Cloud Computing Security

Results: 3057



#Item
891Centralized computing / Data security / Data protection / Backup software / Cloud clients / Riverbed Technology / Cloud storage gateway / Backup / Rackspace Cloud / Cloud computing / Computing / Cloud storage

DATA SHEET OVERVIEW Thousands of organizations worldwide rely on Riverbed to extract more value from existing storage, application, and network investments. Key Whitewater Benefits

Add to Reading List

Source URL: www.datum.com.sg

Language: English - Date: 2012-05-22 05:53:18
892Ambient intelligence / Internet of Things / Cloud computing / Intel / SCADA / Data center / Gateway / VxWorks / Computing / Technology / Concurrent computing

SECURITY ISOLATION GATEWAY ENABLES TRULY CONTROLLABLE IOT ENVIRONMENT RocKontrol RK-EMSG Series Security Isolation Gateway Whitebook: A Truly Controllable IoT Environment Based on Intel Atom Processor INNOVATORS START H

Add to Reading List

Source URL: windriver.com

Language: English - Date: 2015-02-27 13:07:17
893Cloud computing / Akamai Technologies / Content delivery network / Cloud storage / File sharing / Peercasting / Application firewall / Application security / Computing / Concurrent computing / Computer security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Client Reputation Client Reputation data is used to improve security decisions. Billions of IP addresses interact with the Akamai Intelligent Platform every month. The

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-04-08 06:50:03
894National Audit Office / Data Protection Act / Risk / Law / Computing / Cloud computing security / Information security audit / Auditing / Audit / Information technology audit

Statement on the Management of Personal Data at the NAO 1. The C&AG and the National Audit Office have privileged and wide-ranging access to data and information to support the discharge of the audit function and ensure

Add to Reading List

Source URL: www.nao.org.uk

Language: English - Date: 2015-03-27 05:53:32
895Cloud infrastructure / Web hosting / Computer network security / Virtual private server / Hyper-V / Hypervisor / Orchestration / IBM cloud computing / OnApp / Cloud computing / System software / Computing

your cloud simplified Flexiant Cloud Orchestrator with Parallels Cloud Server Industry leading container virtualization from Parallels Cloud Server, now available for Flexiant Cloud

Add to Reading List

Source URL: learn.flexiant.com

Language: English - Date: 2014-06-03 11:38:11
896Computer network security / Trend Micro / Cloud clients / Pinterest / Internet privacy / Windows Vista / Google Chrome / System requirements / Social networking service / Software / Computing / Antivirus software

Trend Micro™ Titanium™ Internet Security Relax. We make it easy to safeguard your digital life Trend Micro™ Titanium™ Internet Security is strong, easy to use protection for what you and your family do online ev

Add to Reading List

Source URL: www.trendmicro.co.uk

Language: English - Date: 2012-09-06 05:28:20
897Trend Micro Internet Security / Trend Micro / Web portal / Cloud computing / Centralized computing / Cloud infrastructure

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or th

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2015-02-11 17:22:23
898Identity / Identity management / Cloud standards / Web services / Internet protocols / OpenID / Information Card / Security Assertion Markup Language / Windows CardSpace / Federated identity / Computing / Computer security

www.interentidentityworkshop.com Book of Proceedings http://iiw.idcommons.net/Notes_iiw9 Complied by Heidi Nobantu Saul

Add to Reading List

Source URL: iiw.idcommons.net

Language: English - Date: 2009-12-10 04:45:05
899Security / System software / Computer security / Two-factor authentication / MokaFive / Cloud computing / Tamper resistance / Data security / Encryption / Cryptography / Computer network security / Computing

Security DATASHEET Centralized Control – Distributed Trust Only Moka5 delivers:

Add to Reading List

Source URL: www.moka5.com

Language: English - Date: 2013-06-02 20:20:41
900Computer security / Denial-of-service attack / Internet Relay Chat / Internet security / Computing / Internet activism / Prolexic Technologies / Blue Frog / Computer network security / Denial-of-service attacks / Cyberwarfare

Cloud DDoS Protection Cloud DDoS Protection The internet revolution Most successful organisations have at least a basic web presence, and the most successful ones acknowledge that the internet is a key source of busine

Add to Reading List

Source URL: www.iomart.com

Language: English - Date: 2014-10-24 09:23:53
UPDATE