Whitepaper Library
 

responsible cloud

Results 1 - 9 of 9Sort Results By: Published Date | Title | Company Name
Published By: Carbonite     Published Date: Oct 12, 2017
I&O leaders responsible for storage must rethink their backup procedures to realize cost savings and improve backup infrastructure resource utilization. Cloud services can help your infrastructure modernization initiative, as they alleviate the burden on the data center backup infrastructure. Asset by Gartner
Tags : 
backup, recovery, cloud services, infrastructure, data center
    
Carbonite
Published By: NetApp     Published Date: Jun 01, 2017
This report from 451 Research examines the data management challenges faced by companies in a hybrid cloud environment and provides recommendations for IT professionals responsible for cloud deployments.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, 451 research
    
NetApp
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro
    
CDW-Trend Micro
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: Cisco     Published Date: Dec 21, 2016
IDC’s 2014 CloudView study interviewed Director-level and above respondents from a global sample of 19,080 enterprise executives responsible for IT decisions. Of this sample the full survey was conducted on the 3,643 respondents actively using cloud for multiple workloads
Tags : 
    
Cisco
Published By: Izenda     Published Date: Nov 20, 2014
If you’re responsible for delivery of a .NET application and your users have analytics requirements, you have some decisions to make. Watch Gigaom Research and our sponsor Izenda for “User Driven BI in the Cloud and Within Your Application,” a free recorded analyst webinar.
Tags : 
izenda, business intelligence, saas, saas applications, bi applications, cloud applications, cloud computing
    
Izenda
Published By: Avocent     Published Date: Aug 22, 2011
Cloud computing implementations have the potential to drive significant improvements in operational efficiency and reductions in operational expenditures.
Tags : 
avocent, cloud computing, infrastructure, emat, responsible cloud, high-availability, nist, grid computing
    
Avocent
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.