Cloud computing security

Results: 3057



#Item
381Computer security / Electronic commerce / Application firewall / DMZ / Software testing / DevOps / Cloud computing / Application security / Web application security / Computer network security / Computing / Cyberwarfare

Guarding Your Web Systems CLOUD-DMZ ™ Web APPLICATION Security A NEW, CLOUD-BASED ARCHITECTURE

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2015-05-19 11:36:28
382Computer security / Kaavo / IBM cloud computing / Cloud computing / Centralized computing / Cloud infrastructure

DATA SHEET CloudCenter ™

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-02-24 12:04:40
383Cloud storage / Cloud infrastructure / Computer security / ICloud / Cloud communications / IICCRD / Cloud computing / Centralized computing / Computing

Success or Failure: Choosing the right cloud can make all the difference Recent news that nearly 100 celebrities’ iCloud accounts were hacked has placed technology issues and information security concerns at the top of

Add to Reading List

Source URL: www.bankonitusa.com

Language: English - Date: 2014-09-14 21:28:36
384Security / Data / Identity management / Security Assertion Markup Language / Password / HTTP Secure / Computing / Cryptographic protocols / Secure communication

Security  Guide,  April  2015           Zoom  is  a  cloud  service  that  provides  a  3-­‐in-­‐1  meeting  platform  with  HD  video  conferencing

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-05-26 03:48:05
385Cloud storage / File hosting / Data security / Web services / Backup / Amazon S3 / Public-key cryptography / Key management / Database / Computing / Network file systems / Cloud computing

FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang† , Patrick P. C. Lee† , John C. S. Lui† , and Radia Perlman‡ † The Chinese University of Hong Kong ‡ Intel Labs

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2010-10-18 05:22:07
386Computer security / Data loss prevention software / Data security / Mobile device management / Cloud computing / Data theft / Check Point / Security / Computer network security / Computing

For immediate release Endpoint Protector 4 by CoSoSys receives Common Criteria Certification Endpoint Protector 4 DLP capabilities are in the highlight achieving Common Criteria EAL2 Certification

Add to Reading List

Source URL: www.endpointprotector.com

Language: English - Date: 2014-11-13 04:26:00
387Security / Application security / Application firewall / Penetration test / Hacker / Cloud computing / Web application security scanner / Computing / Computer security / Computer network security

5 reasons hackers love your application security strategy February

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:13
388Backup software / Computer data / Data management / Cloud storage / Backup / Data security / Remote backup service / Microsoft Exchange Server / Continuous data protection / Computing / Data / Information

Online Backup and Disaster Recovery Services Provided by Allteks Allteks IT Services Ltd

Add to Reading List

Source URL: www.allteks.co.uk

Language: English - Date: 2015-03-25 07:39:03
389Computing / Cloud computing / Interoperability / Data management / Computer security / Risk analysis / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

Microsoft Word - M0393_v1_3613775223

Add to Reading List

Source URL: bigdatawg.nist.gov

Language: English - Date: 2015-04-26 21:21:00
390Software as a service / Platform as a service / Hybrid cloud / IBM cloud computing / Cloud communications / Cloud computing / Centralized computing / Computing

CXO Insight Cloud Adoption Rate Hike Spurs Demand for Security Professionals By Julie Peeler, Foundation Director, (ISC)²

Add to Reading List

Source URL: www.isc2cares.org

Language: English - Date: 2015-05-13 17:45:22
UPDATE