security cloud computing

Results 1 - 25 of 122Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Sep 06, 2016
Learn why our world-leading, unified solution is relied on by market-leading companies across the planet.
Tags : 
supply chain, supply chain management, oracle, security, security application, cloud computing, unified solution, risk
    
Oracle
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management
    
CDW
Published By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : 
riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization, cloud, cloud computing
    
Riverbed
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT helps IT to deliver crimeware protection and unprecedented embedded security for your clients and business data
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Intel® CoreT vProT Processor Comparison provides a Good, Better, Best guide for selecting the best processors to power your business PCs
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, data management, business technology
    
Intel
Published By: Teradata     Published Date: May 02, 2017
Read this article to discover the 4 things no data warehouse should be without.
Tags : 
cloud data, cloud security, cloud management, storage resource, computing resources, data warehousing, data storage, cloud efficiency
    
Teradata
Published By: Workday     Published Date: Sep 08, 2015
Download this white paper to understand the six key capabilities that separate Workday Financial Management from old-world business apps.
Tags : 
financial systems, finance technology, workday, security, payroll software, financial management, cloud computing, modern financial mangement system
    
Workday
Published By: HP & Intel     Published Date: Oct 04, 2011
Read this Cloud Security Planning Guide to make sure your cloud computing initiatives avoid these dangerous - and costly - pitfalls.
Tags : 
    
HP & Intel
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security, business technology
    
Navisite- A Time Warner Cable Company
Published By: VMware, Inc.     Published Date: Apr 05, 2016
Business teams striving to move quickly into new markets and launch new products and services are demanding more from IT organizations that have traditionally been focused on avoiding downtime, ensuring security and compliance, and holding down costs. Cloud computing offers compelling benefits for IT and the business to gain on-demand access to IT resources for new application development, as well as for running existing applications.
Tags : 
cloud, public cloud, data center, vcloud, vcloud air, it organizations, it management
    
VMware, Inc.
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: Symantec.cloud     Published Date: Sep 07, 2010
Drawing on the findings from multiple benchmark studies on best practices in email security and security software as a service, Aberdeen's analysis shows that users of cloud-based email security had substantially better results than users of on-premise email security implementations in the critical areas of security, compliance, reliability and cost.
Tags : 
messagelabs hosted services, email security, cloud computing, audit, compliance
    
Symantec.cloud
Published By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : 
druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches
    
Druva
Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security, networking, it management
    
Qualys
Published By: Acronis EMEA     Published Date: May 18, 2015
This book is a guide to modern data protection for IT professionals that covers the simplest file backup scenarios to comprehensive protection strategies for businesses with complex IT environments.
Tags : 
backup, data protection, data security, protection strategies, recovery, cloud computing, virtualization, backup types, recovery tools, data backup
    
Acronis EMEA
Published By: IGLOO Software     Published Date: Jan 07, 2010
Learn how the BlackBerry Partners Fund created a publicly accessible website to promote the fund to applicants around the world and a private online community for the investment committee to vet potential partner fund submissions.
Tags : 
igloo software, online community, equity, security management, cloud-based computing, blackberry partners fund, social networking, mobile platform, smartphone, mobile commerce, content management
    
IGLOO Software
Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, data center
    
Red Hat
Published By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, networking, security, wide area networks, wide area networking, enterprise, protocals, mpl
    
CenturyLink
Published By: Intel     Published Date: Aug 10, 2012
Citrix Xenclient provides local virtual desktop technology that protects sensitive data on laptops, even for disconnected users.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, data management, business technology
    
Intel
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: Workday     Published Date: Feb 27, 2018
The benefits of cloud computing—a high return on investment, greater staff efficiencies, optimisation of IT resources, plus enhanced visibility and access to information—have piqued the interest of CFOs and finance leaders who are actively evaluating the risks versus the rewards of the cloud delivery model. Although a steady migration to the cloud is happening in many areas of the enterprise, finance professionals still have questions regarding the security, performance, privacy, risks and the actual cost and value of cloud computing. Download this whitepaper today and discover the benefits of moving finance operations to the cloud, and how it can drive sustainable ROI.
Tags : 
cloud, computing, workday, migration, enterprise, security, privacy
    
Workday
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered.
Tags : 
palo alto, automated malware, security, cloud
    
Palo Alto Networks
Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM
Start   Previous   1 2 3 4 5    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.