Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
Cloud Computing

This term refers to an IT infrastructure that doesn't physically exist within the four walls of an organisation. Loosely synonymous with internet technology, cloud computing refers to resources that are in that is to say they exist on a network outside the immediate control of the user. This encompasses such concepts as software-as-a-service and web 2.0 applications

Automated Biometric Identity for Albuquerque police
Police department in Albuquerque adopts MorphoBIS as a cloud service for automated biometric identification
ForeScout identified as top 100 cloud company
Forbes has produced its Cloud 100 list naming ForeScout and others as the leading companies in the industry
GDPR ready cloud security
CipherCloud introduces its cloud access control security system that is compliant with the European General Data Protection Requirement
Integrated video analytics in central monitoring system
Agent Vi and SureView Systems have integrated their products to bring cloud based video analytics into security monitoring stations
Report examines encryption trends
Privacy compliance and increased risk driving more corporate plans to deploy encryption technology on-premises and within the cloud
Single point of control for security management
The R80 security platform from Check Point provides corporate IT security managers with single point security management
Name change reflects fresh approach to IT security
Websense has now become Forcepoint combining the technologies of the IT security companies in the Raytheon group to provide a more consolidated approach to protection
FAST responds to UK cyber crime government inquiry
The risks associated with buying non-genuine software have been submitted for consideration in the latest inquiry being held on cyber crime
Software licensing contributing to increased IT complexity
Survey of high level IT professionals shows perception of increased complexity in IT due to cloud computing, licensing and legacy technology
Cloud security report for 2015
Application attacks increase against cloud deployments according to the Autumn 2015 cloud security report from Alert Logic
Tokenization for protection of cloud data
CipherCloud is now offering Next Generation Tokenization as an additional method of protecting data that resides in the cloud
Tackling Today’s Authentication Complexities
Jason Hart, vice president, Cloud Solutions for Identity & Data Protection at Gemalto highlights the importance for organisations to adopt an appropriate authentication environment
Matching security to increased network performance
Dan Joe Barry, a Vice President at Napatech, examines the need for greater focus on network performance when deploying network security systems
Three key IT security focus areas identified
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks
The most dangerous IT threats of the year and how to neutralise them
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
Study charts enterprise cloud usage risks
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises
DDoS Security as a Service implementation
Joe Eskew of NSFOCUS explains the three steps required for implementing DDoS Security as a Service technology for protection against attacks
Partnership provides surveillance as a service for home owners
Cloud based CCTV surveillance system provides affordable security for home owners through new partnership between Cloudview and Kirby Home Security
Technology partnerships extended to boost data security
The Cipher Technology Partner Programme run by SafeNet now has further membership extending its reach and providing greater opportunities for data protection
Guide available for Security Architects
The British Computer Society has released a guide providing top tips to organisations on IT security architecture
XMT Smart Engineering Engine at heart of new consumer range of security products
The Panda range of consumer antivirus, mobile and internet security products features the new XMT Smart Engineering engine for new levels of protection
High 2FA sales growth in Australasia
SecurEnvoy has seen significant sales growth in Australia and New Zealand on the back of increasing BYOD trends in the region
Strong authentication for cloud service providers
The Protiva Cloud confirm authentication system from Gemalto is compatible with HP CloudSystem for CSPs
Network security planning roadshow hits London in June
Tufin Technologies is bringing its Impact 2014 roadshow to London this month with information on network security planning for businesses
UK needs greater cyber-threat awareness
IT security expert panel at InfoSecurity Europe event declares greater need for awareness of cloud computing and cyber security in UK businesses
Cloud security supports VPN access to Azure platform
FortiGate security appliances now support a wider range of cloud platforms with the addition of Microsoft's Azure
Market forecast for cloud security products
Research report examines the market for cloud security services including virtualization out to 2019
Re-Thinking the Approach to Real-Time Network Security
Dan Joe Barry, vice president of marketing at Napatech explains how multiple attack vectors are causing a change of approach to securing networks in real time
Digital security tokens to protect Red Hat remote access
Employees of Red Hat will be able to gain secure remote access to the company IT resources using digital security tokens from Gemalto
Image level encryption for AWS public cloud
Preconfigured Amazon Machine Images enable companies to store sensitive information and applications in public clouds
Cloud-based wireless network monitoring
Smaller businesses now have access to wireless monitoring, security and management tools available in a cloud computing model thereby avoiding hardware dependence
Vulnerabilities in a brave new world of the internet of things
Richard Moulds, VP Strategy at Thales e-Security examines the internet of things, how it affects peoples' daily lives and the vulnerabilities that it introduces
Two-Factor Authentication secures cloud service provider
A cloud computing service provider in Switzerland is ensuring secure access for its clients with the use of SecurAccess two-factor authentication from SecurEnvoy
Robust administrative security required to prevent Wi-Fi viruses
Bitdefender comments on the creation of the wi-fi virus and how passwords are no longer enough to provide the necessary network security levels
Continuous endpoint compliance both on and off the corporate network
ForeScout RemoteControl enables organisations to extend endpoint control to corporate and BYOD equipment not connected to the enterprise network
Market forecast for cloud security software
Report examines the outlook for market development to 2016 for cloud computing security software
Security company hires technical manager
Research think tank pioneer joins Tenable Network Security as Technical Manager for leading security innovation at the company
European E-Identity event schedule for 2014
Schedule of interest group meetings and conferences to take place during 2014 on digital trust, identity management and cyber security published
4 out of 5 Employees using unapproved apps
Research from McAfee has highlighted the dangers of unapproved apps in the workplace with 80% of employees surveyed using SaaS applications without approval
Cloud information protection available on AppExchange
CipherCloud is attending Dreamforce 2013 with its cloud information protection platform available for saleforce.com users through AppExchange
Survey shows greater need for network management automation
Increasing network complexity with IPv6, cloud computing and virtualization is driving greater needs amongst IT professionals for more automation of network management
Online retail security best practice
Dave Anderson of Voltage Security explains best practices for online retailers to ensure high levels of security
Connected security concept addresses major threat challenges
A portfolio of products being offered by Dell is designed to address the major challenges of IT security including BYOD, cloud computing and network security
Web protection service added to cloud
Cloud computing platform for smaller businesses gains enhancement with web protection service featuring content filtering capability
Infosecurity Russia 2013 - visitor numbers up by 10% on 2012
Now in its 10th year, Infosecurity Russia 2013 has yet again confirmed itself as one of Russia’s leading security events. By the end of the second day, exhibition visitor numbers had already exceeded the 2012 total number of visitors.
Balancing staff acquisition with IT security requirements
Raj Samani of McAfee explains the steps needed to secure information assets in small businesses from insider threats when recruiting new staff
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
Unified Threat Management for Windows Azure
WatchGuard releases Unified Threat Management for use with cloud computing based on the Windows Azure platform
ICO views on encryption paint incomplete picture
Voltage security comments on ICO encryption analysis which the company believes to be incomplete
Mature cloud security contributing to market growth
Zscaler comments on the forecast growth in the platform-as-a-service market with respect to improvements in cloud security and policy enforcement practices
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo