IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization SecurityWhite Papers (View All Report Types)
1 - 25 of 250 Matches Previous Page  | Next Page
Zero Downtime Bi-Directional Physical to Virtual Migration for Oracle EBS R12 With RAC on Vblock Systems
sponsored by VCE
WHITE PAPER: This paper presents a structured approach to migrating Oracle apps from a physical to a virtual environment. Inside, discover why this approach meets many of the challenges presented by virtualization of Oracle databases and applications, and find out how you can get started.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

VCE

5 Steps for Improving Virtual Backup & Data Recovery in Large Enterprises
sponsored by PHD Virtual
WHITE PAPER: This paper explores both the benefits that virtualization brings to the backup and recovery space as well as the benefits, advantages and features that backup and recovery can bring to a large virtual environment.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

PHD Virtual

Losing My Religion: Virtualization Backup Dogma, Faith, and Fact
sponsored by Unitrends
WHITE PAPER: This technology brief cuts through the self-serving and competing claims and examines each of the arguments in favor and against the various techniques used for virtual data protection
Posted: 14 Apr 2014 | Published: 31 Dec 2012

Unitrends

IBM SmartCloud Desktop Infrastructure Reference Architecture: Citrix VDI-in-a-Box powered by IBM System x
sponsored by IBM and Intel.
WHITE PAPER: This brief whitepaper looks at powerful and effective features of a combined hardware and software desktop virtualization platform that provides organizations with an all-in-one VDI strategy for simplified, efficient deployment.
Posted: 14 Apr 2014 | Published: 03 Jun 2013

IBM and Intel.

The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Six Fairy Tales of VMware and Hyper-V Backup
sponsored by Unitrends
WHITE PAPER: This white paper talks about 6 common misconceptions about virtualization backups. The resource focuses on the value of making informed decisions when it comes to developing a virtualization strategy.
Posted: 10 Apr 2014 | Published: 31 Dec 2012

Unitrends

IDC Report: Simplifying Data Protection for Virtual Environments
sponsored by PHD Virtual
WHITE PAPER: This IDC Vendor Profile discusses the firm PHD Virtual Technologies and its virtualized data protection solutions. In addition, this document examines PHD's supplier profile and strategy as well as some of the challenges PHD could encounter as it tries to differentiate itself in a market that is getting increasingly competitive.
Posted: 10 Apr 2014 | Published: 31 Dec 2012

PHD Virtual

How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control, and other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Two Great Ways to Protect Your Virtual Machines From Malware
sponsored by Sophos, Inc.
WHITE PAPER: This paper aims to help IT professionals, including security and virtualization specialists, understand and choose between two modern approaches to securing virtual environments.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Sophos, Inc.

Automating Security for Greater SaaS Success
sponsored by CloudPassage
WHITE PAPER: In this resource, learn how automated security tools and compliance monitoring will attract more cloud consumers with ease-of-use, scalability, and portability.
Posted: 28 Mar 2014 | Published: 01 Nov 2013

CloudPassage

Dell cloud client-computing solutions for Microsoft VDI and Dell vWorkspace
sponsored by Dell and Microsoft
WHITE PAPER: This whitepaper examines a solution that combines the best of Dell and Microsoft solutions in order to implement flexible delivery mechanisms, deploy highly cost-effective virtual desktops, fix problems before they arise to minimize downtime and reduce the time it takes to deploy virtual machines.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Dell and Microsoft

Mobile, Secure AND Cost-Efficient Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Citrix

Bring Distributed Environments Under Control with Desktop Virtualization
sponsored by Dell, Inc.
WHITE PAPER: This resource highlights the fact that IT departments are no longer dealing with one set of PCs all using the same operating system. It also shows how desktop virtualization can be implemented to improve efficiency and security.
Posted: 17 Mar 2014 | Published: 18 Nov 2013

Dell, Inc.

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology
sponsored by CommVault Systems, Inc.
WHITE PAPER: Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CommVault Systems, Inc.

Real-time visibility into your virtual data center
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper discusses a real-time modeling system for virtualized IT environments that provides an operational view of IT services and the servers, hypervisors, VMs, middleware, databases, applications, and network links that enable them to work.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

The CIO Guide to Virtual Server Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper takes on the data protection concerns that many organizations face when they virtualize and offers some insight into how these challenges can be met.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CommVault Systems, Inc.

Leveraging Virtualization for Operational Efficiency
sponsored by IBM
WHITE PAPER: This IDC whitepaper explores the evolving role of Linux and its extended ecosystem in support of production applications. Inside,you'll also find case studies of customers who deployed a variety of Linux workloads on Power Systems servers rather than on x86 servers, with a low initial cost of acquisition.
Posted: 21 Feb 2014 | Published: 31 Jan 2013

IBM

Security in a Faster Forward World
sponsored by Akamai Technologies
WHITE PAPER: This informative white paper explains why legacy security solutions such as DDoS scrubbing services are no longer effective, and to stay secure in today's world organizations should strengthen their front lines with a Web site protection service. Read on to find a security solution fit for your needs that will keep you safe now and into the future.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

Akamai Technologies

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Dell Software
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Dell Software

Trend Micro Deep Security: VMWare vSphere with Operations Management
sponsored by Trend Micro
WHITE PAPER: This informative resource introduces a security and operations management solution that protects virtualized datacenters and desktops from the latest threats. Read on to learn how this solution can help your organization address 5 main areas of concern, including security, business continuity, and 3 more.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Trend Micro

Single Sign On and Web Access Control Made Easy
sponsored by OpenIAM
WHITE PAPER: Access this white paper to discover a unified, integrated identity and access management (IAM) system that uses a service oriented architecture (SOA) stack feature to simplify web access security for on- and off-premise applications.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

OpenIAM

Is the cloud safe? Breaking down the barriers to cloud computing
sponsored by ComputerWeekly.com
WHITE PAPER: Research by Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services. In this report, we examine how to overcome these top five concerns to help IT managers put in place a strategy for cloud computing with confidence
Posted: 20 Dec 2013 | Published: 12 Sep 2010

ComputerWeekly.com

Backup and Recovery Changes Drive IT Infrastructure and Business Transformation
sponsored by EMC & Arrow
WHITE PAPER: This White Paper gives an overview of what's causing chagnes within today's IT organizations and datacenters and discusses how backup and recovery can enable broader IT infrastructure and business transformation. It also shows how EMC is helping firms accelerate the transformation of legacy backup processes.
Posted: 17 Feb 2014 | Published: 31 Dec 2012

EMC & Arrow

Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks Next Generation Firewall
sponsored by Citrix and Palo Alto Networks
WHITE PAPER: As desktop virtualization continues to grow in popularity, organizations are looking to optimize their potential benefits. This guide explores virtual desktop infrastructure, potential implementation challenges and how to overcome these challenges.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Citrix and Palo Alto Networks
1 - 25 of 250 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement