Brochure More information from http://www.researchandmarkets.com/reports/2883566/ Cloud Security 2014: Companies and Solutions Description: Cloud security is the set of security protocols and technologies that protect the cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that it is not focused on preventing access to specific machines. This research provides an evaluation of security in cloud computing environment including different types of cloud computing models and security challenges facing cloud computing companies/solutions. The report provides analysis of key security components of popular cloud security solutions. The report includes an evaluation of key players in cloud security industry. The report also provides a cloud security future outlook. All report purchases include telephone time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report. Target Audience: - Cloud services companies - Mobile network operators - Wireless handset manufactures - Telecom infrastructure providers - Content and application developers - Cloud and telecom security companies - Content Delivery Network (CDN) providers In addition, any purchase of the this report will receive any one (their choice) report of the following reports: - Modernizing Cloud, Virtual and Physical Environments for Data Protection - Cloud Video Technology Integration Planning and Solutions - Cloud Computing Assessment: Opportunities,, and Outlook for the Enterprise - Services in the Cloud: What Organizations must know about Everything as a Service (XaaS) - Understanding Virtualization in the Cloud - Corporate Learning and Development: E-learning and Cloud-based Instruction 2014 These bonus reports are not part of the syndicated report library and are otherwise only available to exclusive customers Contents: Cloud Computing and Cloud Security Cloud Computing Cloud Computing Models Storage-as-a-service Database-as-a-service Information-as-a-service Business-Process-as-a-Service Application-as-a-service Platform-as-a-service Integration-as-a-service Security-as-a-service Management-as-a-service Testing-as-a-service Infrastructure-as-a-service Types of Cloud Services Public Cloud Private Cloud
On-premise Private Cloud Externally hosted Private Cloud Hybrid Cloud Community cloud Heterogeneous cloud Cloud Computing Benefits Expand scalability Lower infrastructure costs Increase utilization Improve end-user productivity Improve reliability Increase security Saving Effort for IT Tasks Gain access to more sophisticated applications Save energy Elements of Cloud Protection: Policy, Identity, Information, and Infrastructure Policy Identity Information Infrastructure Cloud Security (Categories,, and Service Providers) Overview Identity and Access Management (IAM) Provisioning/de-provisioning of accounts: Authentication Directory services Web SSO Fraud Prevention Authorization User profile Management Security Novell Cloud Security Services Gemalto Protiva Cloud Confirm SafeNet SafeNet certificate-based authenticators SafeNet Hardware Security Module Data Loss Prevention Identification of Sensitive Data SQL regular expression detection Real Time User Awareness Websense Websense Cloud Web Security Web Security Web Filtering Instant Messaging Scanning Email Security Bandwidth Control TrendMicro Deep Security Solution zscaler Cloud Application Security
Email Security Accurate filtering to block spam and phishing Virus Protection Symantic.Cloud Email Encryption.cloud Email Security.cloud Web Security.cloud Instant Messaging Security.cloud Security Assessments Risk Management Application Security Assessments Vulnerability Assessments VeraCode Intrusion Management Identification of intrusions and policy violations Deep Packet Inspection Redware DefensePro Security Information and Event Management Real-time event correlation Forensics support Loglogic LogLogic Cloud Security SenSage SenSage 4.6 Encryption Protection of data in transit Protection of data at rest Key and policy management Protection of cached data Cypher Cloud CypherCloud for Office 365 Business Continuity and Disaster Recovery Secure backup Replicated infrastructure component Atmos EMC Atmos Network Security
Data Threats Hackers Malware Virus Worms Trojan Horses Spyware Adware Crimeware SPAM Phishing Access Control Threats Unauthorized/accidental disclosure Unauthorized changes Unauthorized Access Rackspace Rackspace Cloud Security Cloud Security Future Outlook Proactive Application Monitoring Enhanced Data center physical security Enhanced Data Transfer Protection Disaster Recover and the Cloud Ordering: Order Online - http://www.researchandmarkets.com/reports/2883566/ Order by Fax - using the form below Order by Post - print the order form below and send to Research and Markets, Guinness Centre, Taylors Lane, Dublin 8, Ireland.
Page 1 of 2 Fax Order Form To place an order via fax simply print this form, fill in the information below and fax the completed form to 646-607-1907 (from USA) or +353-1-481-1716 (from Rest of World). If you have any questions please visit http://www.researchandmarkets.com/contact/ Order Information Please verify that the product information is correct and select the format(s) you require. Product Name: Web Address: Office Code: Cloud Security 2014: Companies and Solutions http://www.researchandmarkets.com/reports/2883566/ SC Product Formats Please select the product formats and quantity you require: Electronic (PDF) - Single User: Electronic (PDF) - Enterprisewide: Electronic (PDF) - 1-5 Users: Quantity USD 1995 USD 4995 USD 2995 Contact Information Please enter all the information below in BLOCK CAPITALS Title: Mr Mrs Dr Miss Ms Prof First Name: Last Name: Email Address: * Job Title: Organisation: Address: City: Postal / Zip Code: Country: Phone Number: Fax Number: * Please refrain from using free email accounts when ordering (e.g. Yahoo, Hotmail, AOL)
Page 2 of 2 Payment Information Please indicate the payment method you would like to use by selecting the appropriate box. Pay by credit card: You will receive an email with a link to a secure webpage to enter your credit card details. Pay by check: Please post the check, accompanied by this form, to: Research and Markets, Guinness Center, Taylors Lane, Dublin 8, Ireland. Pay by wire transfer: Please transfer funds to: Account number 833 130 83 Sort code 98-53-30 Swift code IBAN number Bank Address ULSBIE2D IE78ULSB98533083313083 Ulster Bank, 27-35 Main Street, Blackrock, Co. Dublin, Ireland. If you have a Marketing Code please enter it below: Marketing Code: Please note that by ordering from Research and Markets you are agreeing to our Terms and Conditions at http://www.researchandmarkets.com/info/terms.asp Please fax this form to: (646) 607-1907 or (646) 964-6609 - From USA +353-1-481-1716 or +353-1-653-1571 - From Rest of World