Cloud Security

Secure Solutions for Storing and Moving Sensitive Data Around the World As cloud and storage projections continue to rise, the number of organizations moving to the cloud is escalating and it is clear cloud storage is here to stay. However, is it secure? Data is the lifeblood fo... (more)
Cloud Centric Data Management with Commvault As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of ... (more)
Click Here to Download Guide Now! Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be depl... (more)
Proactive vs. Reactive - A Better Approach to Cloud Security How will your company move to the cloud while ensuring a solid security posture? Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. ... (more)
Internet of Things and Big Data - Who Owns All the Data? We've been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that's just the ... (more)
Today nearly all of us have our information stored on the cloud. It's a very easy solution that allows users to seamlessly create back-ups of photos, contacts and other personal information, giving users access to their accounts anywhere from any device. Perhaps its most prized f... (more)
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named "Bronze Sponsor" of SYS-CON's 18th International Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY... (more)
Container Security Compliance for Financial Services Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology ... (more)
Network-Aware Orchestration: The Next Level of SD-WAN Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intens... (more)
Disaster Recovery Planning Simplified In his session at 18th Cloud Expo, Andrew Cole, Director of Solutions Engineering at Peak 10, will discuss how the newest technology advances are reducing the cost and complexity of traditional business continuity and disaster recovery solu... (more)
Hybrid Security Monitoring The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the c... (more)
Regaining Control of Storage Performance: New Technologies Enable Administrative Control of Availability and Confidentiality in the Cloud Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&Cs are traditionally optimized... (more)
The EMV liability shift that began in October 2015 is likely to reduce card present payment card fraud. That's a double-edged sword for retailers with an online presence and those who accept mobile payments, as fraudsters are seeking easier routes to ill-gotten gain. Add to this ... (more)
Wow, if you ever wanted to learn about Rugged DevOps (some call it DevSecOps), sit down for a spell with Shannon Lietz, Ian Allison and Scott Kennedy from Intuit. We discussed a number of important topics including internal war games, culture hacking, gamification of Rugged DevOp... (more)
TierPoint has been selected by GlaxoSmithKline (GSK) to support the company's global data consolidation and protection initiatives. GSK is a research-based pharmaceutical and healthcare company. As part of its overall strategy to increase growth, reduce risk and improve long-term ... (more)
Multi-Layer DDoS Mitigation Strategies In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of meth... (more)
Strong Security Elements for IoT Manufacturing The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key... (more)
Wearables and Privacy: Who Is Your Watch Talking To? We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ec... (more)
M2M Certificate Standard The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how... (more)
As the march to connect each and every noun on this planet continues with a blistering pace, the various ways, contraptions and sensors used to collect data is greatly expanding. What once was a (relatively) small collection of fitness trackers, smartwatches, thermostats, automob... (more)
© 2008 SYS-CON Media