Cloud computing security

Results: 3057



#Item
431Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

Add to Reading List

Source URL: it.akamai.com

Language: English - Date: 2013-10-01 04:06:01
432Web hosting / Data privacy / Concurrent computing / Cloud storage / Data center / Data management / Payment Card Industry Data Security Standard / Dedicated hosting service / Health Insurance Portability and Accountability Act / Computing / Internet hosting / Internet

Managed Hosting Services YourCause has hosted the CSRconnect employee engagement platform with the same managed service provider, ViaWest, sinceThe partnership provides a solid foundation for YourCause’s archit

Add to Reading List

Source URL: www.csrconnect.me

Language: English - Date: 2014-01-20 14:52:21
433Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2013-10-01 04:06:01
434Software licenses / Tarus Balog / DevOps / OpenNMS / GitHub / Open-source software / Red Hat / Apache Hadoop / Free software / Computing / Software / Cloud computing

WHY ATTEND POSSCON 2015? For Front-End and Back-End Developers, DevOps and Cloud specialists, Operations specialists (Engineers, Architects, Scientists, Database & Sys Admins), Security specialists, those in the educatio

Add to Reading List

Source URL: posscon.org

Language: English - Date: 2015-03-16 09:32:29
435Centralized computing / Consumerization / Cloud computing / Android / Mobile operating system / Trend Micro / Internet privacy / Computing / Smartphones / Software

12 SECURITY PREDICTIONS FOR 2012 This time every year, I sit down with my research teams and we talk about what we think the coming year will hold in terms of threats to our customers. It’s an important discussion th

Add to Reading List

Source URL: it.trendmicro.com

Language: English - Date: 2012-08-08 07:07:46
436Data security / Computer network security / Crime prevention / National security / Information security / Government procurement in the United States / NIST Special Publication 800-53 / Cloud computing security / Security controls / Computer security / Security / Computing

FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal agency’s Office o

Add to Reading List

Source URL: gsa.gov

Language: English - Date: 2012-06-27 13:54:31
437Data management / Electronic commerce / Cloud storage / Data security / Data center / Backup / Payment Card Industry Data Security Standard / Computer security / Cloud computing security / Computing / Cloud computing / Centralized computing

Solution Brief Why Cloud Computing Makes Sense for Nonprofits If you are like most nonprofits, you are experiencing increased pressure, oversight, and demand for transparency from all sides. Whether your focus is governm

Add to Reading List

Source URL: www.brittenford.com

Language: English - Date: 2013-07-19 13:20:39
438Data privacy / Payment systems / Computing / Business / Application firewall / Payment Card Industry Data Security Standard / Malware / Small business / SecurityMetrics / Computer security / Computer law / Credit cards

  The Company SiteLock is the global leader in small business website security, providing cloud-based technology and expert website repair services designed to keep online businesses safe. SiteLock’s affordable websi

Add to Reading List

Source URL: www.sitelock.com

Language: English - Date: 2013-07-25 17:37:02
439Cloud computing / Akamai Technologies / Content delivery network / Cloud storage / File sharing / Peercasting / Application firewall / Application security / Computing / Concurrent computing / Computer security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Client Reputation Client Reputation data is used to improve security decisions. Billions of IP addresses interact with the Akamai Intelligent Platform every month. The

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2015-04-08 06:50:03
440Internet / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Akamai Technologies / Network architecture / Prolexic Technologies / Denial-of-service attacks / Computing / Computer network security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona DDoS Defender DDoS defense to protect websites against the increasing scale, frequency, and sophistication of attacks As businesses and other organizations move incre

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2015-04-13 05:52:02
UPDATE