Cloud computing security

Results: 3057



#Item
371Computer security / Identity management / Cloud standards / Information Card / OpenID / Digital identity / Liberty Alliance / OAuth / Online identity / Computing / Identity / Federated identity

Book of Proceedings www.internetidentityworkshop.com Collected & Compiled by KAS NETLER, HEIDI N SAUL AND BARBARA BYERS Notes in this book can also be found online at

Add to Reading List

Source URL: www.internetidentityworkshop.com

Language: English - Date: 2015-05-20 16:35:11
372Debian / Validation / Computer architecture / Cloud computing / Software / Free software

    FedRAMP Compliance All Federal agencies must use the FedRAMP process for doing security assessments, authorizations, and continuous monitoring of cloud services. Agencies must validate

Add to Reading List

Source URL: www.fedramp.gov

Language: English - Date: 2015-05-21 14:42:28
373Security / Computing / Internet privacy / Cloud computing / Insurance / Computer security / Bring your own device / Technology / Financial institutions / Institutional investors

Cyber Realities: Where We Are Now Issue No. 1 The following is the first in a series of articles addressing cyber, privacy

Add to Reading List

Source URL: www.alliant.com

Language: English - Date: 2013-10-14 13:14:51
374Database management systems / Backup / Computing / Cloud computing / Metadata / Database / Hitachi Data Systems / Data security / Information / Data

OBJECT ORIENTED STORAGE / Page 1 OBJECT ORIENTED STORAGE Businesses today are under immense pressure to effectively manage mountains of data while reducing storage costs and enabling continuous access to the data. The N

Add to Reading List

Source URL: www.nyi.net

Language: English - Date: 2013-06-06 10:11:26
375Computer network security / Virtual private server / Web hosting / Parallels Desktop for Mac / Cloud infrastructure / Hyper-V / Cloud storage / Parallels /  Inc. / System software / Software / Cloud computing

Parallels Cloud Server ® Service Provider Success Story Digistar addresses rigorous performance and stability requirements with

Add to Reading List

Source URL: www.odin.com

Language: English - Date: 2014-02-17 19:50:43
376Windows Server / Computer network security / Hyper-V / Microsoft SQL Server / Virtual private network / System software / Software / Computing

KDDI Cloud Platform Service NO TIME to manage our systems! Need a system

Add to Reading List

Source URL: www.kddia.com

Language: English - Date: 2013-09-23 13:57:52
377Software / Technology / Digital video recorder / Android / IPhone / Smartphones / Cloud clients / Computing

In a world that faces security challenges every day, protecting people, property, and possessions is critical. TEC combines the quality and reliability of our products to create a powerful security solution that gives yo

Add to Reading List

Source URL: www.tec.com

Language: English - Date: 2013-06-25 15:26:37
378Web services / Amazon Web Services / Amazon Elastic Compute Cloud / Amazon Simple Queue Service / Amazon.com / Amazon S3 / Amazon Relational Database Service / Amazon SimpleDB / Amazon Virtual Private Cloud / Cloud computing / Computing / Centralized computing

Amazon Web Services Overview of Security Processes Amazon Web Services: Overview of Security Processes MayPlease consult http://aws.amazon.com/security for the latest version of this paper)

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2012-06-11 19:13:26
379EMC Corporation / VMware / Converged infrastructure / Cloud infrastructure / Cloud storage / EMC Symmetrix / Cloud computing / Computing / Centralized computing

EMC GLOBAL SERVICES Accelerating the software-defined enterprise Massive technology change, data growth, and security threats are driving IT ESSENTIALS Accelerate the software-defined

Add to Reading List

Source URL: thailand.emc.com

Language: English
380Center for Advanced Security Research Darmstadt / Technische Universität Darmstadt / Crime prevention / National security / Darmstadt / Cloud computing / Fraunhofer Society / German Academy of Science and Engineering / Vulnerability / Security / Computing / Computer security

Entwicklung sicherer Software durch Security by Design

Add to Reading List

Source URL: www.cased.de

Language: English - Date: 2015-04-22 04:39:27
UPDATE