Skip to main content
 

cloud protection

Results 276 - 289 of 289Sort Results By: Published Date | Title | Company Name
Published By: Wasabi     Published Date: Nov 13, 2018
In this tech brief, learn how Wasabi Hot Cloud Storage is lowering costs and increasing speed for backup and recovery applications. Wasabi is transforming cloud storage with a radical combination of speed, affordability and security. It offers backup and recovery platforms an extremely cost-effective solution that at the same time improves performance. Eliminating the complex tiers and pricing structures you find with traditional cloud storage options, Wasabi is 80% less than and 6x faster than Amazon S3 and built to be simple and flexible. It works with any Amazon S3 backup and recovery platform or utility. Cloud storage has become a compelling alternative to physical media or secondary data centers for data protection and Wasabi takes it to the next level. Download the Wasabi tech brief to learn more.
Tags : 
    
Wasabi
Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization's network security posture.
Tags : 
watchguard technologies, cloud-based security, protection, network security, malware threats, cybercriminal
    
WatchGuard Technologies
Published By: Webroot     Published Date: Nov 02, 2012
This short paper looks at this situation and suggests how by replacing traditional AV with next generation cloud-based endpoint protection you will solve many of the issues surrounding your highly distributed mobile workforce.
Tags : 
mobility, endpoint security, it security, endpoint protection, mobile workforce, high mobility
    
Webroot
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this environment, mobile app reputation services will be a key tool to retain credibility to increase competitiveness.
Tags : 
mobile app, credibility, reputation service, secure cloud service, endpoint, device protection
    
Webroot Inc
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection
    
Webroot Inc
Published By: Webroot UK     Published Date: Mar 22, 2010
Move protection to where the threats are managing web-borne threats is becoming a major headache for today's resource-strapped organizations.
Tags : 
webroot, web security, cloud-based computing, malware, threat protection, data security
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
By using a service based in the cloud, protection against threats is brought nearer to where those threats are located, making it easier and more effective to protect users against security threats such as malware.
Tags : 
webroot, cloud-based service, web security, malware, security threat
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
This paper examines the realities of web threats and looks at the promise that cloud-based solutions bring for organisations in terms of providing a higher level of protection against the increasingly complex and sophisticated threats being seen today.
Tags : 
webroot, web security, cloud computing, malware threats
    
Webroot UK
Published By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : 
cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway, web gateway, mobile security, ssl protection, web 2.0, bandwidth management, ips, mobile devices, saml
    
ZScaler
Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft
    
ZScaler
Published By: Zscaler     Published Date: May 15, 2019
Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Les règles du jeu ont évolué : les applications migrent désormais vers le cloud, et les utilisateurs y accèdent de n’importe où, sans plus passer par le réseau de l’entreprise. Il est donc indispensable de repenser l’aspect sécurité de votre architecture. Découvrez avec ce livre blanc comment protéger vos actifs stratégiques avec les fonctionnalités Zscaler Data Protection et Cloud DLP.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Las reglas han evolucionado: las aplicaciones migran ahora hacia el cloud, y los usuarios acceden a ellas desde cualquier lugar, sin conectarse más a la red corporativa. Parece entonces esencial reconsiderar el aspecto seguridad de su arquitectura. Descubren con ese libro blanco como proteger sus activos estratégicos con las funcionalidades Zscaler Data Protection y Cloud DLP.
Tags : 
    
Zscaler
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.