Below you will find reports with the tag of “Cloud” 6 Key Use Cases For Securing Your Organizations Cloud Workloads This ebook lays out several examples of how to effectively secure your cloud workloads. Added: October 22, 2018 7 Best Practices For Cybersecurity This is a helpful little report that simplifies the best practices for Cybersecurity. Added: October 22, 2018 AWS vs. Azure vs. Google: 10 Ways To Choose The Right DataCloud Center For You This is an e-Book that provides 10 ways to pick the right datacloud center. Added: October 22, 2018 Cloud Adoption and Risk Report 2016 Q4 In this report, we detail the types of sensitive data stored in cloud services, how that data is shared within organizations and with third parties, and how risky employee behavior can expose data. We also examine the external threats that use the cloud to exfifiltrate sensitive data pilfered from on-premises systems as well as attacks directed at sensitive data stored in cloud services. Finally, we cover general usage trends including the top most widely used cloud services. (more available) Added: October 22, 2018 Cyber Insurance Survey 2014 This report is laid out as follows: Section I focuses on the current prevalence of cyber security insurance and the policy forms it takes. Section II discusses the current structure of the cyber security market. Section III investigates perceptions of the significance, risks, and challenges of cyber security insurance. Section IV details responding company demographics. Section V describes demographic characteristics of the respondents. (more available) Added: October 22, 2018 Demand More From Your Enterprise CDN This e-book takes a look at what a good CDN should do. Added: October 22, 2018 Five Phishing Predictions 2018 This report offers some significant predictions of phishing attacks in 2018. Added: October 22, 2018 GDPR An Action Plan For Cloud Readiness This E-Book discusses ways to become GDPR Compliant. Added: October 22, 2018 Has The Enforcer Become The Enabler? This paper talks about what the next evolution of Data Loss Prevention technology means for business collaboration and productivity. Added: October 22, 2018 Heads In The Cloud: Misconceptions Hindering Enterpise Cloud Adoption Almost all (99%) surveyed ITDMs say that there is or was at least one driver for their organization moving to the cloud. But for all the exuberance surrounding cloud and SaaS, the majority (94 percent) of ITDMs interviewed have or have had at least one concern about their organization moving to the cloud, the most common being data privacy (61 percent). (more available) Added: October 22, 2018 Internet of Things Security Considerations In A MultiCloud Environment Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration. (more available) Added: October 22, 2018 Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey This is a brief playbook that gives a plan for how to get started with cloud security. Added: October 22, 2018 Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry Though the mobile phone has overtaken society, some industries still rely on the old pager technology. This paper takes a look at the security risks that come with using that old technology. (more available) Added: October 22, 2018 Practitioner’s Guide to Building a Security Operations Center (SOC) This white paper goes into detail about what is needed to build and maintain an SOC, the types of technologies and skillsets required, and advantages of an all-in-one security monitoring platform. (more available) Added: October 22, 2018 Privileged Access Security For Dummies This is a handy and simple guide for helping individuals understand and implement Privileged Access Security. Added: October 22, 2018 Report Summary: Network Management Megatrends 2016 This is the fourth megatrends study. For this latest version, they have carried forward a number of ongoing questions and threads that are designed to track how the network management landscape is changing over time. They’ve also included many new questions and queries intended to help us characterize and quantify the very latest technology trends. In particular, new questions were added in this report to begin assessing whether hybrid clouds, advanced analytics, and/or the Internet of Things were having an impact on network management tools and practices. (more available) Added: October 22, 2018 The Five Steps To Managing Third Party Risk This white paper tackles the subject of how outsourced labor can cause cybersecurity risk. Added: October 22, 2018 The Security Provisions OF GDPR The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice. (more available) Added: October 22, 2018 Unlocking B2B SaaS Growth With Identity Management SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue. (more available) Added: October 22, 2018 Virtualization's Hidden Traps This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany. (more available) Added: October 22, 2018 2017 Cloud Security Report This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others. (more available) Added: October 21, 2018 «« « 25 26 27 28 29 » »»
6 Key Use Cases For Securing Your Organizations Cloud Workloads This ebook lays out several examples of how to effectively secure your cloud workloads. Added: October 22, 2018
7 Best Practices For Cybersecurity This is a helpful little report that simplifies the best practices for Cybersecurity. Added: October 22, 2018
AWS vs. Azure vs. Google: 10 Ways To Choose The Right DataCloud Center For You This is an e-Book that provides 10 ways to pick the right datacloud center. Added: October 22, 2018
Cloud Adoption and Risk Report 2016 Q4 In this report, we detail the types of sensitive data stored in cloud services, how that data is shared within organizations and with third parties, and how risky employee behavior can expose data. We also examine the external threats that use the cloud to exfifiltrate sensitive data pilfered from on-premises systems as well as attacks directed at sensitive data stored in cloud services. Finally, we cover general usage trends including the top most widely used cloud services. (more available) Added: October 22, 2018
Cyber Insurance Survey 2014 This report is laid out as follows: Section I focuses on the current prevalence of cyber security insurance and the policy forms it takes. Section II discusses the current structure of the cyber security market. Section III investigates perceptions of the significance, risks, and challenges of cyber security insurance. Section IV details responding company demographics. Section V describes demographic characteristics of the respondents. (more available) Added: October 22, 2018
Demand More From Your Enterprise CDN This e-book takes a look at what a good CDN should do. Added: October 22, 2018
Five Phishing Predictions 2018 This report offers some significant predictions of phishing attacks in 2018. Added: October 22, 2018
GDPR An Action Plan For Cloud Readiness This E-Book discusses ways to become GDPR Compliant. Added: October 22, 2018
Has The Enforcer Become The Enabler? This paper talks about what the next evolution of Data Loss Prevention technology means for business collaboration and productivity. Added: October 22, 2018
Heads In The Cloud: Misconceptions Hindering Enterpise Cloud Adoption Almost all (99%) surveyed ITDMs say that there is or was at least one driver for their organization moving to the cloud. But for all the exuberance surrounding cloud and SaaS, the majority (94 percent) of ITDMs interviewed have or have had at least one concern about their organization moving to the cloud, the most common being data privacy (61 percent). (more available) Added: October 22, 2018
Internet of Things Security Considerations In A MultiCloud Environment Security is a key consideration and challenge both for hybrid cloud/multicloud adoption and in taking advantage of the IoT. This Paper takes a look at the details of that consideration. (more available) Added: October 22, 2018
Jump Starting Cloud Security: A Guide To Starting Your Cloud Security Journey This is a brief playbook that gives a plan for how to get started with cloud security. Added: October 22, 2018
Leaking Beeps: Unencrypted Pager Messages In The Healthcare Industry Though the mobile phone has overtaken society, some industries still rely on the old pager technology. This paper takes a look at the security risks that come with using that old technology. (more available) Added: October 22, 2018
Practitioner’s Guide to Building a Security Operations Center (SOC) This white paper goes into detail about what is needed to build and maintain an SOC, the types of technologies and skillsets required, and advantages of an all-in-one security monitoring platform. (more available) Added: October 22, 2018
Privileged Access Security For Dummies This is a handy and simple guide for helping individuals understand and implement Privileged Access Security. Added: October 22, 2018
Report Summary: Network Management Megatrends 2016 This is the fourth megatrends study. For this latest version, they have carried forward a number of ongoing questions and threads that are designed to track how the network management landscape is changing over time. They’ve also included many new questions and queries intended to help us characterize and quantify the very latest technology trends. In particular, new questions were added in this report to begin assessing whether hybrid clouds, advanced analytics, and/or the Internet of Things were having an impact on network management tools and practices. (more available) Added: October 22, 2018
The Five Steps To Managing Third Party Risk This white paper tackles the subject of how outsourced labor can cause cybersecurity risk. Added: October 22, 2018
The Security Provisions OF GDPR The provisions relating to information security continue to be one of the most talked about elements of the General Data Protection Regulation (GDPR). This simplified 10-page written guide offers insight into the security provisions to help learn how the new provisions might work in practice. (more available) Added: October 22, 2018
Unlocking B2B SaaS Growth With Identity Management SaaS companies must understand the needs of enterprise organizations, particularly with regard to security and identity management. This paper addresses the role of identity management and the three ways SaaS companies leverage identity and access management to grow enterprise sales and revenue. (more available) Added: October 22, 2018
Virtualization's Hidden Traps This study explores the pressures cloud migration place on 1,051 IT security professionals from large enterprises with 1,000+ PCs and data centers, based in the US, the UK, France, Italy, Sweden, Denmark, and Germany. (more available) Added: October 22, 2018
2017 Cloud Security Report This report reveals the latest data points and trends in cloud security, shares how your peers are approaching security, and provides valuable benchmark data that will help gauge how your own organization stacks up compared with others. (more available) Added: October 21, 2018