Cloud computing security

Results: 3057



#Item
121Cloud infrastructure / Cloud applications / Crime prevention / Cryptography / National security / Cloud computing / Shadow IT / Software as a service / Information security / Dropbox / Computer security / Cloud computing security

Thought Leadership Shining a light into Shadow IT The story of Corporate IT unsurprisingly mirrors the introduction of innovative and

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:05:28
122Cloud infrastructure / Cloud storage / CloudPassage / Computer security / Cloud computing / VMware / Orchestration / Provisioning / Data center / HP CloudSystem / HP Business Service Automation

SOLUTION BRIEF Automated Security and Compliance. Preserves the Agility of Your VMware Environments. SECURING YOUR VMWARE INFRASTRUCTURE

Add to Reading List

Source URL: 2hvcbhl545p46lgtq2nhxci9-wpengine.netdna-ssl.com

Language: English - Date: 2016-05-25 17:32:00
123Data management / Crime prevention / Cryptography / Information governance / National security / Information security / Computer security / Data steward / Information privacy / Data governance / Cloud computing security

Information Technology Procedures CCC Data Management Procedures – DCL3 Data Access Identifier: IT-PROC-AC-001

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2015-01-14 10:21:22
124Data management / Computer security / Information technology management / Data governance / Information technology governance / Cloud computing security / Enterprise data management / Cloud storage / Cloud computing / Data quality / Data defined storage / Data-centric security

Enterprise Strategy Group | Getting to the bigger truth.™ White Paper Meeting Data Governance Requirements Starts with Data Visibility

Add to Reading List

Source URL: www.egnyte.com

Language: English - Date: 2016-06-07 21:04:42
125Data security / Computer security / Information privacy / Privacy / Cloud computing / Internet privacy / International Safe Harbor Privacy Principles / Cloud computing security / Personal /  Inc. / Safe harbor / Information security

EEMA online October 2015 Issue 18 Dates for your diary 15 October Fireside Chat

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
126Mobile phones / Cloud infrastructure / Bring your own device / Mobile device management / Cloud computing

Security in an Age of Zero Trust Jon Oberheide CTO, Duo Security, Inc. Bad week for security :(

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:06
127Cloud infrastructure / Computer security / CloudPassage / Halo / Cloud computing / Oracle Exadata / CSC Version 6.0

SOLUTION BRIEF Your Cloud Servers Are Under Attack. How Can You Tell? Instant visibility & active security, anywhere, at any scale. THE VISIBILITY CHALLENGE

Add to Reading List

Source URL: 2hvcbhl545p46lgtq2nhxci9-wpengine.netdna-ssl.com

Language: English - Date: 2016-05-25 17:45:06
128Cloud computing / Cloud storage / Cloud infrastructure / Cloud computing security / Computer security / Cloud applications / Public-key cryptography / Encryption / Crypto cloud computing / Perspecsys

nternational Journal & Magazine of Engineering, Technology, Management and Research Volume 1, Issue 10, October

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:18
129Cloud infrastructure / Amazon Web Services / Amazon Virtual Private Cloud / Virtual private cloud / Amazon Elastic Compute Cloud / Amazon S3 / Amazon Relational Database Service / Amazon ElastiCache / Amazon.com / Cloud computing / Eucalyptus / AWS Lambda

Architecting for Genomic Data Security and Compliance in AWS Working with Controlled-Access Datasets from dbGaP, GWAS, and other Individual-Level Genomic Research Repositories Angel Pizarro

Add to Reading List

Source URL: d0.awsstatic.com

Language: English - Date: 2014-12-11 13:54:38
130Computer network security / Server appliance / Crime prevention / Cryptography / National security / Check Point / Cloud computing / Computer security / Check Point Integrity

Microsoft PowerPoint - R80_customer_deck_Feb2016 [Read-Only]

Add to Reading List

Source URL: www.cikom.com

Language: English - Date: 2016-04-14 07:06:08
UPDATE