Cloud Computing Security Research Library

Powered by

All Research

  • Securing Data at Rest with Encryption

    Sponsored by: Amazon Web Services and Intel

    This white paper provides an overview of various methods for encrypting data at rest in Amazon Web Services (AWS).

  • Analyst Report: How 9 Managed Security Service Providers Stack Up

    Sponsored by: IBM

    This Forrester Research, Inc. report identifies 9 managed security services providers (MSSPs) – AT&T, CSC, IBM, and more – that were researched, analyzed, and compared against one another. Explore how each provider stacks up against three categories: current offering, strategy, and market presence.

  • How to Properly Move into the Cloud

    Sponsored by: Forum Systems

    This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.

  • MFT Center of Excellence Whitepaper

    Sponsored by: IBM

    Many companies have implemented managed file transfer (MFT) as a way to gain control over a wide array of file transfer activities.  By employing these products, companies have remediated the inherent risk of File Transfer Protocol (FTP).

  • Security Threat Report 2014

    Sponsored by: Sophos, Inc.

    In this security threat report, explore how malware has evolved and botnet and exploit kit innovations have proliferated. Read on to learn how a hacker can profit from your smartphone, tips for protecting your web server and clients, how to protect from targeted threats to your financial accounts, and more.

  • Shadow IT in the Enterprise

    Sponsored by: Nasuni Corporation

    In this report, discover survey results from more than 1,000 enterprise users to give you a better sense of who is using Dropbox and for what purposes. Don't be surprised to learn that smartphone and tablet users are much more likely to use Dropbox – read on to find out more.

  • Confidence in cloud file sharing: How to be protected and productive

    Sponsored by: Dropbox for Business

    Watch this video to find out how your business can be confident that its shared files are consistently protected.

  • AWS Security Best Practices: Define your Information Security Management System and a set of policies for data protection

    Sponsored by: Amazon Web Services and Intel

    This white paper provides security best practices that will help you define your Information Security Management System (ISMS), and build a set of policies to protect your data and assets in the AWS cloud.

  • How Conventional Security Tools Expose Modern Data Centers to Cyber Threats

    Sponsored by: CDW Corporation

    This presentation describes how to address the security issues presented by the transition of enterprise data centers to virtual and cloud-based environments.

  • Deliver Secure Service without Sacrificing Mobility or Collaboration

    Sponsored by: Citrix and Microsoft

    This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.

About the Cloud Computing Security Research Library

The Cloud Computing Security Research Library provides enterprise security professionals with the latest information on cloud security management and technology, including tools for cloud computing software security and cloud computing architecture security, cloud data storage security, cloud network security, virtualization cloud computing security and more with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Cloud Computing Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.