Cloud Computing Security

Results: 3057



#Item
821Cloud infrastructure / Cloud storage / Iland / Computer security / Cloud computing security / IICCRD / Cloud computing / Centralized computing / Computing

The Impact of Data Sovereignty on Cloud Computing in Asia Summary Report Copyright Asia Cloud Computing Association 2013

Add to Reading List

Source URL: asiacloudcomputing.org

Language: English - Date: 2014-03-12 10:09:19
822Cloud computing / Computer security / Formal sciences / Database management systems / Database theory / Cloud computing security / Data mining / Big data / Database / Computing / Centralized computing / Technology

Top Ten Big Data Security and Privacy Challenges November 2012 CLOUD SECURITY ALLIANCE Top Ten Big Data Security and Privacy Challenges

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2013-06-18 17:02:30
823Computer network security / Internet protocols / Federated identity / Single sign-on / Security token / Secure Shell / Integrated Windows Authentication / Stonesoft Corporation / Virtual private network / Computer security / Computing / Security

a2cloud Solution for secured authentication and access to cloud Whitepaper Combining Modern Authentication Needs

Add to Reading List

Source URL: www.link-connect.com

Language: English - Date: 2013-07-15 09:30:37
824Data security / Computing / Information / Interoute / Wireless security / Cloud computing

USER CASE REDEFINING SECURITY Sterci Cloud Services IDQ partners with Interoute to secure backbone link 1G Ethernet Encryption

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
825Concurrent computing / Communication / Information technology / Information and communications technology / Cloud computing / National Telecommunications and Information Administration / Data center / Data mining / Cisco Systems / Computing / Technology / Data management

Spring 2013 Industry Study Final Report Information and Communications Technology (ICT) The Dwight D. Eisenhower School for National Security and Resource Strategy

Add to Reading List

Source URL: es.ndu.edu

Language: English - Date: 2015-02-25 09:58:55
826Cloud computing security / Software as a service / Dropbox / IBM cloud computing / Cloud communications / Cloud computing / Computing / Centralized computing

Shadow IT: data protection and cloud security George Crump November 17, 2014 This report is underwritten by CipherCloud.

Add to Reading List

Source URL: www.continuitycentral.com

Language: English - Date: 2015-04-20 17:26:41
827Formal sciences / Data management / Cloud computing / Business intelligence / Cloud computing security / Computer security / Big data / Analytics / Data center / Computing / Technology / Concurrent computing

Enabling Cloud Analytics with Data-Level Security

Add to Reading List

Source URL: mena.boozallen.com

Language: English - Date: 2015-04-28 01:20:53
828Cloud infrastructure / Cloud storage / Iland / Web hosting / Cloud computing security / IICCRD / Cloud computing / Centralized computing / Computing

The Impact of Data Sovereignty on Cloud Computing in Asia

Add to Reading List

Source URL: asiacloudcomputing.org

Language: English - Date: 2015-03-20 04:33:24
829Computer security / Crime prevention / National security / Software testing / IBM cloud computing / Integrated Cloud Service Management / Cloud computing / Centralized computing / Computing

Microsoft Word - Trend Micro Paper 2 draft_Final_AM

Add to Reading List

Source URL: www.trendmicro.co.nz

Language: English - Date: 2014-12-18 20:01:57
830Cloud computing / Websense / Collaboration / Data synchronization / Computer network security / IBM cloud computing / Cloud collaboration / Centralized computing / Computing / ScanSafe

anon-global-auto-parts-casestudy

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:26
UPDATE