cloud server security

Results 26 - 33 of 33Sort Results By: Published Date | Title | Company Name
Published By: VMware AirWatch     Published Date: May 18, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak.
Tags : 
data management, business practices, data center. data application, enterprise applications, security, best practices, business intelligence, business management
    
VMware AirWatch
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we will look at factors favoring cloud and SaaS solutions in general, reasons why secure web gateways in the cloud can provide better security than appliances and local servers, and how the Webroot Web Security Service can maximize security and minimize costs using a cloud-based architecture.
Tags : 
web threat, security, could, saas solutions, webroot, knowledge management, data center
    
Webroot Inc
Published By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
    
VMware
Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. Data is suddenly everywhere, and so are the number of people, access points and administrators who can control or worse, copy the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager, networking, it management, wireless, knowledge management, enterprise applications, access control, phishing, software compliance, cloud computing
    
Bitium
Published By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
aberddeen, data center, datacenter, cloud, server security, networking, data management
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center, virtual datacenter, security, data center
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : 
server security, virtual server security, cloud server security, data center server security, security, data management
    
Intel Security
Published By: IBM APAC     Published Date: Sep 30, 2019
Companies across the world are adopting a hybrid cloud environment as part of their digital transformation initiative. They need a platform that provides the elasticity and automatic provisioning of the public cloud with the economic viability of the private cloud. IBMs LinuxONE is an enterprise-grade Linux server with a unique architecture designed to meet the needs of a vast range of enterprise computing workloads within a multi-cloud environment. Here are just a few reasons why you should consider LinuxONE: Differentiating your cloud services Reduced costs Security everywhere Download the e-book for more details.
Tags : 
    
IBM APAC
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.