WELCOME TO The cloud REPORT
Newsletter | Member Login | Signup
Home > Companies > Blackstone Technology Group
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
Cloud App Development
TGS | January 10, 2022
TGS, a global provider of energy data and intelligence, announced a project designed to help drive exploration across the South Makassar and North East Java regions. Processing has begun on the East Java Sea 2D-cubed project. This project will utilize 2D-cubed technology to integrate all existing seismic data across a 270,000 square kilometer area to create a one-stop tool for regional evaluation. The dataset will combine over 120,000 kilometers of 2D seismic data from over 80 leg...
InterSystems | May 25, 2020
InterSystems Achieves AWS Advanced Technology Partner status and adds support of AWS Graviton2-based instances. Support of the new processor provides enhanced technology and architecture freedom for InterSystems developers, while increasing application perf...
Cloud Security
Sumo Logic, Inc. | August 02, 2022
Sumo Logic the SaaS analytics platform to enable reliable and secure cloud-native applications, announced today that it has achieved Threat Detection and Response distinction with Amazon Web Services (AWS) Security Competency status for Sumo Logic Cloud SIEM and Cloud SOAR solutions. This designation recognizes achievements in empowering AWS customers to transform their security operations with relevant threat data and streamlined incident response capabilities. Achieving this AWS...
Cloud Infrastructure Management
Zscaler | June 16, 2021
As per the 2021 "Exposed" report from the cloud security company Zscaler, around 400,000 servers that belongs to 1,500 companies worldwide are exposed and ascertainable over the internet, which means anyone in the world can attempt to access them, not just bad players. Knowing about the server's existence makes it halfway for the players, who can then explore further around the application stack or server configuration for potential susceptibilities to exploit. For i...
Cloud Communication
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE