Cloud Computing Security

Results: 3057



#Item
571Computer security / Identity management / Identity management systems / Cloud standards / HTTP / Security Assertion Markup Language / OAuth / HTTP Secure / SAML 1.1 / Computing / Cryptographic protocols / Security

PDF Document

Add to Reading List

Source URL: www.tuxed.net

Language: English - Date: 2015-04-05 14:21:35
572Cloud infrastructure / Computer security / Performance management / System administration / IBM cloud computing / Kaavo / Cloud computing / Centralized computing / Azure Services Platform

CLOUD How can enterprises assess & identify applications most suitable for the cloud Today, enterprises are evaluating various Cloud platforms available in the market to optimize their business processes and maximize th

Add to Reading List

Source URL: www.persistent.com

Language: English - Date: 2015-01-29 00:10:52
573Internet / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Akamai Technologies / Network architecture / Prolexic Technologies / Denial-of-service attacks / Computing / Computer network security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona DDoS Defender DDoS defense to protect websites against the increasing scale, frequency, and sophistication of attacks As businesses and other organizations move incre

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-04-13 05:52:02
574BitDefender / Virtualization / Cloud computing / Antivirus software / Software / Computing

TESTIMONIAL PARTNER ADVANTAGE NETWORK Security for Virtualized Environments (SVE) allows the client to maximize their budget, and take advantage of their investments.

Add to Reading List

Source URL: download.bitdefender.com

Language: English - Date: 2014-04-25 04:14:53
575Security / Defacement / Zone-H / Website defacement / Hacktivism / Computer security / Cloud computing / Computer insecurity / Cyberwarfare / Hacking / Computing / Technology

Foresight Launches Defacement Mitigatorfor Cyber-Security Protection Solution Rapidly Addresses Online “Hacktivism” LONDON–April 29, 2014–Foresight today released Defacement Mitigator, the first cloud-based web s

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2014-09-01 03:57:57
576Holism / Synergy / Cloud computing

REGULATED INFORMATION 17 July 2012 ECONOCOM ENHANCES ITS EXPERTISE IN THE IT SECURITY SECTOR Econocom signs an agreement to acquire Cap Synergy, a French systems integrator specialising in network and IT system security

Add to Reading List

Source URL: www.econocom.com

Language: English - Date: 2012-07-17 12:00:20
577Iridium Communications / Computing / Broadband Global Area Network / Computer security / IronKey / Internet / Cloud computing / Data security / Technology / Digital media / Computer network security

As a proud sponsor of the SAMI Citadel Symposium we enclose a brief overview of the various systems we showcased at the event. Firstly, the Gryphon Counter Piracy system. We have two versions of these available – stand

Add to Reading List

Source URL: www.seasecurity.org

Language: English - Date: 2012-09-13 05:34:32
578Computer security / Federated identity / OpenID / OAuth / Login / Authentication / Security / Cloud standards / Computing

OpenID Connect Conformance Profiles OpenID Connect Working Group, OpenID Foundation February 17, Introduction This document defines a set of profiles of the OpenID Connect specifications to be used for certifying

Add to Reading List

Source URL: openid.net

Language: English - Date: 2015-02-18 01:53:55
579Computer security / Cloud computing security / Data privacy / Cloud storage / Health Insurance Portability and Accountability Act / Data center / Information security / IBM cloud computing / Carrier cloud / Computing / Cloud computing / Centralized computing

Overview CODE42 TRUST, SECURITY AND COMPLIANCE Code42 is predicated on two beliefs: first, we believe our customers should benefit from cloud solutions without compromising their data security, regulatory or privacy req

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-04-24 23:50:07
580Computer security / Security / Backup software / Data synchronization / File hosting / Vormetric / Remote backup service / Computing / Cloud computing / Backup

COLLECT, CONTROL AND MANAGE ENDPOINT DATA CrashPlan backs up everyone, everywhere across the enterprise CrashPlan’s automatic, continuous data protection preserves every version of every file forever with no disruption

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2015-04-26 11:25:04
UPDATE