Cloud Security Resources

Webinars

webinar-icon

API vs. Proxy: How to get the best protection from your CASB

A CASB can help you secure your full cloud footprint. But not all CASBs are created equally – some use API-mode, and others use proxy-mode. Watch the webinar to find out the pros and cons of each deployment.

webinar-icon

Can a CASB protect you against the Treacherous 12?

Palerra and the Cloud Security Alliance co-present a webinar on how a Cloud Access Security Broker (CASB) can protect you from the Treacherous 12 Cloud Computing Threats.

webinar-icon

Securing IaaS: The forgotten component of Cloud Access Security Brokers

Many organizations focus their cloud security efforts on their SaaS applications, but vulnerabilities exist when using Infrastructure as a Service (IaaS).

webinar-icon

Learn About LORIC: Securing Google Apps with the LORIC Platform

It’s your job to enable your organization with cloud services like Google Apps while ensuring that the data within them is secure…

webinar-icon

Learn About LORIC: Securing Office 365 with the LORIC Platform

Protection of customer data is a priority for Microsoft Office 365 and it provides a number of features to reduce risk…

webinar-icon

Learn About LORIC: Securing Salesforce with the LORIC Platform

It’s your job to enable your organization with cloud services like Salesforce while ensuring that the data within them is secure…

webinar-icon

Cloud Security is a Shared Responsibility

Cloud security is a shared responsibility and organizations are expected to safeguard their assets in a manner similar to on-premise…

webinar-icon

The Yin and Yang of Cloud Security: Detection & Incident Response

While the cloud has fundamentally changed the way we do business, it has left organizations feeling vulnerable to attacks….

webinar-icon

Cloud Security Playbook: Setting Up a Game Plan

Enterprise adoption of disruptive technologies always prompts the need to reassess security architecture – embracing the Cloud…

webinar-icon

Finding and Responding to Attacks in the Cloud

Enterprises today are adopting cloud services and technology at a rapid pace, seeking to take advantage of the flexibility…