Cloud Computing Security

Results: 3057



#Item
31Norbert Pohlmann / Cryptography / Computer access control / Fog Investigation and Dispersal Operation / Gelsenkirchen / Fido / Authenticator / Internet security / Authentication / Cloud computing / Computing / Security

A New Approach For FIDO UAF  Advantages of a cloud-based FIDO Client Prof. Dr. (TU NN) Norbert Pohlmann

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2016-03-23 13:56:57
32Computing / Security / Concurrent computing / Data management / Cloud storage / Computer networking / Data center / Distributed data storage / Biometrics / Server / Computer security

Chicago Data Center (CHI-3) About CHI-3 SingleHop’s newest data center in the Chicago area is situated in a private, secured campus built and operated by Digital Reality Trust. SingleHop holds a single-tenant, 10-year

Add to Reading List

Source URL: library.singlehop.com

Language: English - Date: 2015-05-20 05:35:52
33Computing / Cloud infrastructure / Cloud computing / VMware / OpenStack / Software-defined networking / Virtualization / Software-defined data center / Altor Networks / IBM cloud computing

Check Point vSEC for Private and Public Clouds | White Paper CHECK POINT VSEC ADAPTIVE SECURITY FOR PRIVATE AND

Add to Reading List

Source URL: www.compugraf.com.br

Language: English - Date: 2016-02-02 11:14:45
34Computing / Qualys / Computer security / Payment Card Industry Data Security Standard / Information technology / SAQ / Cloud computing security / Regulatory compliance / Questionnaire / Business process management / Cloud computing

SAQ SECURITY ASSESSMENT QUESTIONNAIRE Assess Business Risk with Automated Campaigns

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-02-29 14:52:30
35Computing / Cloud computing / Cloud infrastructure / Computer security / Cloud computing security / Cloud computing issues / HP Cloud

Thought Leadership Making cloud work for business We are regularly told in survey after survey that corporate concerns about security are the biggest barrier to

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:06:42
36Endpoint security / Cloud computing / Computing / Remote administration software / Software / System administration / HP Client Automation Software / IBM BigFix

Radia Data Sheet15v8

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-03-18 20:57:06
37Computing / Cloud computing / Cloud infrastructure / Bring your own device / Mobile device management / Software as a service

Security in an Age of Zero Trust Jon Oberheide CTO, Duo Security, Inc. Introduction

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:19:56
38Computing / Security / Policy / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy policy / Privacy / Computer security / Cloud computing

Embracing Policy Engineering Kathi Fisler Shriram Krishnamurthi Daniel J. Dougherty

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2010-10-21 09:43:59
39Computing / Software / Technology / Cloud clients / Information appliances / E-commerce / Mobile technology / Mobile security / Android / Mobile malware / Mobile app / Kaspersky Lab

App_Store_Badge_135x40_Master_062012

Add to Reading List

Source URL: www.entrustdatacard.com

Language: English - Date: 2016-02-11 14:34:25
40Computing / Security / Cryptography / Cloud computing / Information technology management / Crime prevention / National security / Digital transaction management / XDTM Standard Association / Records management / Computer security / ARX

The xDTM Standard The Transaction Management Standard for an Open Digital World Executive Brief The xDTM Standard

Add to Reading List

Source URL: www.xdtm.org

Language: English - Date: 2016-06-28 14:48:03
UPDATE