UXC Oxygen and Amazon Web ServicesIf you're considering HANA but are unsure about SAP's models of cloud computing, you'll want to fully outline your deployment options before migration. Discover three options for cloud-based HANA, as well as 6-point checklist for crafting a successful cloud migration strategy.
-
Straddling the Security Divide Between On-Premises and Cloud
Sponsored by: TechTarget SecurityLegacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.
-
Five AWS Data Migration Methods to Consider and How to Overcome Common Mistakes
Sponsored by: UXC Oxygen and Amazon Web ServicesMore enterprises are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data isn't straightforward. Examine 5 data migration methods for moving storage to AWS in this expert guide, as well as 4 additional mistakes to avoid when transferring servers and apps to the cloud.
-
AWS Lowers Cost Barriers for SAP HANA and Database Migrations to the Cloud
Sponsored by: UXC Oxygen and Amazon Web ServicesAlthough SAP deployments are currently dominated by appliances, more companies are tapping the cloud. But is cloud deployment a smart decision for you? Download now to weigh SAP HANA on-premises options against their cloud offerings. Also, discover how AWS' new tools will lower cost barriers for database cloud migrations.
-
Cloud Migration Checklist: The Enterprise Guide
Sponsored by: AttendaMigrating an enterprise's data and applications to the cloud includes a laundry list of considerations – from tools and costs to security. Learn six tasks that should be included on your checklist to ensure a successful cloud migration strategy.
-
Where the 'Edge' and the Cloud Collide: Lessons Learned from Public Cloud Deployment and IoT
Sponsored by: Hewlett Packard EnterpriseAs lock-in concerns become less prevalent, public cloud adoption continues to rise; however, organizations find that some workloads are best left in-house. Discover the boons and challenges associated with public cloud deployment, and additionally learn how to leverage it to eliminate latency and increase response times for IoT apps.
-
Explore the Evolving DDoS Threat Landscape
Sponsored by: RadwareDelve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
-
How to Segment Cloud Workloads for Better Security
Sponsored by: IBMEnterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.
-
DDoS Prevention For Attacks That Bypass DNS Rerouting
Sponsored by: RadwareIn this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
-
The Rise of Cloud-based Application Security Vulnerabilities
Sponsored by: Symantec + Blue CoatWhile it can be beneficial to store app data in the cloud, it's causing many security concerns because of the sensitive nature of the information. Explore this e-guide to learn common vulnerabilities in cloud-based apps and best practices for properly protecting app data.
-
How to Mitigate Shadow Cloud Services Security Risks
Sponsored by: IBMShadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.
-
Which Cloud Security Certifications Should Providers Have?
Sponsored by: Hewlett Packard EnterpriseWith numerous security standards and certifications available, evaluating a cloud provider can be tricky. In this e-guide, IT author and systems architect Dan Sullivan explains what to look for during evaluation and how specific certifications can meet your overall security portfolio.
-
The Rise of Cloud-Based Application Security Vulnerabilities
Sponsored by: OnapsisThis e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.
-
How to Secure Azure and Recover From the Worst Disasters
Sponsored by: Softchoice CorporationIn this e-guide, expert Rob Shapland breaks down how two new Microsoft Azure features aim to boost cloud security for enterprises. Learn how to keep Azure secure and keep your business going if disaster strikes and the worst is realized.
-
What to Look for in Cloud Access Security Brokers
Sponsored by: TechTarget SecurityThis buyer's guide on CASBs offers an overview of the emerging technology, explains how it works, and highlights the key features a CASB should have, including guidelines on some "nice-to-have" features. Learn what is currently available for this technology and discover the IT evaluation process to helop you select the best CASB for your company.
-
Cloud's Role in Developing a Cohesive DevOps Plan
Sponsored by: TechTarget IT OperationsTo achieve continuous delivery, organizations can now incorporate DevOps into a cloud strategy. Access this handbook to get an overview of strategies for establishing a DevOps model and how DevOps differs from the traditional processes of application development.
-
Cloud Services Take Off, GRC Doesn't
Sponsored by: TechTarget SecurityThe ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
-
Cloud App Development: Finding the Right Mix
Sponsored by: VelostrataIn this e-guide, discover what needs to be done internally with your hybrid cloud environment to better suit it for modern, fast app development and testing, such as DevOps and continuous integration.
-
Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay
Sponsored by: Trend Micro, Inc.In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.