RSS feed Get our RSS feed

News by Topic

cloud data security

Results 201 - 225 of 295Sort Results By: Published Date | Title | Company Name
By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
     Microsoft
By: Trend Micro SPN     Published Date: Sep 23, 2009
To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
     Trend Micro SPN
By: Webroot UK     Published Date: Mar 22, 2010
Move protection to where the threats are managing web-borne threats is becoming a major headache for today's resource-strapped organizations.
Tags : webroot, web security, cloud-based computing, malware, threat protection, data security
     Webroot UK
By: New Relic     Published Date: Mar 17, 2015
This white paper will help you understand how you can achieve end-to-end visibility into application performance no matter where your application or parts of your application are running. You’ll learn what to look for when choosing an application performance monitoring solution and we’ll share some lessons learned about monitoring applications in the cloud.
Tags : application performance, apm, monitoring solutions, cloud integration, hybrid clouds, data center, private data security, mobile agility
     New Relic
By: Singlehop     Published Date: Oct 01, 2014
As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.
Tags : cloud security, infrastructure threats, security data, chp infrastructure, security
     Singlehop
By: NetApp     Published Date: Mar 11, 2015
Improving data backup and recovery continues to be a top priority among senior IT decision makers, as highlighted in a 2015 IT Spending Intentions survey conducted by ESG. Organizations plan to invest in modernizing data protection, including the cloud. Learn the key considerations when evaluating a cloud-extended data protection solution that provides security, efficiency, effectiveness, and risk mitigation.
Tags : 
     NetApp
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : security
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro, security
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands— while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.
Tags : security, virtualization, cloud computing, trend micro
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : security
     CDW-Trend Micro
By: Microsoft Azure     Published Date: Apr 11, 2018
Developing for and in the cloud has never been more dependent on data. Flexibility, performance, security—your applications need a database architecture that matches the innovation of your ideas. Industry analyst Ovum explored how Azure Cosmos DB is positioned to be the flagship database of internet-based products and services, and concluded that Azure Cosmos DB “is the first to open up [cloud] architecture to data that is not restricted by any specific schema, and it is among the most flexible when it comes to specifying consistency.” From security and fraud detection to consumer and industrial IoT, to personalized e-commerce and social and gaming networks, to smart utilities and advanced analytics, Azure Cosmos DB is how Microsoft is structuring the database for the age of cloud. Read the full report to learn how a globally distributed, multi-model data service can support your business objectives. Fill out the short form above to download the free research paper.
Tags : 
     Microsoft Azure
By: Microsoft Azure     Published Date: Apr 11, 2018
Make sure you’re getting the most out of your data and the artificial intelligence (AI) technologies available. Read the e-book, Six cloud data challenges solved for app developers and get actionable answers. Learn the best approach when faced with six familiar data scenarios: Keeping track of essentials such as scalability and availability. Making sure your app delivers consistent service to multiple customers. Delivering data in real time, across the globe, without the complexities of multiple datacenters. Creating actionable insights from big data. Incorporating artificial intelligence into your apps. Locking down security while building in the cloud.
Tags : 
     Microsoft Azure
By: Evident.io     Published Date: Nov 19, 2015
Evident.io has a significant head start in this nascent corner of the cloud security space. Besides addressing a critical portion of the cloud's attack surface that isn't well covered by other vendors yet, Evident.io has built a platform that transcends the niche it currently addresses. The API/SDK consumption capabilities, data analytic and user workflow portions of the company's Evident Security Platform are valuable assets that it can leverage to grow into other areas in the future.
Tags : evident, cloud security, security platforms, datacenter, firewalls, public cloud, api consumption, security
     Evident.io
By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
     AWS
By: AWS     Published Date: Aug 15, 2018
Earning and keeping your customer’s trust is one key to long-term success. In today’s digital world, your customers expect product and service innovations at an increasingly rapid pace. At the same time, customer privacy and data security are under close scrutiny. These trends help to explain why organizations are migrating to Amazon Web Services (AWS): to benefit from the agility, scalability, and security that it offers. AWS has always put cloud security first. This security-centric approach not only helps you more effectively protect your data on AWS, but can also help you meet security and compliance standards.
Tags : 
     AWS
By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As the cloud continues to be adopted for a wide range of applications and data, it is critical to mitigate risks, increase visibility and implement control over all cloud offerings through an integrated security solution. To learn more, download this infographic.
Tags : cloud, cloud usage, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
The widespread adoption of cloud services has resulted in sensitive data assets being stored in cloud services. This solution brief takes a deep dive of McAfee’s unified approach to data security that protects both on premise and cloud-resident data from loss and to meet and maintain compliance
Tags : unified data protection, data protection, cloud adoption, cloud vsibility, cloud data protection, cloud access security broker, shadow it
     McAfee
By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
     McAfee
By: McAfee     Published Date: Mar 31, 2017
As trust grows, cloud use accelerates. IT struggles to safeguard sensitive data as Shadow IT hinders visibility and control. Read “Building Trust in a Cloudy Sky.”
Tags : cloud report, cloud research, cloud usage, public cloud, cloud adoption, hybrid cloud, private cloud, cloud security
     McAfee
By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
     Qualys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics