Computing SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computing Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Network Security
 •   Application Security
 •   Security Monitoring
 •   Managed Security Services
 •   Security Policies
 •   Data Center Management
 •   Wireless Security
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Computing Activities
 •   Computing Security Case Study
 •   Computing Security Downloads
 •   Computing Security File
 •   Computing Security Frameworks
 •   Methods Computing Security
 •   Portal Computing
 •   Price Computing
 •   Risks Computing
 •   Strategies Computing Security
Advertisement

ALL RESULTS
1 - 25 of 457 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Cloud Computing Security: Making Virtual Machines Cloud-Ready by Trend Micro, Inc.

October 20, 2010 - (Free Research)
This paper covers the delivery model of cloud computing that is also called utility computing, or Infrastructure as a Service (IaaS). It looks at the security implications and challenges that IaaS presents and offers best practices to service providers and enterprises hoping to leverage IaaS and so much more. 
(WHITE PAPER) READ ABSTRACT |

Private Cloud Computing Security Issues by IBM

November 26, 2013 - (Free Research)
Access this expert resource to uncover some of the most notable cloud computing security issues to watch out for before deploying a private cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

IT Handbook: Cloud Computing Security Up Close by Intel

July 05, 2011 - (Free Research)
This IT handbook is designed to help organizations make practical and strategic decisions about their own cloud security. Follow these guidelines to make sure that you've established policies that define data classification categories, data labeling mechanisms and data handling requirements. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Cloud Computing Security and Regulatory Compliance by Dell, Inc.

March 21, 2012 - (Free Research)
This presentation transcript, featuring Jim Reavis of the Cloud Security Alliance, offers advice on how to secure your cloud. Reavis discusses high level vs. detailed cloud security frameworks and suggests questions to ask potential cloud vendors. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

A Practical Guide to Cloud Computing Security by Avanade

February 19, 2010 - (Free Research)
Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be. 
(WHITE PAPER) READ ABSTRACT |

Intel Cloud Computing Security Research Video: What’s Holding Back the Cloud? by Intel

May 29, 2013 - (Free Research)
This video will share the results of a survey questioning IT professionals on their thoughts and feelings when it comes to cloud security. Watch and learn what is on the forefront of these professionals minds when it comes to securing the cloud, and what you can do to address these concerns. 
(VIDEO) READ ABSTRACT |

Cloud Computing and Security…thoughts from Intel CISO Malcolm Harkins by Intel

October 04, 2011 - (Free Research)
This short video explores the top security concerns in the cloud and provides insight on what your organization can do to avoid them. Learn how you can enable a safe, risk-free cloud environment. 
(WEBCAST) READ ABSTRACT |

Security in Public and Private Cloud Infrastructures by Joyent

August 12, 2010 - (Free Research)
This paper examines the current state of cloud computing security and details common security measures deployed in the industry. It will also detail the Joyent Smart Technology solutions for cloud computing use cases and how Joyent improves cloud security when compared to traditional techniques. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Cloud computing security - Infrastructure issues by Intel

May 26, 2011 - (Free Research)
While cloud computing provides a number of compelling benefits, it's highly distributed. Understanding how cloud computing providers build services and manage data is critical as it can mean the difference between real cost savings and false economy. 
(EGUIDE) READ ABSTRACT |

Private cloud computing security issues by DLT Solutions

March 09, 2012 - (Free Research)
While many organizations often favor private clouds over public clouds for it's better control, it shouldn't be a reason to ignore security. All cloud models, private including, has its own share of security risks that must not be overlooked. In this e-guide, gain expert insight into notable private cloud security issues and how to overcome them. 
(EGUIDE) READ ABSTRACT |

IT in Europe: Security in the Cloud by SearchSecurity.co.UK

August 26, 2011 - (Free Research)
Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks. 
(EZINE)

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Security in Cloud Computing by CSC

January 25, 2013 - (Free Research)
This expert E-Guide explores the hesitations preventing many from moving to the cloud and offers considerations to keep in mind when using external CSPs for your security needs. 
(EGUIDE) READ ABSTRACT |

Mobile Security: Rewards Outweigh Risks by GeoTrust, Inc.

July 19, 2013 - (Free Research)
This expert guide examines the impact that enterprise mobility can have on your organization, comparing the pros and cons, and explains why the benefits outweigh the risks. 
(EGUIDE) READ ABSTRACT |

CW Buyer's Guide: Data Security by ComputerWeekly.com

April 05, 2012 - (Free Research)
This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 03, 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Raytheon Open Source Performance Advantages by Univa UD

April 2008 - (Free Research)
By partnering with Univa, Raytheon, a leader in High Performance Computing and Mission Systems Integration, created a best-of-breed solution for scalable, robust and time-critical data movement, file virtualization, and storage and security challenges. 
(CASE STUDY) READ ABSTRACT |

IBM Point of View: Security and Cloud Computing by IBM

January 2011 - (Free Research)
Cloud Computing is easy to deploy, flexible and cost-effective.  As federal agencies continue to outsource data management and operations to third-party cloud providers, their ability to ensure data integrity and privacy is becoming a potential security risk. Read this white paper to learn how you can manage Cloud Computing safely and efficiently. 
(WHITE PAPER) READ ABSTRACT |

IDC White Paper – Identity and Access Management for Approaching Clouds by CA Technologies.

July 2010 - (Free Research)
Cloud computing is in the process of changing the enterprise IT landscape. Read this paper to learn about the security issues of the cloud and how to improve its security and visibility. 
(WHITE PAPER) READ ABSTRACT |

Securing Virtualized Environments and Accelerating Cloud Computing by CA Technologies.

June 2010 - (Free Research)
There is no question that virtualization offers compelling tangible benefits for an IT organization. Virtualization is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualization security, the CA Technologies Access Control (AC) solution, and how to accelerate cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Securing Virtualised Environments and Accelerating Cloud Computing by CA Technologies

May 2010 - (Free Research)
There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Security and High Availability in Cloud Computing Environments by IBM

July 2011 - (Free Research)
Cloud computing has become an increasingly popular means of delivering valuable, IT-enabled business services. Take a look at this exclusive resource to learn how adopting cloud technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment. 
(WHITE PAPER) READ ABSTRACT |

Maintaining Control & Compliance in the Cloud with Data-Centric Security by SafeNet, Inc.

March 2010 - (Free Research)
With promises of flexibility, ease of use, and lower costs, Service Oriented Architectures (SOA) and Virtualization are leading IT to the new outsourced computing model known as Cloud. This session will provide details on the impact of Cloud on information security and the data-centric solutions for specific use-cases. 
(WEBCAST) READ ABSTRACT |

Security in Cloud Computing by Intel

October 2011 - (Free Research)
New and improved technologies can improve cloud security and smooth the transition in your enterprise. Access this white paper to learn how these solutions can allow your business to take advantage of all the cloud has to offer while maintaining a secure infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Overcoming Security Challenges in the Cloud by Intel

August 2011 - (Free Research)
In this videocast, learn about the various security concerns companies have when moving to client-aware cloud computing and get expert advice on how to address them. 
(VIDEO) READ ABSTRACT |

1 - 25 of 457 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts