cloud tools

Upload: sai

Post on 02-Mar-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/26/2019 cloud tools

    1/14

    TRENDING: Idontwant tobe LinkedIn with Microsoft

    Advancedbeginner's guide toR

    Subscribeto newsletters

    Resources/White Papers

    Search

    computerworld

    Sign In|Register Cloud Computing Computer Hardware Consumerization of IT Data Center

    Emerging Technology Enterprise Applications IT Management Internet Mobile & Wireless Networking Operating Systems Security

    Vertical IT

    All Topics News Features Reviews Blogs Opinions Insider Shark Tank Slideshows Video Digital Magazine Digital Downloads Newsletters Computerworld Events IT Job Search

    http://www.computerworld.com/article/3083424/social-media/i-don-t-want-to-be-linkedin-with-microsoft.htmlhttp://www.computerworld.com/article/3083424/social-media/i-don-t-want-to-be-linkedin-with-microsoft.htmlhttp://www.computerworld.com/article/3083424/social-media/i-don-t-want-to-be-linkedin-with-microsoft.htmlhttp://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.htmlhttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/resourceshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#searchhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#searchhttp://www.computerworld.com/http://www.computerworld.com/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/news/http://www.computerworld.com/feature/http://www.computerworld.com/reviews/http://www.computerworld.com/blogs/http://www.computerworld.com/opinion/http://www.computerworld.com/insider/http://www.computerworld.com/blog/shark-tank/http://www.computerworld.com/slideshows/http://www.computerworld.com/video/http://www.computerworld.com/tag/computerworlddigitalmagazine/http://www.computerworld.com/resources/download-libraryhttp://www.computerworld.com/newsletters/signup.htmlhttp://www.ereg.me/IDGEventshttp://itjobs.computerworld.com/http://itjobs.computerworld.com/http://www.ereg.me/IDGEventshttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/resources/download-libraryhttp://www.computerworld.com/tag/computerworlddigitalmagazine/http://www.computerworld.com/video/http://www.computerworld.com/slideshows/http://www.computerworld.com/blog/shark-tank/http://www.computerworld.com/insider/http://www.computerworld.com/opinion/http://www.computerworld.com/blogs/http://www.computerworld.com/reviews/http://www.computerworld.com/feature/http://www.computerworld.com/news/http://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#searchhttp://www.computerworld.com/resourceshttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.htmlhttp://www.computerworld.com/article/3083424/social-media/i-don-t-want-to-be-linkedin-with-microsoft.html
  • 7/26/2019 cloud tools

    2/14

    Resources/White Papers

    Home

    Cloud Computing

    NEWS

    IBM tackles 'shadow IT' with a new cloud

    security tool for enterprises

    MORE LIKE THIS

    The cloud gets mobile apps moving

    Mobile security: iOS vs. Android vs. BlackBerry vs. Windows Phone

    http://www.computerworld.com/resources/http://www.computerworld.com/http://www.computerworld.com/http://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/newshttp://www.computerworld.com/article/2971519/cloud-computing/the-cloud-gets-mobile-apps-moving.htmlhttp://www.computerworld.com/article/2989939/mobile-security/mobile-security-ios-vs-android-vs-blackberry-vs-windows-phone.htmlhttp://www.computerworld.com/article/2989939/mobile-security/mobile-security-ios-vs-android-vs-blackberry-vs-windows-phone.htmlhttp://www.computerworld.com/article/2971519/cloud-computing/the-cloud-gets-mobile-apps-moving.htmlhttp://www.computerworld.com/article/2989939/mobile-security/mobile-security-ios-vs-android-vs-blackberry-vs-windows-phone.htmlhttp://www.computerworld.com/article/2971519/cloud-computing/the-cloud-gets-mobile-apps-moving.htmlhttp://www.computerworld.com/newshttp://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/http://www.computerworld.com/resources/
  • 7/26/2019 cloud tools

    3/14

    When video collaboration makes sense in the cloud

    on IDGAnswers

    How is data stored and accessed in the cloud?

    http://www.computerworld.com/article/2960774/enterprise-applications/when-video-collaboration-makes-sense-in-the-cloud.htmlhttp://www.idganswers.com/question/23498/how-is-data-stored-and-accessed-in-the-cloud#src=ctwhttp://www.computerworld.com/article/2960774/enterprise-applications/when-video-collaboration-makes-sense-in-the-cloud.htmlhttp://www.idganswers.com/question/23498/how-is-data-stored-and-accessed-in-the-cloud#src=ctwhttp://www.computerworld.com/article/2960774/enterprise-applications/when-video-collaboration-makes-sense-in-the-cloud.html
  • 7/26/2019 cloud tools

    4/14

  • 7/26/2019 cloud tools

    5/14

    Credit: IDGNS

    A third of Fortune 1000 employees share and uploadcorporate data on third-party cloud apps, it says

    ByKatherine Noyes

    FOLLOW

    IDG News Service| Sep 23, 2015 3:49 AM PT

    RELATED TOPICS

    Cloud Computing

    Consumerization of IT

    Application Security

    Bring Your Own Device (BYOD)

    IBM

    COMMENTS

    If there's one thing that can strike terror into a CIO's heart, it's

    the security implications of the cloud. If there's another, it's the

    "bring your own" technology trend. Combine the two, and

    you've got the motivation behind IBM's new Cloud SecurityEnforcer.

    http://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#followhttp://www.idgnews.net/http://www.idgnews.net/http://www.computerworld.com/category/cloud-computinghttp://www.computerworld.com/category/cloud-computinghttp://www.computerworld.com/category/consumerization-of-ithttp://www.computerworld.com/category/consumerization-of-ithttp://www.computerworld.com/category/application-securityhttp://www.computerworld.com/category/application-securityhttp://www.computerworld.com/category/byodhttp://www.computerworld.com/category/byodhttp://www.computerworld.com/tag/ibm/http://www.computerworld.com/tag/ibm/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#emailhttp://www.stumbleupon.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://reddit.com/submit?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://plus.google.com/share?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttp://www.linkedin.com/shareArticle?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&title=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://www.facebook.com/sharer/sharer.php?u=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.htmlhttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttps://twitter.com/intent/tweet?url=http%3A%2F%2Fwww.computerworld.com%2Farticle%2F2985513%2Fcloud-computing%2Fibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html&via=computerworld&text=IBM+tackles+%27shadow+IT%27+with+a+new+cloud+security+tool+for+enterpriseshttp://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/tag/ibm/http://www.computerworld.com/category/byodhttp://www.computerworld.com/category/application-securityhttp://www.computerworld.com/category/consumerization-of-ithttp://www.computerworld.com/category/cloud-computinghttp://www.idgnews.net/http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#followhttp://www.computerworld.com/author/Katherine-Noyes/
  • 7/26/2019 cloud tools

    6/14

    Thanks to having set up used a private email server while

    U.S. Secretary of State, Hillary Clinton has become a poster

    child for "Shadow IT," or the phenomenon by which

    employees bring their own technologies into the workplace,

    but there's no denying its prevalence. One-third of Fortune1000 employees share and upload corporate data on third-

    party cloud apps, according to a recent IBM Securitystudy.

    One in four link to cloud apps using a corporate log-in and

    password.

    Your step-by-step guide to repairing Windows 10

    When Windows 10 gets wonky, there's a whole set of activities to try and set things

    right. IfREAD NOW

    Announced Tuesday, Cloud Security Enforcer aims to help

    companies safeguard the increasing use of bring your own

    cloud-based apps at work. It combines cloud identity

    management, also known as Identity-as-a-Service, with the

    ability to discover any outside apps employees are using,

    including those on their mobile devices. Equipped with those

    combined capabilities, it enables companies to make access

    more secure, IBM said.

    Hosted on IBM Cloud, the tool can scan a corporate network,

    find the apps employees are using and provide a more secure

    way to access them. Four core capabilities help make that

    happen.

    First, companies can detect unauthorized cloud app usage,

    enabling them to identify and securely configure the apps that

    employees want to use as well as manage, view and directhow employees can use them.

    https://securityintelligence.com/to-the-cloud-whether-its-allowed-or-not/https://securityintelligence.com/to-the-cloud-whether-its-allowed-or-not/https://securityintelligence.com/to-the-cloud-whether-its-allowed-or-not/http://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttp://www.computerworld.com/article/3080839/microsoft-windows/your-step-by-step-guide-to-repairing-windows-10.htmlhttps://securityintelligence.com/to-the-cloud-whether-its-allowed-or-not/
  • 7/26/2019 cloud tools

    7/14

    Cloud Security Enforcer can also be used to determine and

    enforce which data owned by an organization can or cannot

    be shared by employees via specific third-party cloud apps.

    The tool can connect employees to third-party cloud appsthrough security-focused connectors, including automatically

    assigning sophisticated passwords. That, in turn, can help

    alleviate security breaches caused by human error, IBM said.

    Finally, Cloud Security Enforcer can also help protect against

    employee-induced and cloud-based threats by analyzing real-

    time threat data from IBMs global X-Force Exchange threat

    intelligence network, which scans the Internet and analyzes

    more than 20 billion global security events daily.

    IBM has built connectors for Cloud Security Enforcer into

    Boxs cloud-based content management and collaboration

    platform as well as Microsoft Office 365, Google Apps,

    Salesforce.com and other popular enterprise software. Pricing

    information was not immediately available.

    Katherine NoyesSenior U.S. Correspondent

    Katherine Noyes has been an ardent geek ever since she first conquered Pyramid of

    Doom on an ancient TRS-80. Today she covers enterprise software in all its forms,

    with an emphasis on cloud computing, big data, analytics and artificial intelligence.

    The advanced beginner's guide to R

    View Comments

    YOU MIGHT LIKEJOIN THE DISCUSSIONBe the first to comment on this article.Our Commenting Policies

    http://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.html#tk.ctw-infsbhttp://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.html#tk.ctw-infsbhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/about/comment-policy.htmlhttp://www.computerworld.com/author/Katherine-Noyes/http://www.computerworld.com/about/comment-policy.htmlhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f#commentshttp://www.computerworld.com/article/3079808/data-analytics/the-advanced-beginners-guide-to-r.html#tk.ctw-infsbhttp://www.computerworld.com/author/Katherine-Noyes/
  • 7/26/2019 cloud tools

    8/14

    Login

    0 Comments

    Sort

    Subscribe

    RSS

    WHAT READERS LIKE

    Scientists can now make lithium-ion batteries last a lifetime

    Researchers at the University of California have discovered a way to usenanowires to allow lithium-ion...

    4 new ways to bypass passcode lock screen on iPhones, iPads running iOS 9

    http://comments.us1.gigya.com/comments/rss/6407831/cw/2985513http://www.computerworld.com/article/3060005/mobile-wireless/scientists-can-now-make-lithium-ion-batteries-last-a-lifetime.htmlhttp://www.computerworld.com/article/3041302/security/4-new-ways-to-bypass-passcode-lock-screen-on-iphones-ipads-running-ios-9.htmlhttp://www.computerworld.com/article/3041302/security/4-new-ways-to-bypass-passcode-lock-screen-on-iphones-ipads-running-ios-9.htmlhttp://www.computerworld.com/article/3060005/mobile-wireless/scientists-can-now-make-lithium-ion-batteries-last-a-lifetime.htmlhttp://www.computerworld.com/article/3041302/security/4-new-ways-to-bypass-passcode-lock-screen-on-iphones-ipads-running-ios-9.htmlhttp://www.computerworld.com/article/3060005/mobile-wireless/scientists-can-now-make-lithium-ion-batteries-last-a-lifetime.htmlhttp://comments.us1.gigya.com/comments/rss/6407831/cw/2985513
  • 7/26/2019 cloud tools

    9/14

    Sen. Durbin calls Abbott Labs' IT layoffs 'harsh and insensitive

    NEWSLETTERS

    Sign up and receive the latest news, reviews and trends on your favorite technologytopics.

    Get our daily newsletter

    Go

    Google's asinine Gmail prank: What were these fools thinking?

    Apple del ivers a 'significant' update wi th iOS 9.3

    http://www.computerworld.com/article/3039353/it-careers/sen-durbin-calls-abbott-labs-it-layoffs-harsh-and-insensitive.htmlhttp://www.computerworld.com/article/3039353/it-careers/sen-durbin-calls-abbott-labs-it-layoffs-harsh-and-insensitive.htmlhttp://www.computerworld.com/article/3051113/cloud-computing/google-april-fools-day-gmail-itbwcw.htmlhttp://www.computerworld.com/article/3046632/apple-ios/apple-delivers-a-significant-update-with-ios-9-3.htmlhttp://www.computerworld.com/article/3046632/apple-ios/apple-delivers-a-significant-update-with-ios-9-3.htmlhttp://www.computerworld.com/article/3051113/cloud-computing/google-april-fools-day-gmail-itbwcw.htmlhttp://www.computerworld.com/article/3039353/it-careers/sen-durbin-calls-abbott-labs-it-layoffs-harsh-and-insensitive.htmlhttp://www.computerworld.com/article/3046632/apple-ios/apple-delivers-a-significant-update-with-ios-9-3.htmlhttp://www.computerworld.com/article/3051113/cloud-computing/google-april-fools-day-gmail-itbwcw.htmlhttp://www.computerworld.com/article/3039353/it-careers/sen-durbin-calls-abbott-labs-it-layoffs-harsh-and-insensitive.html
  • 7/26/2019 cloud tools

    10/14

    After releasing seven developer betas and several public betas, Apple on Monday

    released a noteworthy...

    BrandPosts

    Learn more

    POPULAR RESOURCES

    A Cloud for Every Workload

    Are You a Security-First Organization?

    But I Was Compliant: Investing in Top-Down Security to Build a Compliant

    Business

    Cross-Enterprise Workload Automation helps reduce cost and complexity,

    improve service delivery

    http://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6fhttp://resources.computerworld.com/ccd/assets/111777/detailhttp://resources.computerworld.com/ccd/assets/111792/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111737/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111792/detailhttp://resources.computerworld.com/ccd/assets/111777/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111808/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111787/detailhttp://resources.computerworld.com/ccd/assets/111792/detailhttp://resources.computerworld.com/ccd/assets/111777/detailhttp://www.computerworld.com/article/2985513/cloud-computing/ibm-tackles-shadow-it-with-a-new-cloud-security-tool-for-enterprises.html?phint=newt%3Dcomputerworld_security&phint=idg_eid%3Dacc2593e38e927fe28a6046504355a6f
  • 7/26/2019 cloud tools

    11/14

    Feeling the Love for Node.js: The Performance Basics You Need to know

    Now

    Go

    TOP STORIES

    Asus challenges the iPad Mini with the less-pr icey ZenPad Z8

    At $249.99, Asus' new ZenPad Z8 tablet with Android could make one ponder why

    to buy Apple's iPad Mini...

    View, search and sort the 100 Best Places to Work in IT

    Search by company name, sort by size or location, or filter by criteria important to

    you.

    Laid-off w ith a non-compete? Bil l would guarantee salary

    A proposal in Massachusetts -- not widely expected to pass -- would require an

    employer to pay at least...

    The next billion: How to best serve the Internets new users

    To a large degree, technology companies can do more than the law to make online

    transactions...

    ComputerworldThe Voice of Business TechnologyFOLLOW US

    http://resources.computerworld.com/ccd/assets/111737/detailhttp://resources.computerworld.com/ccd/assets/111737/detailhttp://www.computerworld.com/article/3085066/computer-hardware/asus-challenges-the-ipad-mini-with-the-less-pricey-zenpad-z8.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/http://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3085066/computer-hardware/asus-challenges-the-ipad-mini-with-the-less-pricey-zenpad-z8.htmlhttp://www.computerworld.com/http://www.computerworld.com/article/3084312/internet/the-next-billion-how-to-best-serve-the-internet-s-new-users.htmlhttp://www.computerworld.com/article/3083909/it-careers/laid-off-with-a-non-compete-bill-would-guarantee-salary.htmlhttp://www.computerworld.com/article/3082092/bestplaces2016/view-search-and-sort-the-100-best-places-to-work-in-it.htmlhttp://www.computerworld.com/article/3085066/computer-hardware/asus-challenges-the-ipad-mini-with-the-less-pricey-zenpad-z8.htmlhttp://resources.computerworld.com/ccd/assets/111737/detailhttp://resources.computerworld.com/ccd/assets/111737/detail
  • 7/26/2019 cloud tools

    12/14

    CLOUD COMPUTING

    COMPUTER HARDWARE

    CONSUMERIZATION OF IT

    DATA CENTER

    EMERGING TECHNOLOGY ENTERPRISE APPLICATIONS

    IT MANAGEMENT

    INTERNET

    MOBILE & WIRELESS

    NETWORKING OPERATING SYSTEMS

    SECURITY

    VERTICAL IT

    All Topics

    News

    http://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/category/cloud-computing/http://www.computerworld.com/category/computer-hardware/http://www.computerworld.com/category/computer-hardware/http://www.computerworld.com/category/consumerization-of-it/http://www.computerworld.com/category/consumerization-of-it/http://www.computerworld.com/category/data-center/http://www.computerworld.com/category/data-center/http://www.computerworld.com/category/emerging-technology/http://www.computerworld.com/category/emerging-technology/http://www.computerworld.com/category/enterprise-applications/http://www.computerworld.com/category/enterprise-applications/http://www.computerworld.com/category/it-management/http://www.computerworld.com/category/it-management/http://www.computerworld.com/category/internet/http://www.computerworld.com/category/internet/http://www.computerworld.com/category/mobile-wireless/http://www.computerworld.com/category/mobile-wireless/http://www.computerworld.com/category/networking/http://www.computerworld.com/category/networking/http://www.computerworld.com/category/operating-systems/http://www.computerworld.com/category/operating-systems/http://www.computerworld.com/category/security/http://www.computerworld.com/category/security/http://www.computerworld.com/category/vertical-it/http://www.computerworld.com/category/vertical-it/http://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/newshttp://www.computerworld.com/newshttp://www.computerworld.com/newshttp://www.computerworld.com/about/sitemap.htmlhttp://www.computerworld.com/category/vertical-it/http://www.computerworld.com/category/security/http://www.computerworld.com/category/operating-systems/http://www.computerworld.com/category/networking/http://www.computerworld.com/category/mobile-wireless/http://www.computerworld.com/category/internet/http://www.computerworld.com/category/it-management/http://www.computerworld.com/category/enterprise-applications/http://www.computerworld.com/category/emerging-technology/http://www.computerworld.com/category/data-center/http://www.computerworld.com/category/consumerization-of-it/http://www.computerworld.com/category/computer-hardware/http://www.computerworld.com/category/cloud-computing/
  • 7/26/2019 cloud tools

    13/14

    Features

    Reviews

    Blogs

    Opinions

    Insider

    Shark Tank

    Slideshows

    Video

    Newsletters

    Computerworld Events

    Resources/White Papers

    ABOUT US CONTACT PRIVACYPOLICIES EDITORIALCALENDAR ADVERTISING

    CAREERS AT IDG

    SITEMAP AD CHOICES

    http://www.computerworld.com/featurehttp://www.computerworld.com/featurehttp://www.computerworld.com/reviewshttp://www.computerworld.com/reviewshttp://www.computerworld.com/blogshttp://www.computerworld.com/blogshttp://www.computerworld.com/opinionhttp://www.computerworld.com/opinionhttp://www.computerworld.com/insiderhttp://www.computerworld.com/insiderhttp://www.computerworld.com/blog/shark-tankhttp://www.computerworld.com/blog/shark-tankhttp://www.computerworld.com/slideshowshttp://www.computerworld.com/slideshowshttp://www.computerworld.com/videohttp://www.computerworld.com/videohttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/newsletters/signup.htmlhttp://www.ereg.me/IDGEventshttp://www.ereg.me/IDGEventshttp://www.computerworld.com/resourceshttp://www.computerworld.com/resourceshttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://www.idgenterprise.com/reach/computerworld/http://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://careers.idg.com/http://careers.idg.com/http://www.computerworld.com/about/sitemap.htmlhttp://careers.idg.com/http://careers.idg.com/http://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/adchoices.htmlhttp://www.computerworld.com/about/sitemap.htmlhttp://careers.idg.com/http://www.idgenterprise.com/reach/computerworld/http://www.computerworld.com/article/2879003/download-computerworlds-editorial-calendarhttp://www.computerworld.com/about/privacy.htmlhttp://www.computerworld.com/about/contactus.htmlhttp://www.computerworld.com/about/about.htmlhttp://www.computerworld.com/resourceshttp://www.ereg.me/IDGEventshttp://www.computerworld.com/newsletters/signup.htmlhttp://www.computerworld.com/videohttp://www.computerworld.com/slideshowshttp://www.computerworld.com/blog/shark-tankhttp://www.computerworld.com/insiderhttp://www.computerworld.com/opinionhttp://www.computerworld.com/blogshttp://www.computerworld.com/reviewshttp://www.computerworld.com/feature
  • 7/26/2019 cloud tools

    14/14

    E-COMMERCEAFFILIATE RELATIONSHIPS

    Copyright 1994 - 2016 Computerworld, Inc. All rights reserved.Explore the IDG Networkdescend

    http://www.computerworld.com/about/affiliates.htmlhttp://www.computerworld.com/about/affiliates.htmlhttp://www.computerworld.com/about/copyright.htmlhttp://www.computerworld.com/about/copyright.htmlhttp://www.computerworld.com/about/affiliates.html