Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Cloud Computing Security
Virtualised cloud communication security
Cloud Computing Security : 18 March, 2015
The virtualised real-time communications system from Sonus Networks brings enhanced security and intelligence
Cloud based real time communications demonstration at MWC
Cloud Computing Security : 02 March, 2015
Sonus is attending Mobile World Congress in Barcelona with a demonstration of virtualisation as a tool for real time cloud-based communications
Study charts enterprise cloud usage risks
Cloud Computing Security : 04 February, 2015
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises
Technology partnerships extend reach of cloud data controls
Cloud Computing Security : 04 September, 2014
The Box system from CipherCloud is being made available to more users through a technology partnerhip the company has entered into with Oris4 and mxHero
Survey reveals extent of European cloud data storage acceptance
Cloud Computing Security : 28 August, 2014
Nearly half of EU companies still retain certain types of data on servers with continuing caution being shown for moving their data to the cloud
Cloud security supports VPN access to Azure platform
Cloud Computing Security : 23 May, 2014
FortiGate security appliances now support a wider range of cloud platforms with the addition of Microsoft's Azure
InfoSecurity Europe cloud adoption survey results
Cloud Computing Security : 19 May, 2014
CipherCloud reports on the results of its cloud health check survey performed at the recent InfoSecurity Europe event in London
Market forecast for cloud security products
Cloud Computing Security : 16 May, 2014
Research report examines the market for cloud security services including virtualization out to 2019
Enterprise cloud application visibility
Cloud Computing Security : 01 May, 2014
CipherCloud for Cloud Discovery brings improved cloud application visibility and risk scoring for enterprise users
Organizations avoiding cloud services for fear of snooping
Cloud Computing Security : 27 March, 2014
RSA Conference survey by Lieberman Software reveals up to a third of companies are avoiding keeping data in the cloud because of Government snooping fears
Cloud security through discovery, protection and monitoring
Cloud Computing Security : 28 February, 2014
CipherCloud expands its data protection system for helping companies adopt cloud services with secure protection of sensitive data
Public cloud service security risks
Cloud Computing Security : 26 February, 2014
Axway survey results indicate the attitudes of security professionals to the dangers of using public cloud services for file sharing in the workplace
Email Defense Suite protects cloud service users
Cloud Computing Security : 13 February, 2014
Intermedia is protecting its customers with enhanced cloud security provided by McAfee Email Defense Suite
Cloud security and compliance acquisitions
Cloud Computing Security : 10 February, 2014
Imperva is acquiring Incapsula and Skyfence to extend the company's data centre security strategy across the cloud
Security analytics modules extended to cloud applications
Cloud Computing Security : 03 February, 2014
Three new modules from ExtraHop bring additional data analytics capabilities for security, WAN optimisation and cloud applications
Big data analytics for improved understanding of sensitive assets
Cloud Computing Security : 03 February, 2014
Research report shows the benefits of using metadata for the analysis of sensitive information in unstructured data
Cloud management software with malware detection
Cloud Computing Security : 23 January, 2014
Panda's Cloud Systems Management product now incorporates Cloud Cleaner malware detection and disinfection tool
Market forecast for cloud security software
Cloud Computing Security : 23 January, 2014
Report examines the outlook for market development to 2016 for cloud computing security software
SaaS applicaton security acquisition
Cloud Computing Security : 17 January, 2014
CipherCloud buys into the field of SaaS application security with the acquisition of CloudUp Networks
Cloud based privileged identity management for data centres running Azure
Cloud Computing Security : 12 December, 2013
Enterprise Random Password Manager now provides privileged identity management for Windows Azure cloud data centres
Cloud based security system acquisition
Cloud Computing Security : 09 December, 2013
Akamai is extending its expertise into cloud based data centre and enterprise protection through the acquisition of Prolexic
Managed sercurity service for Norway
Cloud Computing Security : 27 November, 2013
Norwegian Broadnet is using cloud-based DDoS managed security from Arbor Networks to protect its customers
Cloud based security for managed services
Cloud Computing Security : 26 November, 2013
Partnership between Zscaler and Easynet Global Services brings direc-to-cloud security to managed cloud infrastructure provider
Increased visibility and control for cloud and mobile environments
Cloud Computing Security : 22 November, 2013
UserInsight from Rapid7 enables security professionals to have greater visibility and control of cloud and mobile network user behaviour
Cloud information protection available on AppExchange
Cloud Computing Security : 19 November, 2013
CipherCloud is attending Dreamforce 2013 with its cloud information protection platform available for users through AppExchange
Technology partner program for cloud and mobile app security
Cloud Computing Security : 04 November, 2013
Cloud and mobile software suppliers are now able to access joint development initiatives for unified identity services from Centrify through the company's alliance partner program
Cloud based security for Office 365
Cloud Computing Security : 30 October, 2013
Zscaler is providing security and visibility for Office 365 using a cloud-based service without impacting bandwidth
Web protection service added to cloud
Cloud Computing Security : 11 October, 2013
Cloud computing platform for smaller businesses gains enhancement with web protection service featuring content filtering capability
Personal cloud appliances threaten corporate security
Cloud Computing Security : 26 September, 2013
Varonis has been studying the use of personal cloud services by employees for storing items relating to work, thereby creating security risks
Mature cloud security contributing to market growth
Cloud Computing Security : 30 August, 2013
Zscaler comments on the forecast growth in the platform-as-a-service market with respect to improvements in cloud security and policy enforcement practices
Understanding risk in virtualized environments
Cloud Computing Security : 16 August, 2013
Frederik Bijlsma of Red Hat explores virtualization and how reducing uncertainty and understanding exposures can bring about improvements in risk management
Encrypted communication for web and cloud security
Cloud Computing Security : 24 July, 2013
Unisys launches its Stealth Solution for Amazon Web Services for encrypted cloud communications for enterprise clients
Award received by public administration private cloud project
Cloud Computing Security : 23 July, 2013
Accellion receives EuroCloud award for private cloud mobile file sharing at the London Borough of Camden
Endpoint security available from the cloud
Cloud Computing Security : 19 June, 2013
CentraStage and Panda Security have partnered on a solution which enables CentraStage clients to benefit from enpoint security as a service
Identity management features in Cloud Identity Summit
Cloud Computing Security : 17 June, 2013
Ping Identity is hosting the Cloud Identity Summit 2013 with presentations on identity management from industry analysts
Effectiveness of hybrid cloud security
Cloud Computing Security : 04 June, 2013
Kaspersky Lab explains how cloud technologies are rendered more secure with hybrid solutions that also cater for local security
Factoring security into cloud architectures
Cloud Computing Security : 29 May, 2013
James Carnie, the head of solutions architecture at Adapt provides insight into achieving the right balance between flexibility and security in the cloud
Alliance improves cloud based mobile threat protection
Cloud Computing Security : 16 May, 2013
Webroot has partnered with VeliQ to provide cloud-based anti virus protection to users of the VeliQ enterprise mobility management system
Cloudreach examines the myths of cloud security
Cloud Computing Security : 06 May, 2013
With more companies adopting cloud computing policies, Cloudreach explains how to overcome the internal obstacles to adoption
Cloud identity and access management
Cloud Computing Security : 26 April, 2013
Security Connected products from McAfee bring robust security and access control to cloud applications
Akamai joins forces with Swiss telecom company
Cloud Computing Security : 15 March, 2013
Telecommunications in Switzerland meets cloud infrastructure services in union between Swisscom and Akamai Technologies
Does a breach seemingly every other day keep the cloud away?
Cloud Computing Security : 15 March, 2013
Mark Knight, Director of Product Management at Thales e-security examines the link between effective BYOD policies and the security of data in the cloud
UK businesses delegate cloud security
Cloud Computing Security : 28 February, 2013
Iron Mountain examines the UK's attitude to cloud based security and the willingness of the majority to delegate this important task to cloud providers
Secure cloud storage partnership agreement
Cloud Computing Security : 22 February, 2013
Users of Drobo's 5N storage will gain secure cloud accessibility through the use of Barracuda's Copy service
Government intervention fears deter corporate users from the cloud
Cloud Computing Security : 07 February, 2013
A Lieberman Software survey reveals how corporate users are being deterred from using the cloud for sensitive data for legal and government intervention reasons
Third party application vulnerability in the cloud
Cloud Computing Security : 30 January, 2013
Intelligence report from Imperva uses Yahoo! breach to research third party code vulnerabilities in cloud computing
G-Cloud scheme brings public sector IT security concerns
Cloud Computing Security : 18 January, 2013
Lieberman Software comments on the release of the Government G-Cloud catalogue and what this implies for public sector IT security
Security certification for European cloud services centre
Cloud Computing Security : 16 January, 2013
The Paris data centre of cloud services supplier Interoute has achieved ISO 27001 security certification
IT Specialists mistrust the cloud for personal use
Cloud Computing Security : 14 December, 2012
Lieberman Software has released finding of a survey into business and personal usage of cloud computing services by IT security professionals
Cloud security alliance formed between Interoute and Symantec
Cloud Computing Security : 20 November, 2012
Cloud services specialist Interoute has joined with Symantec to integrate the company's security systems into the cloud
First | Prev  | 1 | 2 | 3 | 4  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo