IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Multimedia (View All Report Types)
1 - 25 of 55 Matches Previous Page  |  Next Page
Effective Data Protection for Your Virtual Environment
sponsored by IBM
VIDEO: This video discusses the capabilities of a strong virtual data protection system to demonstrate how you can best protect data in your virtual environment.
Posted: 09 Jul 2015 | Premiered: 08 Sep 2014

IBM

Software-Defined Security and the Agile Data Center
sponsored by CloudPassage
WEBCAST: On this webinar, you'll hear from Neil MacDonald, VP Distinguished Analyst from Gartner Research, and CloudPassage's Co-founder and Chief Strategy Officer, Carson Sweet. They'll share insights into the changes required for security and compliance in the new, more agile data center.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015

CloudPassage

Virtualization Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at how malware is adapting to virtual networks and tools (advanced malware protection) and processes (hardening, logging, snapshots) that can help organizations secure these environments.
Posted: 17 Jun 2015 | Premiered: 16 Jun 2015

SearchSecurity.com

Podcast: Transform Your Customer‘s Infrastructure and Accelerate Your Profitability with HP Networking Converged Campus Offerings
sponsored by Hewlett-Packard Company
PODCAST: Access this Podcast now to discover the best ways to use software defined networking (SDN) to handle security threats and device management at a fraction of the cost and without any headache.
Posted: 28 Apr 2015 | Premiered: Apr 20, 2015

Hewlett-Packard Company

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

What if your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell, Inc. and Intel®
VIDEO: In this video, Brian Madden faces what happens if application virtualization solutions doesn't support location-based security.
Posted: 19 Jan 2015 | Premiered: 19 Jan 2015

Dell, Inc. and Intel®

Storage and Networking for Desktop Virtualization Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: Virtual desktops are a key step between server and app virtualization, and rising mobile technologies and cloud computing. But virtual desktop infrastructure poses challenges in the form of demands on networks and storage. We examine the best practices, product features and risks associated with storage and networking for desktop virtualization.
Posted: 03 Sep 2014 | Premiered: 03 Sep 2014

IBM

How can virtualization become your engine for smart growth?
sponsored by Red Hat
VIDEO: Not all virtualization is the same. You can lower capital and operational expenses, improve virtualized workload performance and manage your heterogeneous hypervisor environment, all while reducing virtual machine sprawl. Learn how leading organizations around the globe are growing with open, flexible virtualization solutions.
Posted: 04 Aug 2014 | Premiered: 23 May 2014

Red Hat

How to Save 100s of Backup Maintenance Hours
sponsored by Veeam Software
WEBCAST: This webinar highlights the difficulties of maintaining outdaed backup approaches. It also highlights the benefits of Veeam Backup and Replication, a solution that provides flexible, reliable and fast recovery of virtualized applications and data.
Posted: 06 May 2014 | Premiered: Apr 10, 2014

Veeam Software

Network Evolution University: Network Virtualization: Examining the options as SDN takes hold classroom
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom will help you choose the right network virtualization strategy for your network.
Posted: 26 Nov 2013 | Premiered: 26 Nov 2013

SearchNetworking.com

Red Hat Gives Adobe a Flexible IT Canvas
sponsored by Red Hat
VIDEO: Tune into this brief video to learn how Adobe is using the Red Hat platform and Amazon Web Services to help customers simplify deployment, lower cost of ownership, and accelerate time to value.
Posted: 24 Nov 2013 | Premiered: 05 Jul 2013

Red Hat

Podcast: Rethinking Desktop Virtualization: VDI Is Great, But Don't Forget That Other Technologies Shine When VDI Isn't Right
sponsored by Dell, Inc. and Intel®
PODCAST: Learn how organizational usage requirements dictate what kind of desktop virtualization strategies will work best for a particular business.
Posted: 18 Sep 2013 | Premiered: Sep 5, 2013

Dell, Inc. and Intel®

Show Me Simpana--Protect Your Data with Simpana 10
sponsored by Commvault
WEBCAST: Watch this short video to learn how one data protection platform introduces unprecedented capabilities to address snapshot management, reportingAccess from mobile devices, and more.
Posted: 09 Sep 2014 | Premiered: Jul 25, 2013

Commvault

Select the right VMware, Hyper-V protection for a modern data center
sponsored by Veeam Software
WEBCAST: This webinar explains how Nutanix and Veeam work together to enable performance and granular backup for critical workloads on any hypervisor.
Posted: 05 May 2014 | Premiered: Apr 17, 2014

Veeam Software

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Accelerate the Software Development Lifecycle
sponsored by Parasoft Corporation
WEBCAST: Access the following web presentation to uncover expert tips and tricks to leverage service virtualization to accelerate the SDLC. Discover how you can easily implement these techniques and more to gain data acceleration benefits but more importantly, how you can improve software deliverables.
Posted: 03 Jan 2014 | Premiered: Jan 3, 2014

Parasoft Corporation

Security University: Cloud Security
sponsored by SearchCloudSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for how to positively influence the security of cloud computing projects in your organization.
Posted: 31 Oct 2013 | Premiered: 05 Nov 2013

SearchCloudSecurity.com

Deliver Virtual Apps and Desktops as Mobile Services
sponsored by Citrix
VIDEO: This video details a solution to BYOD that will give users the personalized experience they crave while keeping your data secure.
Posted: 24 Oct 2013 | Premiered: 24 Oct 2013

Citrix

Brian Madden Discusses Why 2013 is a Big Year for VDI
sponsored by Dell, Inc.
VIRTUAL ENVIRONMENT: Learn how organizational usage requirements dictate what kind of desktop virtualization strategies will work best for a particular business.
Posted: 07 Oct 2013 | Premiered: 18 Sep 2013

Dell, Inc.

HP Taming Virtualization - Server Automation
sponsored by Hewlett-Packard Limited
VIDEO: Learn about getting virtualization under control by leveraging a system that provides a single view of the infrastructure and allows management of many servers at one time.
Posted: 01 Oct 2013 | Premiered: 01 Oct 2013

Hewlett-Packard Limited

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

How to Improve Migrations with User and Desktop Virtualization
sponsored by AppSense
VIDEO: Watch this quick video to learn how user and desktop virtualization can not only help make Windows 7 migration simpler, but can make management easier for your IT department while creating a much better user experience.
Posted: 27 Jul 2013 | Premiered: 27 Jul 2013

AppSense

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam
1 - 25 of 55 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement