Cloud security - Further Information
This page shows up to 100 pieces of content (newest at the top):
Overcoming the complexity gap - the role of automation in optimising network performance and security
This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...
The state of play for identity management services - evidence from organisations in Germany and the UK
The results of this survey show that interest in the use of SaaS applications among organisations in Germany and the UK is increasing.
Blended security threats need a unified response - the need for an integrated, cloud-based threat vector management platform
Security threats are becoming increasingly complex, sophisticated and targeted and no organisation is immune.
To build trust in electronic networks, security needs to be built into a suitable framework, rather than being bolted on.
Cloud-based endpoint security services are suited for use by any organisation that allows its users to interact and communicate using internet channels.
Best practices for cloud security - how security in the cloud can be a better bet than doing it yourself
Although due diligence is required in the selection of such services, organisations should no longer consider security to be an inhibitor
With the web becoming the prime method of attack as other vectors are closed through security solutions, organisations are increasingly looking to beef up their security controls for web threats. But for many resource-strapped organisations looking to do more with…