The FireEye Approach to Effective Cloud Security

May 30, 2018

In many ways, the public cloud is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy, and firewalls are built into the cloud provider platform. Servers are easier to patch. And since implementations that are just a few years old are considered too old, there aren’t any forgotten boxes sitting in a dark corner with a note reading: “DO NOT TURN OFF.”

Spotlight

Prysm Inc.

Prysm is helping companies define a new way of work. One where applications, content, video conferencing and the Web can all be easily combined into a visual workspace where teams can create, edit and share.

OTHER WHITEPAPERS
news image

CLOUDERA DATA PLATFORM PUBLIC CLOUD SECURITY

whitePaper | April 8, 2022

The Cloudera Data Platform (CDP) Public Cloud is a Platform-as-a-Service (PaaS) offering with an architecture that is based on industry standard best practices, and ensures that our customers’ data and infrastructure is secure in the public cloud.

Read More
news image

Telco Edge Cloud Value & Achievements

whitePaper | March 17, 2022

The Telco Edge Cloud (TEC) initiative was launched in the GSMA in March 2020 by 19 operators to design and develop a global edge computing service based on the federation of the edge infrastructures and platforms from a set of operators and edge service providers. Being open and inclusive, the TEC community within the GSMA has grown to include technology and platform providers, counting 24 members at the time of writing this edition of this whitepaper and has set the basis for the global service launch.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

Citrix Cloud

whitePaper | November 26, 2019

The request must identify the Service(s), define the dates, times and durations of Unavailability, along with supporting logs or records that corroborate the Unavailability, and identify the affected users and their locations, as well any technical support requested or remediation implemented. Only one service credit will be issued per Service, for the applicable number of months, with a maximum of a single 10% service credit for all months of the extension. Customer must present the voucher upon purchase of the extension. If you purchase the extension through a reseller, you will receive a credit through the reseller. The credit we apply for a direct purchase, or pass to your reseller for an indirect purchase, will be based on the pro-rated, blended suggested retail price of the extension for the same number of units. Citrix does not control resale pricing or resale credits. Credits do not include a right of offset on payments due to Citrix or a reseller. Citrix will occasionally update these terms. When updates occur, Citrix will also revise the publication date at the top of the Service Level Agreement. Any changes apply only to your new Service purchases or Service extensions on or after the current publication date.

Read More
news image

Data Management with Cloudera Data Platform on Dell Infrastructure

whitePaper | March 18, 2022

This white paper provides overview information for the Dell Technologies Validated Design for Data Management with Cloudera Data Platform (CDP) Private Cloud Base, for deployment on Dell PowerEdge servers, PowerSwitch networking, and PowerScale storage.

Read More
news image

Citrix Cloud Services Data Protection Overview

whitePaper | September 29, 2022

Citrix understands that data protection is one of the top priorities for our customers when selecting a cloud service. Data protection is also a rapidly-evolving domain and requires enterprises to assess more information over time about the data handling practices of their vendors.

Read More

Spotlight

Prysm Inc.

Prysm is helping companies define a new way of work. One where applications, content, video conferencing and the Web can all be easily combined into a visual workspace where teams can create, edit and share.

Events