Cloud Computing Security

Results: 3057



#Item
661Cloud applications / Google Chrome / Google Apps / Computer security / Google / Internet privacy / Information security / Cloud computing / Computing / Centralized computing

5 myths about security in the cloud Four million businesses are already using Google Apps for Business. It’s helping them be more productive, improve teamwork and reduce costs. But some business owners still have conce

Add to Reading List

Source URL: static.ziftsolutions.com

Language: English - Date: 2013-05-02 10:20:05
662Anti-spam / Spam filtering / Computer network security / Deep packet inspection / Computer networking / Barracuda Networks / Microsoft Forefront Threat Management Gateway / Computer appliance / Cloud computing / Computing / System software / Computer security

Protection for Web users inside and beyond the corporate perimeter with unified policy management and reporting Web security is today’s must-address issue. It is difficult to safeguard all Web users from phishing, mali

Add to Reading List

Source URL: www.cpatechnology.net

Language: English - Date: 2015-04-03 10:08:37
663Computer network security / Data management / Anti-spam / Spam filtering / Barracuda Networks / Application firewall / Load balancing / Data security / Data center / Computing / System software / Email

Protecting Customer Data in the Cloud Data security and availability are key concerns for risk management and compliance when cloud-service providers manage customers’ data. Barracuda Networks provides cloud-based ser

Add to Reading List

Source URL: www.cpatechnology.net

Language: English - Date: 2015-04-03 10:08:11
664Computer security / Data security / Computing / Science / Information security / Document management system / Software development process / ISO 14000 / Cloud computing / Information technology management / Quality / Security

Quality, OHS, Environmental Management. Faster. Better. Smarter. In this economic climate, it’s more important than ever to manage compliance and risk efficiently and cost-effectively. Unfortunately, many organizations

Add to Reading List

Source URL: www.qudos-software.com

Language: English - Date: 2014-05-14 23:42:33
665Virtual machines / Hypervisor / VM / Hyper-V / Virtual appliance / Xen / Hardware virtualization / Comparison of platform virtual machines / System software / Software / VMware

Securing Your Web World Cost-effective Virtualization & Cloud Security Safer Consolidation, Reduced Costs Virtualization and cloud computing can help your organization achieve significant datacenter savings in hardware

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2011-09-14 02:37:39
666Cloud storage / Computer network security / Web hosting / Dedicated hosting service / Authenticator / Amazon.com / Computer security / Data center / Internet hosting service / Computing / Cloud computing / Concurrent computing

FMCS SECURE HOSTING GUIDE September 2014 SHG-MNL-v2.0 CONTENTS INTRODUCTION.................................................................................................................................4

Add to Reading List

Source URL: www.torquesoftware.com.au

Language: English - Date: 2015-04-14 21:22:55
667Cloud storage / Computer network security / Web hosting / Dedicated hosting service / Authenticator / Amazon.com / Computer security / Data center / Internet hosting service / Computing / Cloud computing / Concurrent computing

FMCS SECURE HOSTING GUIDE September 2014 SHG-MNL-v2.0 CONTENTS INTRODUCTION.................................................................................................................................4

Add to Reading List

Source URL: www.torquesoftware.com.au

Language: English - Date: 2015-04-14 21:23:02
668Online backup services / Data synchronization / File hosting / Cloud storage / Egnyte / Software / Computing / Cloud computing

Media Alert: Egnyte Showcases Secure File Services at Oktane 2014 Egnyte Co-Founder Rajesh Ram to Discuss Cloud Security for Enterprises on Wednesday, November 12 MOUNTAIN  VIEW,  Calif.,  November  10,  2

Add to Reading List

Source URL: www.egnyte.com

Language: English - Date: 2014-11-10 09:05:59
669Online backup services / Data synchronization / File hosting / Cloud storage / Egnyte / Computer network security / Malware / Computer security / Software / Computing / Cloud computing

Egnyte’s  2014  Security  Roadmap  Raises  Global  Standard  for  Secure  File  Sharing     New  CSO  Unveils  Comprehensive  Security  Plans  Mapping   Next

Add to Reading List

Source URL: www.egnyte.com

Language: English - Date: 2014-02-25 09:03:36
670Data security / Data management / Computer security / Enterprise application integration / Enterprise content management / Data center / Cloud computing / Backup / Database / Computing / Information technology management / Concurrent computing

2012 Ten Security and Reliability Questions to Address Before Implementing ECM Whether you outsource your information management with cloud Enterprise Content Management (ECM) or you handle data storage in-house with an

Add to Reading List

Source URL: www.digitechsystems.com

Language: English - Date: 2015-02-25 12:59:37
UPDATE