Cloud Computing Security

Results: 3057



#Item
681Email / Spam filtering / Web application / World Wide Web / Internet security / Internet / M86 Security / Proofpoint /  Inc. / Computing / Cloud computing / Computer network security

Cloud Web Security Spamina Web Security a Cloud-based Internet filtering and Web 2.0 Security service. Spamina provides your organization with a safe and secure Internet connection, free from threats and malware, while e

Add to Reading List

Source URL: www.avkitalia.it

Language: English - Date: 2014-06-19 12:19:59
682Computer security / Akamai Technologies / Content delivery network / Computer network security / Cloud storage / Application security / Cloud computing security / Computing / Concurrent computing / Distributed computing

AKAMAI SERVICE AND SUPPORT: PRODUCT BRIEF Managed Kona Site Defender Service An Akamai Security Services Solution To be successful in today’s hyperconnected world, enterprises need to operate and innovate without fea

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-03-30 05:06:01
683Computer security / Software / OAuth / Identity management / Identity management systems / OpenID / Play Framework / Distributed social network / Computing / Cloud standards / Federated identity

Book Reviews most important question when studying STAs in virtual environments is whether a particular player is capable of transitioning from a virtual space to the real world. Although some of the essays in Vice

Add to Reading List

Source URL: www.journalofplay.org

Language: English - Date: 2014-06-25 10:30:26
684Computer security / Software / OAuth / Identity management / Identity management systems / OpenID / Play Framework / Distributed social network / Computing / Cloud standards / Federated identity

Venn technology decision tree   The HEART WG is mainly about profiling three technologies: OAuth, OpenID Connect, and  UMA. OAuth is a “base” technology. OpenID Connect is built on top of O

Add to Reading List

Source URL: openid.net

Language: English - Date: 2015-03-21 15:09:12
685Public safety / Standards organizations / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / United States Department of Homeland Security / Cloud computing / Computer network security / Security / Computer crimes

Update on the Cybersecurity Framework July 31, 2014 The Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”) was issued on February 12, 2014, as directed by the President in Executive Order

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-07-31 16:13:52
686Secure communication / Internet / Data / Internet protocols / Internet standards / Transport Layer Security / Security Assertion Markup Language / Password / SAML 2.0 / Computing / Teleconferencing / Cryptographic protocols

Zoom Security White Paper May 2013 Zoom offers the first Unified Meeting Experience (UMX), a cloud service that provides a 3-in-1 meeting platform with HD video conferencing, mobility and web meetings. UMX also offers th

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-04-13 09:04:08
687Hadoop / Computer network security / Software / Key management / Apache Hadoop / Kerberos / Cloudera / Windows Server / Key distribution center / Computing / Cloud computing / Cloud infrastructure / Apache Hadoop / Kerberos / Cloudera / Windows Server / Key distribution center / Computing / Cloud computing / Cloud infrastructure

CDH4 Security Guide Cloudera, Inc. 220 Portage Avenue Palo Alto, CA 94306

Add to Reading List

Source URL: www.cloudera.com

Language: English - Date: 2015-04-18 06:47:15
688Computer network security / Computing / JumpStart / Threat / Computer security / Cyberwarfare / FireEye /  Inc.

SERVICE OVERVIEW FireEye Threat Analytics Platform (TAP) JumpStart FireEye Cloud Security Consulting

Add to Reading List

Source URL: www.fireeye.fr

Language: English - Date: 2015-04-30 14:59:54
689Technology / Security / Information security / Cloud computing / Provisioning / Email / Computing / Queensland University of Technology

Information Technology Services Quarterly Report Quarter 2, 2014 Departmental Report – Information Technology Services

Add to Reading List

Source URL: www.tils.qut.edu.au

Language: English - Date: 2014-07-25 03:21:34
690Technology / Cloud computing / Broadband / Software as a service / Software distribution / Routing / Internet / Zscaler / Unified threat management / Computing / Centralized computing / Computer network security

zscaler-heritage-crystal-clean-environment-casestudy-2013

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:26
UPDATE