security cloud computing

Results 51 - 75 of 122Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 08, 2014
Malware detection and cloud services are two areas of continuing disparity among SWG vendors. Our market analysis of the vendors highlights key differences in these capabilities and other key functions.
Tags : 
cisco, malware detection, malware threats, security, cloud computing, swg vendors, data center
    
Cisco
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, data management
    
Citrix Systems
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : 
trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
    
Trend Micro Inc.
Published By: McAfee     Published Date: Feb 06, 2013
By building in comprehensive security measures at the design and architectural phase of data center build-outs, organizations can optimize business-critical service availability and minimize potential downtime.
Tags : 
data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center, virtual machines
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
High performance for modern data center network fabrics, scalable deployment, and integrated inspection for physical and virtual environments. Next generation network security for your next generation data center.
Tags : 
data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center, virtual machines
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Flexible, top-rated security and high performance for proactive protection across physical and virtual infrastructure.
Tags : 
hybrid data center, data center, data center security, virtualization, virtual data center, virtual machines, cloud computing, virtualized security, virtualization anti virus, hypervisors, virtual desktop security, virtual desktops
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring, memory based sensors
    
McAfee
Published By: Symantec.cloud     Published Date: Jul 08, 2010
Make informed decisions about archiving requirements in your business.
Tags : 
messagelabs symantec, hosted email archiving, data storage, security, search and retrieval, cloud computing
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 07, 2010
Drawing on the findings from multiple benchmark studies on best practices in email security and security software as a service, Aberdeen's analysis shows that users of cloud-based email security had substantially better results than users of on-premise email security implementations in the critical areas of security, compliance, reliability and cost.
Tags : 
messagelabs hosted services, email security, cloud computing, audit, compliance
    
Symantec.cloud
Published By: Symplfiied     Published Date: Nov 07, 2011
Symplified's innovative On Demand Identity leverages the software-as-a-service subscription business model to deliver breakthrough identity services with disruptive pricing. This White Paper explains how identity services eliminates all capital outlays for hardware, software and infrastructure, expenses for support and staffing. You also can reduce the costs of training and integration to reduce identity lifecycle costs by more than 80% from enterprise identity software.
Tags : 
symplified, technology, security, identity management, white paper, cloud computing
    
Symplfiied
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications, virtualization, vulnerabilities, it spending, security spending, malware writers, cybercriminals, anti-malware, it environment, virus detection, software protection, it management
    
Kaspersky Lab
Published By: Webroot UK     Published Date: Mar 22, 2010
Move protection to where the threats are managing web-borne threats is becoming a major headache for today's resource-strapped organizations.
Tags : 
webroot, web security, cloud-based computing, malware, threat protection, data security
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
This paper examines the realities of web threats and looks at the promise that cloud-based solutions bring for organisations in terms of providing a higher level of protection against the increasingly complex and sophisticated threats being seen today.
Tags : 
webroot, web security, cloud computing, malware threats
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
The web today is a prime vector for attack. Interrupting information flows, which are increasingly transmitted over the internet, has become the prime focus for today's financially motivated hackers.
Tags : 
webroot, web security protection, hackers, web threats, cloud computing, malware
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats
Tags : 
webroot, web security service, cloud computing, web threats, business process automation
    
Webroot UK
Published By: Savvis     Published Date: Jul 07, 2010
Savvis Symphony VPDC introduces one of the industry's first enterprise-grade Virtual Private Data Center (VPDC) solutions with multi-tiered security and service profiles.
Tags : 
savvis symphony, virtual private data center, vpdc, security, it infrastructure, outsourcing, cloud computing
    
Savvis
Published By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, networking, security, wide area networks, wide area networking, enterprise, protocals, mpl
    
CenturyLink
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security, business technology
    
Navisite- A Time Warner Cable Company
Published By: Intel     Published Date: Aug 10, 2012
Learn how Intel Core vPro with SCS8.0 can help make Setup easy with an array of features from scanning to applying patches right from IT desk.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
CoreT vProT processors helps IT deliver off-hour patching and repairs by remotely power cycle client PCs to enable a greener energy management.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT helps IT to deliver crimeware protection and unprecedented embedded security for your clients and business data
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
See why 3rd generation Intel® CoreT vProT processors are ideal for Windows 7 security in your demanding and fast moving business environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
What is Intel® CoreT vProT technology? Learn about the security and manageability features that deliver a secure and efficient IT environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, animation, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Managed PKI solutions from Symantec use 3rd generation Intel Core vPro processors to deliver the same level of security as smart card technology.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, data management, business technology
    
Intel
Start   Previous    1 2 3 4 5    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.