cloud security

Results 276 - 300 of 1120Sort Results By: Published Date | Title | Company Name
By: Hitachi Vantara     Published Date: Mar 21, 2018
Challenge: Ensure that technology infrastructure will support business transformation, new growth and services. Solution: Implement highly automated converged infrastructure and managed cloud services from Hitachi Vantara. Outcomes: Use new capabilities to integrate acquired companies, deploy next-generation security and speed time to the market.
Tags : 
     Hitachi Vantara
By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
     Zscaler
By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : gdpr, risk mitigation, email resiliency, personal data protection
     Mimecast
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Security in a mobile, cloud- enabled World! The way we work has changed, Security must also change. Built to solve the security challenges of today's mobile, cloud- enabled enterprise, a new category of products is emerging- the secure interest gateway. Download this Infographic today to find out more!
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains. Unlike appliances, our cloud security platform protects devices both on and off the corporate network. Unlike agents, the DNS layer protection extends to every device connected to the network — even IoT. Umbrella truly is the easiest and fastest layer of security to deploy everywhere. Download today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
As a secure internet gateway, Cisco Umbrella helps you tackle the challenges of mobility, SaaS, and branch transformation by offering a single platform that secures access to and use of the cloud, SaaS applications, branch offices, and endpoints. It's your first line of defense against threats -- anytime and anywhere your users access the internet, traffic goes through Umbrella first. To understand how a secure internet gateway provides 360-degree security for access to and use of the cloud, read the ebook.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Welcome to the multicloud era - SaaS apps in the cloud, public and hybrid clouds hosting infrastructure, employees and branches accessing the cloud and internet from anywhere. -300,000 OAuth-connected SaaS apps discovered -84% of companies will use multiple clouds -70% of branches have direct, anytime cloud access Elevate Your Cloud Security with Cisco.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. Plus, many organizations are now using direct internet connections at branch offices, which means employees and guest users don’t get the protection of your traditional security stack. Not only are more offices connecting directly to the internet — it’s estimated that 70% of branch offices already have some direct internet access — but attackers recognize these weak points in their targets and have started exploiting them more. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet.
Tags : 
     Cisco Umbrella EMEA
By: Juniper Networks     Published Date: Feb 01, 2016
Download this eGuide and learn the following: How the cloud and mobile have changed the enterprise How to manage the security risks of shadow IT Benefits and adoption strategies for shadow IT How the Juniper Unite architecture can help
Tags : 
     Juniper Networks
By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry, data security
     Oracle
By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry, data security
     Oracle
By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry, data security
     Oracle
By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry, data security
     Oracle
By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry, data security
     Oracle
By: Oracle     Published Date: Sep 14, 2016
This whitepaper explores everything a food and beverage executive needs to know about cloud technology and how it can help your business
Tags : cloud, cloud computing, the importance of cloud, cloud for food and beverage operators, food and beverage industry, data security
     Oracle
By: Oracle     Published Date: Sep 06, 2016
With order channels multiplying, supply, chains growing more complex, and customer expectations increasing, fulfilling orders consistently and efficiently - while meeting customer demands - is harder than ever.
Tags : oracle scm cloud, supply chain, security
     Oracle
By: Oracle     Published Date: Sep 06, 2016
Manufacturing faces many challenges in the 21st century with an explosion of new technologies, increasing regulations and ever-rising customer expectations. It’s time to re-imagine manufacturing.
Tags : oracle scm cloud, cloud computing, cloud, scm, security, security application
     Oracle
By: IBM     Published Date: Jun 16, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : enterprise infrastructure, big data, mobility, data center, it infrastructure, it security technologies, virtualizing infrastructure, converging technologies, analytics
     IBM
By: IBM     Published Date: Mar 30, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on-premises data with new third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : cloud security, electronic security, health care, security risk management, user authentication, cloud technology
     IBM
By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : data, security, encryption, cloud environments, data regulation
     IBM
By: IBM     Published Date: Jul 26, 2017
Just a few years ago, many organizations turned to private cloud environments to help increase flexibility and control costs—largely because of the immaturity and lack of control within the public cloud environments then available. Today, however, the decision to “go cloud” is less of a binary, and more of a spectrum of choices, spanning different deployment models (public, private and hybrid) and service types, including IaaS, PaaS and SaaS.
Tags : cloud, data protection, security, deployment methods, service types
     IBM
By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : identity governance, security threats, user access, cloud security, identity management
     IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com