Cloud Computing Security

Results: 3057



#Item
421Cyberwarfare / Crime prevention / National security / Computing / Network security / Malware / Cloud computing / Threat / Information security / Computer network security / Security / Computer security

ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the ProtectWise Clo

Add to Reading List

Source URL: www.protectwise.com

Language: English - Date: 2015-06-03 12:28:43
422Cloud infrastructure / Hybrid cloud / Intelligent workload management / Kaavo / Java enterprise platform / Cloud computing / Centralized computing / Computing

APCERA.COM Hybrid Cloud Operating System Apcera’s Hybrid Cloud OS: The Security and Freedom IT Demands. The Speed Developers Love The modern enterprise operates in a complex world, which requires that IT and developer

Add to Reading List

Source URL: www.apcera.com

Language: English - Date: 2015-06-03 14:15:44
423Computing / Cloud computing / Provisioning / Mobile device management / Technology / Electronics / Computer network security / Content-control software / Fortinet

DATA SHEET FortiCloud™ Hosted Wireless and Security Device Provisioning, Management and Analytics

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:14
424Software / Concurrent computing / Hadoop / Apache Hadoop / Cloudera / MapR / Kerberos / RapidMiner / Big data / Computing / Cloud infrastructure / Cloud computing

by Tobias Malbrecht and Zoltan Prekopcsak February 2015 RapidMiner Orange Paper Big Data Security on Hadoop As an increasing number of enterprises move towards production

Add to Reading List

Source URL: rapidminer.com

Language: English - Date: 2015-02-17 10:53:21
425Computer network security / Software testing / OWASP / Security / Cloud computing / Web application security / Application security / Penetration test / Application firewall / Computing / Computer security / Cyberwarfare

1 2 Welcome to OWASP AppSec USA 2011, an application security conference for information security and development enthusiasts building software - which plays such a vital role in our lives - to be more

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-10-02 12:13:04
426Smartphones / Cloud clients / Computing / Software / Mac OS X / IOS / Xbox 360 system software / Copyright law / Digital rights management / Computer architecture

How to Modify the System Software for Developer 1. Introduction Due to security reasons, the debug function for the MOVERIO BT-200 system software for consumer is disabled. We have special system software with debug func

Add to Reading List

Source URL: tech.moverio.epson.biz

Language: English - Date: 2015-03-24 21:56:43
427Credit cards / Data privacy / Payment systems / Malware / Computer security / Payment Card Industry Data Security Standard / Cloud computing / Application security / Comodo Group / Antivirus software / Computing / Computer law

PDF Document

Add to Reading List

Source URL: www.sitelock.com

Language: English - Date: 2013-05-16 16:09:07
428Data security / Blackboard Inc. / Distance education / Educational technology / Online education / Backup / Data center / Converged storage / University of North Carolina at Greensboro / Computing / Cloud computing / Concurrent computing

ITS Technology Infrastructure PlanThe following framework describes the technology infrastructure plan of the University of North Carolina at Greensboro (UNCG). As such, it is a continuously evolving document a

Add to Reading List

Source URL: its.uncg.edu

Language: English
429Outsourcing / Service-level agreement / Cloud infrastructure / IICCRD / Cloud computing security / Cloud computing / Centralized computing / Computing

AC Dublin - EU Guidelines on Cloud Computing Service Agreements, December 2014.indd

Add to Reading List

Source URL: www.arthurcox.com

Language: English - Date: 2014-12-23 06:14:21
430Internet / Akamai Technologies / Denial-of-service attack / Network architecture / Speedera Networks / Denial-of-service attacks / Prolexic Technologies / Computing

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Routed DDoS defense for protecting data center infrastructures against large, complex attacks Organizations increasingly interact with customers, employees and pa

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 11:24:01
UPDATE