ComputerWeekly.com Research Library

Powered by Bitpipe.com

Cloud Security Research

  • Exchange 2016 Upgrade Outlined and Considerations for Your Recovery Plan

    Sponsored by: Riverbed Technology, Inc.

    This expert guide illustrates five migration issues that IT admins must tackle in order to upgrade to Exchange 2016 without adversely affecting end users. Additionally, read on to formulate a recovery plan for Office 365 outages by asking yourself the seven essential questions outlined here.

  • Adjusting a Continuous Monitoring Strategy to a Hybrid Era

    Sponsored by: LogRhythm, Inc.

    Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.

  • Go Beyond Just Securing Your Cloud, Make it Better

    Sponsored by: McAfee, Inc.

    Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.

  • Stay on Course for Cloud: Building a Foundational Application Migration Plan

    Sponsored by: UXC Oxygen and Amazon Web Services

    When creating an app migration plan, there are 5 primary methods from which you should choose. Read on to discover them, and learn how to assess your workload requirements and run a pilot test to make an informed decision about which apps to first migrate, such as those that are standalone.

  • Three Reasons Cloud-hosted Virtual Desktops Haven't Taken Off

    Sponsored by: Citrix

    Desktop-as-a-service (DaaS) technology has been around for a while now, but relatively few organizations have bought on to this cloud-hosted virtual desktop trend because of a few major DaaS concerns. This e-guide details three reasons cloud-hosted virtual desktops haven't taken off yet.

  • Overcoming Speedbumps During an AWS Migration: Don't Leave Behind Legacy Apps

    Sponsored by: UXC Oxygen and Amazon Web Services

    Overcome the potential problems associated with AWS migration: In this guide, you will receive expert insight to ensure you've invested enough prep into configuration management before migrating to AWS. Additionally, identify 6 crucial steps in the AWS app migration process.

  • The Enterprise Guide to SAP HANA's Cloud Models and Migration Checklist

    Sponsored by: UXC Oxygen and Amazon Web Services

    If you're considering HANA but are unsure about SAP's models of cloud computing, you'll want to fully outline your deployment options before migration. Discover three options for cloud-based HANA, as well as 6-point checklist for crafting a successful cloud migration strategy.

  • Straddling the Security Divide Between On-Premises and Cloud

    Sponsored by: TechTarget Security

    Legacy security tools designed for data centers don't work well in cloud infrastructures. We help you conquer the divide between on-premises and cloud security in this issue of Information Security.

  • Five AWS Data Migration Methods to Consider and How to Overcome Common Mistakes

    Sponsored by: UXC Oxygen and Amazon Web Services

    More enterprises are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data isn't straightforward. Examine 5 data migration methods for moving storage to AWS in this expert guide, as well as 4 additional mistakes to avoid when transferring servers and apps to the cloud.

  • AWS Lowers Cost Barriers for SAP HANA and Database Migrations to the Cloud

    Sponsored by: UXC Oxygen and Amazon Web Services

    Although SAP deployments are currently dominated by appliances, more companies are tapping the cloud. But is cloud deployment a smart decision for you? Download now to weigh SAP HANA on-premises options against their cloud offerings. Also, discover how AWS' new tools will lower cost barriers for database cloud migrations.

  • Cloud Migration Checklist: The Enterprise Guide

    Sponsored by: Attenda

    Migrating an enterprise's data and applications to the cloud includes a laundry list of considerations – from tools and costs to security. Learn six tasks that should be included on your checklist to ensure a successful cloud migration strategy.

  • Where the 'Edge' and the Cloud Collide: Lessons Learned from Public Cloud Deployment and IoT

    Sponsored by: Hewlett Packard Enterprise

    As lock-in concerns become less prevalent, public cloud adoption continues to rise; however, organizations find that some workloads are best left in-house. Discover the boons and challenges associated with public cloud deployment, and additionally learn how to leverage it to eliminate latency and increase response times for IoT apps.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • How to Segment Cloud Workloads for Better Security

    Sponsored by: IBM

    Enterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.

  • DDoS Prevention For Attacks That Bypass DNS Rerouting

    Sponsored by: Radware

    In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.

  • The Rise of Cloud-based Application Security Vulnerabilities

    Sponsored by: Symantec + Blue Coat

    While it can be beneficial to store app data in the cloud, it's causing many security concerns because of the sensitive nature of the information. Explore this e-guide to learn common vulnerabilities in cloud-based apps and best practices for properly protecting app data.

  • How to Mitigate Shadow Cloud Services Security Risks

    Sponsored by: IBM

    Shadow cloud services are an unavoidable part of the modern enterprise. The natural reaction is often to block access to all unsanctioned cloud services, but this is an outdated approach. In this e-guide, Rob Shapland discusses how to handle shadow cloud services and provides a few simple steps to identify shadow cloud apps and protect your data.

  • Which Cloud Security Certifications Should Providers Have?

    Sponsored by: Hewlett Packard Enterprise

    With numerous security standards and certifications available, evaluating a cloud provider can be tricky. In this e-guide, IT author and systems architect Dan Sullivan explains what to look for during evaluation and how specific certifications can meet your overall security portfolio.

  • The Rise of Cloud-Based Application Security Vulnerabilities

    Sponsored by: Onapsis

    This e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.

  • How to Secure Azure and Recover From the Worst Disasters

    Sponsored by: Softchoice Corporation

    In this e-guide, expert Rob Shapland breaks down how two new Microsoft Azure features aim to boost cloud security for enterprises. Learn how to keep Azure secure and keep your business going if disaster strikes and the worst is realized.

  • What to Look for in Cloud Access Security Brokers

    Sponsored by: TechTarget Security

    This buyer's guide on CASBs offers an overview of the emerging technology, explains how it works, and highlights the key features a CASB should have, including guidelines on some "nice-to-have" features. Learn what is currently available for this technology and discover the IT evaluation process to helop you select the best CASB for your company.

  • Cloud's Role in Developing a Cohesive DevOps Plan

    Sponsored by: TechTarget IT Operations

    To achieve continuous delivery, organizations can now incorporate DevOps into a cloud strategy. Access this handbook to get an overview of strategies for establishing a DevOps model and how DevOps differs from the traditional processes of application development.

  • Cloud Services Take Off, GRC Doesn't

    Sponsored by: TechTarget Security

    The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.

  • Cloud App Development: Finding the Right Mix

    Sponsored by: Velostrata

    In this e-guide, discover what needs to be done internally with your hybrid cloud environment to better suit it for modern, fast app development and testing, such as DevOps and continuous integration.

  • Conquering the Cloud: Top Security Issues and Keeping Hackers at Bay

    Sponsored by: Trend Micro, Inc.

    In this e-guide, discover two articles that detail the top security issues of the cloud and offer strategies on how to keep malicious hackers at bay.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.