Cloud Computing Security

Results: 3057



#Item
441Cloud storage / Password / Computer security / Data center / Rackspace Cloud / Password manager / Cloud computing / Computing / Concurrent computing

TECH SUPPORT BY JAREN LYKINS Get Off of My Cloud Before moving data to the cloud, it’s important to follow proper security measures to protect sensitive information.

Add to Reading List

Source URL: www.denebsoftware.com

Language: English - Date: 2013-03-14 13:30:00
442Public safety / Birla Institute of Technology and Science / Computer security / Information security / Institute of Electrical and Electronics Engineers / Security engineering / Cloud computing / Knowledge management / Pilani / Security / Crime prevention / National security

CALL FOR PAPERS A Special Issue on Secure Knowledge Management in Big-data era Information is increasingly becoming important in our daily lives. We have become information dependents of the twenty-first century, living

Add to Reading List

Source URL: www.som.buffalo.edu

Language: English - Date: 2014-06-30 22:56:35
443Unified threat management / Security appliance / Check Point / Deep packet inspection / Network security / Cloud computing / Internet security / Computer network security / Computing / Cyberoam

Cyberoam Whitepaper on Next Generation UTMs for SOHO-SMB--Wire-Speed Security

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2014-07-02 05:46:11
444Cloud storage / Software / Remote backup service / Backup / Online backup services / Computer data / Data loss / Data center / Uranium Backup / Computing / Backup software / Data security

White Paper: Data Backup By: Doug Zbikowski Ensure Data Security with Online Backup Reasons to Secure your Data

Add to Reading List

Source URL: www.toast.net

Language: English - Date: 2012-10-29 11:37:06
445Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
446System administration / Data security / Splunk / Cloud infrastructure / Amazon.com / Software as a service / Chef / Amazon Elastic Compute Cloud / Continuous integration / Cloud computing / Computing / Centralized computing

CASE STUDY : Opscode + Splunk CLOUD RULE #536: There’s no such thing as being ‘too agile.’

Add to Reading List

Source URL: www.chef.io

Language: English - Date: 2015-05-29 14:56:43
447Privacy / Internet privacy / Ubiquitous computing / Cloud computing / Information privacy / Privacy Office of the U.S. Department of Homeland Security / Ethics / Identity management / Law

PRIVACY THREATS IN UBIQUITOUS COMPUTING (PTUC) 1st International Workshop on Privacy Threats in Ubiquitous Computing In Conjunction with the 12th IEEE International Conference on Ubiquitous Intelligence and Computing (U

Add to Reading List

Source URL: www.cybermatics.org

Language: English
448Content delivery network / Internet / Cloud computing / Computing / Akamai Technologies

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Site Shield Defends the origin by cloaking web infrastructure and reducing vulnerability Everyone connected to an enterprise – customers, employees and partners – expe

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 11:30:01
449Data security / Computer network security / Crime prevention / National security / Information security / Federal Information Security Management Act / Vulnerability / Cloud computing security / Managed security service / Computer security / Security / Cyberwarfare

Information Security Challenges www.KahnConsultingInc.com Evaluation: Meridio

Add to Reading List

Source URL: www.kahnconsultinginc.com

Language: English - Date: 2007-09-05 16:18:00
450Identity management / API Management / Security / Cloud computing / Access control / Cloud API / BONDI / Application programming interfaces / Computing / Software

Solution Brief Access Management for Mobile, Cloud and Partner APIs  ViewDS Identity Solutions, August 2014

Add to Reading List

Source URL: viewds.com

Language: English - Date: 2015-03-12 01:00:22
UPDATE