Whitepaper Library
 

cloud security

Results 1 - 25 of 742Sort Results By: Published Date | Title | Company Name
Published By: HPE APAC     Published Date: Jun 20, 2017
HPE Flexible Capacity service enables a cloud-like consumption model and economics for your on-premise IT. Now you don’t have to a make difficult choice between security and control of on-premise IT versus the agility and economics of public cloud. Watch this video to find out more.
Tags : 
cloud, agility, data center, security, public cloud
    
HPE APAC
Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Every cloud security vendor will give you impressive-sounding metrics for cloud security. But what do they really mean? Our infographic explains which metrics really matter, and what questions you need to ask to get them.
Tags : 
cloud security, cloud, security, cloud protection
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 22, 2017
Juniper Networks works with leading companies around the world to increase the service agility of their networks. With simple, open, and smart networks, financial services firms can bring innovative new services to market faster and at lower costs. They can leverage Juniper’s expertise, experience, and partner ecosystem to build agile, service-aware networks. Juniper is a leader in high-performance, highly reliable routing, switching, and security, with solutions deployed in some of the most complex networks in the world across banking, capital markets, and insurance providers. A broad ecosystem of solution, services, delivery, and consulting partners can provide businesses with a complete offering that enables innovation.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Juniper APAC DWA Cloud Leads July 2017
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Windows 10 has the potential to be a quantum leap in IT and end-user productivity. But first, IT needs to educate its teams and end users on how to use, manage and employ Windows 10 to unlock those powerful benefits. Read this new flipbook to unlock insights into the seven game-changing features that make Windows 10 “ready for today’s mobile-cloud era” —and how IT can deliver a cloud-first unified approach to modern OS management and security.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2017
The VMware 2016 State of the Digital Workspace Report was performed in July 2016 and is a study that examined digital workspace adoption among global organizations across industries. Data represents a survey of 1,263 business decision makers (BDMs) and IT influencers to examine the worldwide progress in transitioning from the client-server era to the mobile-cloud era. Respondents acknowledged that game-changing IT relies on organizations adopting a digital workspace that includes security and identify management as vital components. With realistic prospects of achieving astounding return on investment (ROI), even businesses that cited obstacles to adoption may want to consider taking another look at business mobility initiatives.
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
    
VMware
Published By: Carbonite     Published Date: Aug 02, 2017
As concerns over cloud security fade, they’ve been replaced by a new fear: the pain of migration.1 Failed migrations are forcing businesses to second-guess moving to the cloud. But the ability to migrate to new platforms is essential for businesses seeking agility in competitive markets. Here are five common mistakes you should avoid to ensure successful, non-disruptive migration from any source to any target
Tags : 
cloud migration, non-disruptive migration, cloud
    
Carbonite
Published By: Workday     Published Date: Jul 19, 2017
Today’s business climate demands that corporations have a flexible computing infrastructure. Because of the agility it provides, cloud computing is garnering interest in many organisations. As they look at such possible deployments, however, some CIOs become hamstrung by security concerns. They feel that the traditional method of securing information in premises-based systems is the best way. While that option worked for many years, the threat landscape today is more diverse and more potentially damaging than ever before.
Tags : 
security, it department, system set-up, cloud suppliers, frameworks, human resources, enterprise financial, planning data
    
Workday
Published By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. It’s easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month — and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
    
SecureAuth
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
finance, data encryption, mobility, security, data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
finance, data security, cloud software, data encryption, security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care: How built-in data encryption keeps your PHI, DICOM studies safe Why more security pros are concerned with user behavior than cloud tools What your organization should know about the cloud and compliance
Tags : 
healthcare, data security, cloud software, privacy, patient care
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
healthcare, mobility, data security, security tips, personal device
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Every day more businesses are using the cloud to get work done. And for good reason. With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses— just like yours—to get work done from any device, any time. Read this eye-opening e-book to find out: Why 79% of businesses trust the cloud How business-class cloud services use high-level encryption tech to protect every file and document Why 79% of IT pros say it’s people, not technology, that cause security gaps.
Tags : 
cloud, cloud security, encryption, security, mobility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With cloud collaboration services constantly enhancing security features, the cloud is quickly becoming one of the most secure and simple ways for businesses similar to yours to get work done from any device, any time. Download this e-Book to find out: What benefits 85% of businesses get from relying on the cloud How business-class cloud services use encryption to protect your data Why 79% of IT pros say it’s people, not technology, that cause security gaps
Tags : 
cloud security, data encryption, data security, mobility, efficiency
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
54% of UK office workers spend some of their time working away from the office, but how do you make sure they’re able to interact with clients and each other? You can’t afford to miss a beat. Download this e-Book for 5 tips to collaborate with your clients from anywhere, including how to: Use the cloud without compromising security Make client meetings feel more personal Customize your mobile alerts to ensure they’re helpful
Tags : 
remote work, client interaction, collaboration, cloud security, personalization
    
Citrix ShareFile
Published By: Juniper Networks     Published Date: Aug 08, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up — quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Business evolution and technology advancements during the last decade have driven a sea change in the way data centers are funded, organized, and managed. Enterprises are now focusing on a profound digital transformation which is a continuous adjustment of technology management resources to deliver business results, guided by rapid review of desired outcomes related to end clients, resources, and budget constraints. These IT transitions are very much part of the competitive landscape, and executed correctly, they become competitive differentiators and enable bottom line growth. These outcomes are driving data centers to virtualization, service-oriented architectures, increased cybersecurity, “big data,” and “cloud,” to name a few of the key factors. This is completely rethinking and retooling the way enterprises handle the applications, data, security, and access that constitute their critical IT resources. In essence, cloud is the new IT.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Mimecast     Published Date: Apr 18, 2017
"With over 112 billion emails sent and received on a daily basis, email continues to be the dominant form of business communication. Organizations must formulate a strategy for not just storing email but meeting compliance requirements, responding to litigation requests and providing instant access to these important conservations. While this has traditionally been accomplished with on-premises technology, the cloud has transformed archiving by delivering new capabilities at lower costs. Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : 
email archiving, cloud, cloud based infrastructure, cyber security, cloud security
    
Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.