Back to TMCnet Videos
LIST OF VIDEOS MATCHING THE KEYWORD "Cloud security"
Leeward Security Gives Advice on Password Best Practices
Terry Woloszyn from Leeward Security talks passwords with Erik Linask and explains how to increase security by password protection and management.
Tags:
Terry Woloszyn
,
Leeward Security
,
cloud computing
,
Cloud Expo
,
Erik Linask
,
TMC
,
cloud security
,
PRISM
,
NSA
,
data privacy
,
information security
,
identity security
,
mobile security
,
digital identity
,
enterprise security
,
security server
,
password secu
07/15/2013
SOA Software Talks Cloud API Management
Allisair Farquarson from SOA Software explains the role of APIs in cloud environments and the need to manage APIs to ensure security, availabilty, and performance.
Tags:
SOA Software
,
Allisair Farquarson
,
API Management
,
cloud computing
,
Cloud Expo
,
Erik Linask
,
TMC
,
Web Sockets
,
Web protocol
,
cloud integration
,
cloud API
,
cloud security
,
,
PRISM
,
NSA
,
data privacy
07/12/2013
ActiveState Talks Private PaaS
ActiveState's Jeff Hobbs talks to Erik Linask about the benefits of private PaaSas an alternative to public cloud platforms.
Tags:
Jeff Hobbs
,
ActiveState
,
Cloud Expo
,
cloud computing
,
Erik Linask
,
TMC
,
PaaS
,
private cloud
,
platform as a service
,
cloud stack
,
data services
,
public platform as a service
,
cloud security
,
cloud compliance
,
public cloud
,
Vmware
,
Heroku
,
Stackato
,
PR
07/12/2013
Layer 7 Explains Enterprise Cloud Security Requirements
Rob Conti from Layer 7 Technologies tells Erik Linask what security needs enterprises have when migrating applications and data to cloud environments.
Tags:
Layer 7
,
Rob Conti
,
CA Technologies
,
Cloud Expo
,
Cloud Computing
,
Erik Linask
,
TMC
,
enterprise cloud
,
PRISM
,
NSA
,
data privacy
,
cloud security
,
hybrid cloud
,
cloud API
,
public cloud
,
private cloud
,
internal cloud
,
external cloud
,
identity managament
,
07/12/2013
Interview with Appthority
TMC’s Erin Harrison speaks with Domingo Guerra, President and Founder of Appthority, about mobile app risk management and enterprise mobility security concerns.
Tags:
Mobility
,
Cloud Security
,
Mobile Apps
,
BYOD
10/09/2012
Interview with APEX Voice Communications
TMC’s Erin Harrison speaks with Fabio Tylim, VP of Sales, The Americas for APEX Voice Communications, about the company’s HD video conferencing platform and current trends in video conferencing.
Tags:
Mobility
,
Cloud Security
,
Mobile Apps
,
BYOD
10/09/2012
Interview with Viewbiquity
TMC’s Erin Harrison speaks with Tom Shafron, CEO for Viewbiquity, about the company’s cloud based M2M platform as well as current security and surveillance trends.
Tags:
M2M
,
Cloud Security
10/09/2012
eGestalt Brings Cloud-based Compliant Security to Enterprise Data
eGestalt's Anupam Sahai explains how to ensure compliant data security using cloud computing technologies.
Tags:
eGestalt
,
cloud computing
,
information security
,
enterprise security
,
cloud security
,
IT security
,
information management
,
data security
,
data management
,
digital security
,
compliance management
,
digital compliance
07/19/2012
CipherCloud Drives Cloud Adoption in Regulated Markets
Kevin Bocek discusses the difference between security and compliance in the cloud and the adoption of cloud services in heavily regulated industries, like healthcare and financial services.
Tags:
Ciphercloud
,
cloud security
,
cloud compliance
,
office 365
,
gmail
,
cloud apps
,
cloud communications
,
cloud services
,
regulatory comliance
,
healthcare technology
,
financial technology
07/19/2012
Meet Your Big Data Storage Needs: Coraid
As businesses collect more and more data, they will require storage capabilities that are easily and secure, accessible, and quickly scalable for pure storage as well as data analytics.
Tags:
Cloud Expo
,
Coraid
,
cloud computing
,
cloud storage
,
data security
,
cloud security
,
scalable storage
,
big data
,
infotech spotlight
,
erik linask
07/05/2012
What are the Security and Compliance Requirements of Cloud Computing: Coalfire
As the adopotion of cloud computing continues to increase, businesses are finding, while they understand the potential benefits, they need help understanding the security and compliance ramifications of moving data into cloud data centers.
Tags:
Cloud Expo
,
Coalfire
,
infotech spotlight
,
cloud security
,
cloud compliance
,
cloud computing
,
data security
,
data center
,
data compliance
,
cloud provider
,
dat storage
,
big data
,
erik linask
07/02/2012
Axway Talks About Cloud Computing Strategies
People often think of Cloud as a place. Instead, Axway's John Thielens talks about cloud computing as a way of delivering product and managing infrastructure in a secure environment.
Tags:
Cloud Expo
,
Axway
,
cloud computing
,
cloud security
,
data security
,
ODCA
,
erik linask
,
cloud computing
,
infotech spotlight
06/28/2012
Making Sense of Compliance Issues and Cloud: PerspecSys
As enterprises move more and more applications and data to the cloud, they have to be increasingly aware of compliance and regulatory requirements and how they relate to each piece of data they want to move.
Tags:
Cloud Expo
,
PerspecSys
,
cloud computing
,
data security
,
infotech spotlight
,
erik linask
,
cloud security
,
data privacy
,
data compliance
,
data encryption
,
HIPAA
,
Sarbanes-Oxley
,
security gateway
,
big data
06/28/2012
CipherCloud Takes a Close Look at Data Security in the Cloud
Breaches in data security are forcing cloud providers to take a closer look at how they are protecting the data they are storing in the cloud to reduce risk and minimize loss from data breaches.
Tags:
Cloud Expo
,
CipherCloud
,
cloud security
,
IT security
,
data security
,
data privacy
,
data storage
,
cloud storage
,
cloud providers
,
data breach
,
application security
06/25/2012
CloudPassage details public and private cloud security solutions
Rand of Cloud Passage discusses his company's firewall automation multi-factor authentication, configuration and security in assisting company's manage the security of public and private clouds
Tags:
cloud computing
,
amazon
,
EC2
,
Cloud security
,
anti virus
,
firewall
,
cloud compliance
05/10/2012