RSS feed Get our RSS feed

News by Topic

security and compliance the cloud

Results 1 - 25 of 41Sort Results By: Published Date | Title | Company Name
By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
     AWS
By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
     Dome9
By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
     Dome9
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: IBM APAC     Published Date: Nov 13, 2018
This Frost & Sullivan whitepaper explores some of the common fears and challenges related to security and compliance, and how a skilled managed service provider can help you overcome them as you deploy sensitive, business-critical workloads in the cloud.
Tags : 
     IBM APAC
By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : salesforce, cloud, security, webinar, best practices
     Salesforce
By: Salesforce     Published Date: Jan 15, 2016
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : salesforce, cloud, security, webinar, best practices
     Salesforce
By: VMware, Inc     Published Date: Oct 30, 2014
VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud service that delivers the tried and tested VMware capabilities widely used by government organizations today, with the added security and compliance assurance of FedRAMP authorization. The hybrid cloud is becoming more and more prevalent – in fact, nearly three-fourths of large enterprises expect to have hybrid deployments by 2015.
Tags : enterprise-class hybrid, government organizations, cloud service
     VMware, Inc
By: Oracle Security Solutions     Published Date: Oct 20, 2017
Cloud Access Security Brokers are one of the fastest growing security technologies today because they provide cloud service visibility, data security, threat protection, and compliance. CASBs are an effective and easy way to mitigate the top cloud security threats and security practitioners look to trusted CASB providers as strategic partners to help advise on key cloud security decisions.
Tags : 
     Oracle Security Solutions
By: Rackspace     Published Date: Mar 28, 2018
With Rackspace Managed Security and Compliance Assistance for GCP, Rackspace is now a leading managed security services provider that offers services on all of the major public cloud platforms. In IDC’s 2017 CloudView Survey of over 6,000 enterprise respondents, nearly 50 percent indicated concerns about security in the cloud, and about 40 percent cited superior security capabilities available from service providers as a major incentive to move to the cloud.¹ With RMS, Rackspace security experts help customers with strategic planning for best practice multi-cloud security, tactical day-to-day security monitoring and threat analysis to deter, detect and respond to potential threats around the clock.
Tags : 
     Rackspace
By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : cloud, aws, security, organizations, visibility, control, networks, platforms
     Amazon Web Services
By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Aug 22, 2019
In today’s fast-moving, competitive environment, companies are migrating to Microsoft Azure to increase their agility and decrease their time to market. While the payoff for adopting Azure can be great, many are finding it difficult to reach the cloud and business success they originally hoped for. It’s common for organizations investing in Azure to encounter numerous roadblocks early in their cloud journey, including monthly bills exponentially higher than anticipated and underutilized resources. For organizations looking to reach cloud maturity—where cost and performance are optimized, security and compliance best practices are established, and one’s environment is governed by policy-driven automation—gaining control of their Azure infrastructure is crucial. The goal of this eBook is to help with just that. For those of considering Azure or who are currently in the migration phase of your Azure cloud journey, we offer insight and expert best practices to make the early stages of your
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Sep 05, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
     CloudHealth by VMware
By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
     Druva
By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
     Group M_IBM Q418
By: Ahead     Published Date: Nov 15, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, they’re realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is wellintended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular--Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through common missteps and how to get it right.
Tags : 
     Ahead
By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
     Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
     Forcepoint
By: Ahead     Published Date: Aug 08, 2018
As organizations are moving to AWS to gain the operational efficiencies of the cloud, they’re realizing the importance of a well-architected framework. This framework, which consists of twelve pillars, is well-intended, secure, and compliant, but is not exactly easy to achieve. Our clients frequently tell us that two pillars in particular-- Security and Cost Optimization--are the most difficult to get right. This is partially because while advanced tooling is required to manage cloud complexities and compliance, selecting, deploying, and operating these tools is costly and burdensome. Without optimizing your environment for these two pillars, you are preventing your organization from scaling up. This has resulted in many businesses that are restricted to a minimal use of AWS, negating any benefit of having adopted the cloud in the first place. AHEAD uses the AWS Well-Architected Framework, which will walk you through missteps and how to get it right.
Tags : 
     Ahead
By: VMware, Inc     Published Date: Dec 05, 2013
This executive level paper highlights trends and findings from CIO’s 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter. Featured content includes debunked myths of securing cloud environments, how the secure cloud is a key business enabler for the CSO, as well as strategies for how to get started building a secure cloud initiative. Please download the white paper for more information.
Tags : vmware, global cloud computing adoption, security and compliance, virtualized datacenter, securing cloud environments, secure cloud initiative
     VMware, Inc
By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : cloud, security, guide, privacy, architectures, organizations, compliance, protection
     McAfee EMEA
By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : navisite, technology, cloud comptuing, security, risk management, security management, business security
     Navisite- A Time Warner Cable Company
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics