Cloud Computing Security

Results: 3057



#Item
401Cloud infrastructure / Cloud storage / Data center / Computer security / Cloud communications / IBM cloud computing / Cloud computing / Computing / Centralized computing

G-Cloud Infrastructureas-a-Service Secure scalable pay as you use cloud services The trusted way to deploy your IT Not all Infrastructure-as-a-Service (IaaS) is the same. As a buyer you should take great care in selectin

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 06:00:04
402Centralized computing / Amazon Web Services / Amazon Elastic Compute Cloud / Amazon S3 / Amazon.com / PostgreSQL / Cloud computing / Computing / Web services

Visit our website: fulcrumapp.com Security & Infrastructure Fulcrum is a cloud-based data collection and storage platform designed to simplify the process of creating customized data collection apps for conducting field

Add to Reading List

Source URL: fulcrumapp.com

Language: English
403Cloud storage / Outsourcing / Backup / Computer file / File system / Records management / File hosting service / Cloud computing / Management / Data security / Computing / Business

The Idaho Information Technology Plan

Add to Reading List

Source URL: ita.idaho.gov

Language: English - Date: 2015-02-26 10:28:29
404EMC Corporation / VMware / Converged infrastructure / Cloud infrastructure / Cloud storage / EMC Symmetrix / Cloud computing / Computing / Centralized computing

EMC GLOBAL SERVICES Accelerating the software-defined enterprise Massive technology change, data growth, and security threats are driving IT ESSENTIALS Accelerate the software-defined

Add to Reading List

Source URL: india.emc.com

Language: English
405Cloud standards / Identity management / Identity management systems / Federated identity / Security Assertion Markup Language / OAuth / OpenID / SAML 2.0 / Real Estate Transaction Standard / Computing / Computer security / Security

Mission: "this group was formed to create "a cohesive [authentication] strategy and facilitate the use of recognized protocols. This group is "tasked with researching existing industry methods and recommending the adopt

Add to Reading List

Source URL: reso.memberclicks.net

Language: English - Date: 2013-10-14 18:00:13
406Computer network security / Data synchronization / Crime prevention / National security / Computer security / Data loss prevention software / Dropbox / .mobi / Google / Cloud computing / Computing / Software

Top 3 data security threats Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan Sometimes we feel like we keep repeating ourselves and then we reali

Add to Reading List

Source URL: www.endpointprotector.com

Language: English - Date: 2015-05-25 06:33:07
407Backup software / Data security / Backup / Cloud storage / IBM Lotus Notes / Shadow Copy / Incremental backup / Oracle Database / Microsoft Exchange Server / Software / Computing / System software

ZenDati | Pre-sales FAQ (Frequently Asked Questions) FAQs Here are answers to some of our most frequently asked questions. Platforms Supported Which Operating Systems do you support?

Add to Reading List

Source URL: zendati.com

Language: English - Date: 2012-02-09 20:37:42
408Software distribution / Software as a service / Software industry / Novell Cloud Security Service / IICCRD / Centralized computing / Computing / Cloud computing

The Use of the Cloud for Land Records Presented by Douglas P Allen, CRM Regional Sales Manager Tyler Technologies May 27, 2015

Add to Reading List

Source URL: nacrc.memberclicks.net

Language: English - Date: 2015-05-28 14:27:23
409Cloud storage / Data center / Data management / Distributed data storage / Networks / Uninterruptible power supply / Server / Cloud computing / Electric power transmission / Computing / Concurrent computing / Distributed computing

Datacenter efficiency, security and innovation It’s everywhere, it’s all around us. Even now, right in your room. Is what you see when you look out the window,

Add to Reading List

Source URL: www.enter.it

Language: English - Date: 2015-05-05 12:16:10
410Computing / Internet of Things / Information privacy / Data Protection Directive / Internet privacy / Cloud computing / Radio-frequency identification / Information security / Surveillance / Privacy / Ethics / Security

Privacy and security in the Internet of Things: challenge or opportunity November 2014

Add to Reading List

Source URL: www.olswang.com

Language: English - Date: 2014-11-28 10:21:19
UPDATE