cloud tools
TRANSCRIPT
-
7/26/2019 cloud tools
1/14
TRENDING: Idontwant tobe LinkedIn with Microsoft
Advancedbeginner's guide toR
Subscribeto newsletters
Resources/White Papers
Search
computerworld
Sign In|Register Cloud Computing Computer Hardware Consumerization of IT Data Center
Emerging Technology Enterprise Applications IT Management Internet Mobile & Wireless Networking Operating Systems Security
Vertical IT
All Topics News Features Reviews Blogs Opinions Insider Shark Tank Slideshows Video Digital Magazine Digital Downloads Newsletters Computerworld Events IT Job Search
http://www.computerworld.com/article/3083424/social-media/i-don-t-want-to-be-linkedin-with-microsoft.htmlhttp://www.computerworld.com/article/3083424/social-media/i-don-t-want-to-be-linkedin-with-microsoft.htmlhttp://www.computerworld.com/article/3083424/social-media/i-don-t-want-to-be-linkedin-with-microsoft.htmlhttp://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.htmlhttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/resourceshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#searchhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#searchhttp://www.computerworld.com/http://www.computerworld.com/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/news/http://www.computerworld.com/feature/http://www.computerworld.com/reviews/http://www.computerworld.com/blogs/http://www.computerworld.com/opinion/http://www.computerworld.com/insider/http://www.computerworld.com/blog/shark-tank/http://www.computerworld.com/slideshows/http://www.computerworld.com/video/http://www.computerworld.com/tag/computerworlddigitalmagazine/http://www.computerworld.com/resources/download-libraryhttp://www.computerworld.com/newsletters/signup.htmlhttp://www.ereg.me/IDGEventshttp://itjobs.computerworld.com/http://itjobs.computerworld.com/http://www.ereg.me/IDGEventshttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/resources/download-libraryhttp://www.computerworld.com/tag/computerworlddigitalmagazine/http://www.computerworld.com/video/http://www.computerworld.com/slideshows/http://www.computerworld.com/blog/shark-tank/http://www.computerworld.com/insider/http://www.computerworld.com/opinion/http://www.computerworld.com/blogs/http://www.computerworld.com/reviews/http://www.computerworld.com/feature/http://www.computerworld.com/news/http://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#searchhttp://www.computerworld.com/resourceshttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.htmlhttp://www.computerworld.com/article/3083424/social-media/i-don-t-want-to-be-linkedin-with-microsoft.html -
7/26/2019 cloud tools
2/14
Resources/White Papers
Home
Cloud Computing
NEWS
IBM tackles 'shadow IT' with a new cloud
security tool for enterprises
MORE LIKE THIS
The cloud gets mobile apps moving
Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone
http://www.computerworld.com/resources/http://www.computerworld.com/http://www.computerworld.com/http://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/newshttp://www.computerworld.com/article/2971519/cloud-computing/the-cloud-gets-mobile-apps-moving.htmlhttp://www.computerworld.com/article/2989939/mobile-security/mobile-security-ios-vs-android-vs-blackberry-vs-windows-phone.htmlhttp://www.computerworld.com/article/2989939/mobile-security/mobile-security-ios-vs-android-vs-blackberry-vs-windows-phone.htmlhttp://www.computerworld.com/article/2971519/cloud-computing/the-cloud-gets-mobile-apps-moving.htmlhttp://www.computerworld.com/article/2989939/mobile-security/mobile-security-ios-vs-android-vs-blackberry-vs-windows-phone.htmlhttp://www.computerworld.com/article/2971519/cloud-computing/the-cloud-gets-mobile-apps-moving.htmlhttp://www.computerworld.com/newshttp://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/http://www.computerworld.com/resources/ -
7/26/2019 cloud tools
3/14
When video collaboration makes sense in the cloud
on IDGAnswers
How is data stored and accessed in the cloud?
http://www.computerworld.com/article/2960774/enterprise-applications/when-video-collaboration-makes-sense-in-the-cloud.htmlhttp://www.idganswers.com/question/23498/how-is-data-stored-and-accessed-in-the-cloud#src=ctwhttp://www.computerworld.com/article/2960774/enterprise-applications/when-video-collaboration-makes-sense-in-the-cloud.htmlhttp://www.idganswers.com/question/23498/how-is-data-stored-and-accessed-in-the-cloud#src=ctwhttp://www.computerworld.com/article/2960774/enterprise-applications/when-video-collaboration-makes-sense-in-the-cloud.html -
7/26/2019 cloud tools
4/14
-
7/26/2019 cloud tools
5/14
Credit: IDGNS
A third of Fortune 1000 employees share and uploadcorporate data on third-party cloud apps, it says
ByKatherine Noyes
FOLLOW
IDG News Service| Sep 23, 2015 3:49 AM PT
RELATED TOPICS
Cloud Computing
Consumerization of IT
Application Security
Bring Your Own Device (BYOD)
IBM
COMMENTS
If there's one thing that can strike terror into a CIO's heart, it's
the security implications of the cloud. If there's another, it's the
"bring your own" technology trend. Combine the two, and
you've got the motivation behind IBM's new Cloud SecurityEnforcer.
http://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#followhttp://www.idgnews.net/http://www.idgnews.net/http://www.computerworld.com/category/cloud-computinghttp://www.computerworld.com/category/cloud-computinghttp://www.computerworld.com/category/consumerization-of-ithttp://www.computerworld.com/category/consumerization-of-ithttp://www.computerworld.com/category/application-securityhttp://www.computerworld.com/category/application-securityhttp://www.computerworld.com/category/byodhttp://www.computerworld.com/category/byodhttp://www.computerworld.com/tag/ibm/http://www.computerworld.com/tag/ibm/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/tag/ibm/http://www.computerworld.com/category/byodhttp://www.computerworld.com/category/application-securityhttp://www.computerworld.com/category/consumerization-of-ithttp://www.computerworld.com/category/cloud-computinghttp://www.idgnews.net/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#followhttp://www.computerworld.com/author/Katherine-Noyes/ -
7/26/2019 cloud tools
6/14
Thanks to having set up used a private email server while
U.S. Secretary of State, Hillary Clinton has become a poster
child for "Shadow IT," or the phenomenon by which
employees bring their own technologies into the workplace,
but there's no denying its prevalence. One-third of Fortune1000 employees share and upload corporate data on third-
party cloud apps, according to a recent IBM Securitystudy.
One in four link to cloud apps using a corporate log-in and
password.
Your step-by-step guide to repairing Windows 10
When Windows 10 gets wonky, there's a whole set of activities to try and set things
right. IfREAD NOW
Announced Tuesday, Cloud Security Enforcer aims to help
companies safeguard the increasing use of bring your own
cloud-based apps at work. It combines cloud identity
management, also known as Identity-as-a-Service, with the
ability to discover any outside apps employees are using,
including those on their mobile devices. Equipped with those
combined capabilities, it enables companies to make access
more secure, IBM said.
Hosted on IBM Cloud, the tool can scan a corporate network,
find the apps employees are using and provide a more secure
way to access them. Four core capabilities help make that
happen.
First, companies can detect unauthorized cloud app usage,
enabling them to identify and securely configure the apps that
employees want to use as well as manage, view and directhow employees can use them.
https://securityintelligence.com/to-the-cloud-whether-its-allowed-or-not/https://securityintelligence.com/to-the-cloud-whether-its-allowed-or-not/https://securityintelligence.com/to-the-cloud-whether-its-allowed-or-not/http://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttps://securityintelligence.com/to-the-cloud-whether-its-allowed-or-not/ -
7/26/2019 cloud tools
7/14
Cloud Security Enforcer can also be used to determine and
enforce which data owned by an organization can or cannot
be shared by employees via specific third-party cloud apps.
The tool can connect employees to third-party cloud appsthrough security-focused connectors, including automatically
assigning sophisticated passwords. That, in turn, can help
alleviate security breaches caused by human error, IBM said.
Finally, Cloud Security Enforcer can also help protect against
employee-induced and cloud-based threats by analyzing real-
time threat data from IBMs global X-Force Exchange threat
intelligence network, which scans the Internet and analyzes
more than 20 billion global security events daily.
IBM has built connectors for Cloud Security Enforcer into
Boxs cloud-based content management and collaboration
platform as well as Microsoft Office 365, Google Apps,
Salesforce.com and other popular enterprise software. Pricing
information was not immediately available.
Katherine NoyesSenior U.S. Correspondent
Katherine Noyes has been an ardent geek ever since she first conquered Pyramid of
Doom on an ancient TRS-80. Today she covers enterprise software in all its forms,
with an emphasis on cloud computing, big data, analytics and artificial intelligence.
The advanced beginner's guide to R
View Comments
YOU MIGHT LIKEJOIN THE DISCUSSIONBe the first to comment on this article.Our Commenting Policies
http://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.html#tk.ctw-infsbhttp://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.html#tk.ctw-infsbhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/about/comment-policy.htmlhttp://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/about/comment-policy.htmlhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.html#tk.ctw-infsbhttp://www.computerworld.com/author/Katherine-Noyes/ -
7/26/2019 cloud tools
8/14
Login
0 Comments
Sort
Subscribe
RSS
WHAT READERS LIKE
Scientists can now make lithium-ion batteries last a lifetime
Researchers at the University of California have discovered a way to usenanowires to allow lithium-ion...
4 new ways to bypass passcode lock screen on iPhones, iPads running iOS 9
http://comments.us1.gigya.com/comments/rss/6407831/cw/2985513http://www.computerworld.com/article/3060005/mobile-wireless/scientists-can-now-make-lithium-ion-batteries-last-a-lifetime.htmlhttp://www.computerworld.com/article/3041302/security/4-new-ways-to-bypass-passcode-lock-screen-on-iphones-ipads-running-ios-9.htmlhttp://www.computerworld.com/article/3041302/security/4-new-ways-to-bypass-passcode-lock-screen-on-iphones-ipads-running-ios-9.htmlhttp://www.computerworld.com/article/3060005/mobile-wireless/scientists-can-now-make-lithium-ion-batteries-last-a-lifetime.htmlhttp://www.computerworld.com/article/3041302/security/4-new-ways-to-bypass-passcode-lock-screen-on-iphones-ipads-running-ios-9.htmlhttp://www.computerworld.com/article/3060005/mobile-wireless/scientists-can-now-make-lithium-ion-batteries-last-a-lifetime.htmlhttp://comments.us1.gigya.com/comments/rss/6407831/cw/2985513 -
7/26/2019 cloud tools
9/14
Sen. Durbin calls Abbott Labs' IT layoffs 'harsh and insensitive
NEWSLETTERS
Sign up and receive the latest news, reviews and trends on your favorite technologytopics.
Get our daily newsletter
Go
Google's asinine Gmail prank: What were these fools thinking?
Apple del ivers a 'significant' update wi th iOS 9.3
http://www.computerworld.com/article/3039353/it-careers/sen-durbin-calls-abbott-labs-it-layoffs-harsh-and-insensitive.htmlhttp://www.computerworld.com/article/3039353/it-careers/sen-durbin-calls-abbott-labs-it-layoffs-harsh-and-insensitive.htmlhttp://www.computerworld.com/article/3051113/cloud-computing/google-april-fools-day-gmail-itbwcw.htmlhttp://www.computerworld.com/article/3046632/apple-ios/apple-delivers-a-significant-update-with-ios-9-3.htmlhttp://www.computerworld.com/article/3046632/apple-ios/apple-delivers-a-significant-update-with-ios-9-3.htmlhttp://www.computerworld.com/article/3051113/cloud-computing/google-april-fools-day-gmail-itbwcw.htmlhttp://www.computerworld.com/article/3039353/it-careers/sen-durbin-calls-abbott-labs-it-layoffs-harsh-and-insensitive.htmlhttp://www.computerworld.com/article/3046632/apple-ios/apple-delivers-a-significant-update-with-ios-9-3.htmlhttp://www.computerworld.com/article/3051113/cloud-computing/google-april-fools-day-gmail-itbwcw.htmlhttp://www.computerworld.com/article/3039353/it-careers/sen-durbin-calls-abbott-labs-it-layoffs-harsh-and-insensitive.html -
7/26/2019 cloud tools
10/14
After releasing seven developer betas and several public betas, Apple on Monday
released a noteworthy...
BrandPosts
Learn more
POPULAR RESOURCES
A Cloud for Every Workload
Are You a Security-First Organization?
But I Was Compliant: Investing in Top-Down Security to Build a Compliant
Business
Cross-Enterprise Workload Automation helps reduce cost and complexity,
improve service delivery
http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://resources.computerworld.com/ccd/assets/111777/detailhttp://resources.computerworld.com/ccd/assets/111792/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111737/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111792/detailhttp://resources.computerworld.com/ccd/assets/111777/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111792/detailhttp://resources.computerworld.com/ccd/assets/111777/detailhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f -
7/26/2019 cloud tools
11/14
Feeling the Love for Node.js: The Performance Basics You Need to know
Now
Go
TOP STORIES
Asus challenges the iPad Mini with the less-pr icey ZenPad Z8
At $249.99, Asus' new ZenPad Z8 tablet with Android could make one ponder why
to buy Apple's iPad Mini...
View, search and sort the 100 Best Places to Work in IT
Search by company name, sort by size or location, or filter by criteria important to
you.
Laid-off w ith a non-compete? Bil l would guarantee salary
A proposal in Massachusetts -- not widely expected to pass -- would require an
employer to pay at least...
The next billion: How to best serve the Internets new users
To a large degree, technology companies can do more than the law to make online
transactions...
ComputerworldThe Voice of Business TechnologyFOLLOW US
http://resources.computerworld.com/ccd/assets/111737/detailhttp://resources.computerworld.com/ccd/assets/111737/detailhttp://www.computerworld.com/article/3085066/computer-hardware/asus-challenges-the-ipad-mini-with-the-less-pricey-zenpad-z8.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/http://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3085066/computer-hardware/asus-challenges-the-ipad-mini-with-the-less-pricey-zenpad-z8.htmlhttp://www.computerworld.com/http://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3085066/computer-hardware/asus-challenges-the-ipad-mini-with-the-less-pricey-zenpad-z8.htmlhttp://resources.computerworld.com/ccd/assets/111737/detailhttp://resources.computerworld.com/ccd/assets/111737/detail -
7/26/2019 cloud tools
12/14
CLOUD COMPUTING
COMPUTER HARDWARE
CONSUMERIZATION OF IT
DATA CENTER
EMERGING TECHNOLOGY ENTERPRISE APPLICATIONS
IT MANAGEMENT
INTERNET
MOBILE & WIRELESS
NETWORKING OPERATING SYSTEMS
SECURITY
VERTICAL IT
All Topics
News
http://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/category/computer-hardware/http://www.computerworld.com/category/computer-hardware/http://www.computerworld.com/category/consumerization-of-it/http://www.computerworld.com/category/consumerization-of-it/http://www.computerworld.com/category/data-center/http://www.computerworld.com/category/data-center/http://www.computerworld.com/category/emerging-technology/http://www.computerworld.com/category/emerging-technology/http://www.computerworld.com/category/enterprise-applications/http://www.computerworld.com/category/enterprise-applications/http://www.computerworld.com/category/it-management/http://www.computerworld.com/category/it-management/http://www.computerworld.com/category/internet/http://www.computerworld.com/category/internet/http://www.computerworld.com/category/mobile-wireless/http://www.computerworld.com/category/mobile-wireless/http://www.computerworld.com/category/networking/http://www.computerworld.com/category/networking/http://www.computerworld.com/category/operating-systems/http://www.computerworld.com/category/operating-systems/http://www.computerworld.com/category/security/http://www.computerworld.com/category/security/http://www.computerworld.com/category/vertical-it/http://www.computerworld.com/category/vertical-it/http://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/newshttp://www.computerworld.com/newshttp://www.computerworld.com/newshttp://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/category/vertical-it/http://www.computerworld.com/category/security/http://www.computerworld.com/category/operating-systems/http://www.computerworld.com/category/networking/http://www.computerworld.com/category/mobile-wireless/http://www.computerworld.com/category/internet/http://www.computerworld.com/category/it-management/http://www.computerworld.com/category/enterprise-applications/http://www.computerworld.com/category/emerging-technology/http://www.computerworld.com/category/data-center/http://www.computerworld.com/category/consumerization-of-it/http://www.computerworld.com/category/computer-hardware/http://www.computerworld.com/category/cloud-computing/ -
7/26/2019 cloud tools
13/14
Features
Reviews
Blogs
Opinions
Insider
Shark Tank
Slideshows
Video
Newsletters
Computerworld Events
Resources/White Papers
ABOUT US CONTACT PRIVACYPOLICIES EDITORIALCALENDAR ADVERTISING
CAREERS AT IDG
SITEMAP AD CHOICES
http://www.computerworld.com/featurehttp://www.computerworld.com/featurehttp://www.computerworld.com/reviewshttp://www.computerworld.com/reviewshttp://www.computerworld.com/blogshttp://www.computerworld.com/blogshttp://www.computerworld.com/opinionhttp://www.computerworld.com/opinionhttp://www.computerworld.com/insiderhttp://www.computerworld.com/insiderhttp://www.computerworld.com/blog/shark-tankhttp://www.computerworld.com/blog/shark-tankhttp://www.computerworld.com/slideshowshttp://www.computerworld.com/slideshowshttp://www.computerworld.com/videohttp://www.computerworld.com/videohttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/newsletters/signup.htmlhttp://www.ereg.me/IDGEventshttp://www.ereg.me/IDGEventshttp://www.computerworld.com/resourceshttp://www.computerworld.com/resourceshttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://www.idgenterprise.com/reach/computerworld/http://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://careers.idg.com/http://careers.idg.com/http://www.computerworld.com/about/sitemap.htmlhttp://careers.idg.com/http://careers.idg.com/http://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/sitemap.htmlhttp://careers.idg.com/http://www.idgenterprise.com/reach/computerworld/http://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://www.computerworld.com/about/privacy.htmlhttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/about/about.htmlhttp://www.computerworld.com/resourceshttp://www.ereg.me/IDGEventshttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/videohttp://www.computerworld.com/slideshowshttp://www.computerworld.com/blog/shark-tankhttp://www.computerworld.com/insiderhttp://www.computerworld.com/opinionhttp://www.computerworld.com/blogshttp://www.computerworld.com/reviewshttp://www.computerworld.com/feature -
7/26/2019 cloud tools
14/14
E-COMMERCEAFFILIATE RELATIONSHIPS
Copyright 1994 - 2016 Computerworld, Inc. All rights reserved.Explore the IDG Networkdescend
http://www.computerworld.com/about/affiliates.htmlhttp://www.computerworld.com/about/affiliates.htmlhttp://www.computerworld.com/about/copyright.htmlhttp://www.computerworld.com/about/copyright.htmlhttp://www.computerworld.com/about/affiliates.html