Whitepaper Library
 

responsible cloud

Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Aviatrix     Published Date: May 17, 2018
Global Transit Network architecture is critical to the success of your AWS cloud deployment. Implemented correctly, a Global Transit Hub enables traffic to securely flow from on-prem to VPCs, or from VPC to VPC, in a way that minimizes complexity and cost and maximizes agility and availability. Implemented poorly, it becomes a choke point that is time-consuming – and costly – to maintain and troubleshoot. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei reviews seven best-practice topics for Global Transit Network architecture. Free Evaluation Checklist In addition to the slides, you’ll also receive a handy spreadsheet-based checklist with 50 architecture and business goals to consider when evaluating solutions for your own Global Transit Network. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
    
Aviatrix
Published By: Aviatrix     Published Date: May 17, 2018
Join Aviatrix for a discussion of next-generation transit hubs that are purpose-built to treat the network as code, rather than as a virtualized instance of a data center router. Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that deliver on those requirements. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
    
Aviatrix
Published By: Aviatrix     Published Date: May 17, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
    
Aviatrix
Published By: Carbonite     Published Date: Oct 12, 2017
I&O leaders responsible for storage must rethink their backup procedures to realize cost savings and improve backup infrastructure resource utilization. Cloud services can help your infrastructure modernization initiative, as they alleviate the burden on the data center backup infrastructure. Asset by Gartner
Tags : 
backup, recovery, cloud services, infrastructure, data center
    
Carbonite
Published By: NetApp     Published Date: Jun 01, 2017
This report from 451 Research examines the data management challenges faced by companies in a hybrid cloud environment and provides recommendations for IT professionals responsible for cloud deployments.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, 451 research
    
NetApp
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro
    
CDW-Trend Micro
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: Cisco     Published Date: Dec 21, 2016
IDC’s 2014 CloudView study interviewed Director-level and above respondents from a global sample of 19,080 enterprise executives responsible for IT decisions. Of this sample the full survey was conducted on the 3,643 respondents actively using cloud for multiple workloads
Tags : 
    
Cisco
Published By: Izenda     Published Date: Nov 20, 2014
If you’re responsible for delivery of a .NET application and your users have analytics requirements, you have some decisions to make. Watch Gigaom Research and our sponsor Izenda for “User Driven BI in the Cloud and Within Your Application,” a free recorded analyst webinar.
Tags : 
izenda, business intelligence, saas, saas applications, bi applications, cloud applications, cloud computing
    
Izenda
Published By: Avocent     Published Date: Aug 22, 2011
Cloud computing implementations have the potential to drive significant improvements in operational efficiency and reductions in operational expenditures.
Tags : 
avocent, cloud computing, infrastructure, emat, responsible cloud, high-availability, nist, grid computing, data center, virtualization
    
Avocent
Published By: NetApp     Published Date: Mar 05, 2018
This report from 451 Research examines the data management challenges faced by companies in a hybrid cloud environment and provides recommendations ??for IT professionals responsible for cloud deployments?.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.