Cloud Computing Security Research Library

Powered by

All Research

  • AWS Security Best Practices

    Sponsored by: Amazon Web Services

    This white paper provides security best practices that will help you define your Information Security Management System (ISMS), and build a set of policies to protect your data and assets in the AWS cloud.

  • Webcast: Why Conventional Security Tools Fail in Modern Data Centers

    Sponsored by: CDW Corporation

    This presentation describes how to address the security issues presented by the transition of enterprise data centers to virtual and cloud-based environments.

  • Accessing Your Cloud Risk

    Sponsored by: Sophos, Inc.

    This webcast explains the best ways to assess your cloud risk and if it is a good fit for your organization.

  • Deliver Secure Service without Sacrificing Mobility or Collaboration

    Sponsored by: Citrix and Microsoft

    This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.

  • Craft a security policy for a cloud-based BYOD environment

    Sponsored by: IBM

    As the bring your own device (BYOD) movement gains popularity in the workplace, new security concerns arise. In this article, learn how to create a thorough, clear security policy for a cloud-based BYOD environment that includes RIM, Android, Apple, and Windows devices.

  • How to easily configure antivirus policies in GFI Cloud

    Sponsored by: GFI Cloud

    This short video demonstrates – by walking you through, step by step – how to easily configure antivirus policies in GFI Cloud. Watch now to discover how to achieve improved network security in the cloud.

  • GFI Cloud Product tour

    Sponsored by: GFI Cloud

    Access this video for a product tour of a solution that offers IT management, monitoring, and security capabilities.

  • GFI CloudTM Case Study - MacDermid Offshore Solutions UK

    Sponsored by: GFI Cloud

    This informative case study details a success story with one server monitoring solution. Read on to find out how you can have a single view of key software without integration and compatibility worries instead of different vendors for different pieces of software, and ensure that your primary servers are always up with key services running.

  • Stepping up your cloud security game: Management and data security in the cloud

    Sponsored by: BitGlass

    In this expert e-guide, discover the steps to take towards cloud security management and how to maintain your cloud data security separately from your provider.

  • Simple Security Is Better Security

    Sponsored by: Sophos, Inc.

    This white paper introduces an alternative solution to lower complexity—cloud-based endpoint security. Read on to find out how SMBs differ from one another and why it is important to take the time to evaluate each of their needs.

About the Cloud Computing Security Research Library

The Cloud Computing Security Research Library provides enterprise security professionals with the latest information on cloud security management and technology, including tools for cloud computing software security and cloud computing architecture security, cloud data storage security, cloud network security, virtualization cloud computing security and more with vendor and analyst white papers, case studies, webcasts, videos, podcasts and product information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Cloud Computing Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.