Cloud Computing Security

Results: 3057



#Item
211

ATERNITY VERSION CLOUD PLATFORM AVAILABILITY AND SECURITY The relentless pace of change in converged end user computing environments continuously increases the pressure

Add to Reading List

Source URL: www.aternity.com

Language: English - Date: 2016-03-02 11:46:30
    212Antivirus software / Cloud infrastructure / Cloud computing / Computer security / Malware / F-Secure / Zscaler / HP Cloud

    F-Secure Security Cloud: Purpose, function and benefits

    Add to Reading List

    Source URL: www.f-secure.com

    Language: English - Date: 2015-11-04 04:10:16
    213Computing / Enterprise application integration / Security / SOA Security / Decentralization / Software as a service / Cloud computing / Computer security

    Issue LXI • AprilReducing Application Cost and Risk through Centralized SOA Security by Mamoon Yunus, CEO of Crosscheck Networks

    Add to Reading List

    Source URL: www.servicetechmag.com

    Language: English - Date: 2012-04-24 20:38:15
    214Computing / Cloud computing / Cloud infrastructure / Web hosting / Web services / Cloud storage / Amazon Web Services / Amazon Route 53 / Amazon Virtual Private Cloud / Amazon Elastic Compute Cloud / Amazon Relational Database Service / Amazon S3

    Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security and Availability For the Period April 1, 2015 – September 30, 2015 ©2015 Amazon.com, Inc. or its affiliates

    Add to Reading List

    Source URL: d0.awsstatic.com

    Language: English - Date: 2015-11-16 18:13:30
    215Computer security / Computing / Security / Computer network security / Data security / Cryptography / National security / Cloud computing security / Vulnerability / Threat / Security controls / Service Organization Controls

    SO C 2 CO MP LIA N CE ACHIEVING SOC 2 COMPLIANCE WITH THREAT STACK As a service provider storing and handling large amounts of customer data, you’re tasked with minimizing risk and exposure to this data. Inadequate se

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-03-16 05:56:01
    216Cryptography / Homomorphic encryption / Paillier cryptosystem / Probabilistic encryption / Block cipher / Encryption / Ciphertext indistinguishability / Cloud computing security / Blowfish / ElGamal encryption / GoldwasserMicali cryptosystem / Initialization vector

    Talos: Encrypted Query Processing for the Internet of Things Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher Simon Duquennoy

    Add to Reading List

    Source URL: www.vs.inf.ethz.ch

    Language: English - Date: 2015-09-17 04:43:33
    217Cryptography / Homomorphic encryption / Encryption / Internet of things / Paillier cryptosystem / Deterministic encryption / ElGamal encryption / Gateway / Key / Computer security / Cloud computing security / Data in use

    Poster: Towards Encrypted Query Processing for the Internet of Things User Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher

    Add to Reading List

    Source URL: www.vs.inf.ethz.ch

    Language: English - Date: 2015-07-21 13:59:17
    218Information privacy / Data retention / European Union directives / Data protection / Privacy / Telecommunications data retention / Data Protection Directive / Cloud computing security / Internet privacy / Data Protection Act

    Microsoft Word12Final)NewRelicEUDataProtectionWhitepaper.docx (2).docx

    Add to Reading List

    Source URL: try.newrelic.com

    Language: English
    219Computing / Security / Computer security / Prevention / Computer network security / E-commerce / Secure communication / National security / Payment Card Industry Data Security Standard / Cloud computing security / Cloud computing / Threat

    TH RE AT STA CK C LO UD SE C UR ITY P L AT FO RM T M A DVANCED ED ITION Ensure your data is safe. Threat Stack Cloud Security PlatformTM Advanced edition adds a new dimension to your

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-03-08 04:53:55
    220Computer security / Computing / Computer forensics / Mimecast / FireEye / Kaspersky Lab / Trusteer / Qualys / Dell Software / Trend Micro / Cloud computing security / Lastline

    SCAWARDS2014_honor_Horizontal

    Add to Reading List

    Source URL: static.webvid.co.uk

    Language: English - Date: 2015-06-09 10:42:45
    UPDATE