IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security White Papers (View All Report Types)
1 - 25 of 261 Matches Previous Page  |  Next Page
Lab Review: What is Needed for Virtual Environment Data Security?
sponsored by IBM
WHITE PAPER: In this white paper, a product that claims to protect data in virtual environments is tested to reveal its capabilities.
Posted: 09 Jul 2015 | Published: 31 Aug 2014

IBM

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 06 Jul 2015 | Published: 07 Aug 2014

IBM

When It Makes Sense to Move to Desktop Virtualization: Seven Key Indicators
sponsored by VMware
WHITE PAPER: In this whitepaper, you'll learn 7 key indicators that it's time for your organization to start thinking about desktop virtualization.
Posted: 30 Jun 2015 | Published: 26 Jul 2013

VMware

How You Can Deliver Scalable, Graphics-Rich Virtual Desktops
sponsored by NVIDIA
WHITE PAPER: Download and discover how NVIDIA is redefining virtualization by delivering quality interactive visual experiences with a GPU that can be implemented at scale. Read on and learn how you can gain a competitive edge with all the technology you need to fully virtualize enterprise computing.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

NVIDIA

Insider Security Threats: Three Kinds of Chaos
sponsored by Clearswift
WHITE PAPER: This white paper presents the current information threat landscape and illustrates today's three major internal security challenges. Continue reading to explore new processes to mitigate risk and secure sensitive data.
Posted: 28 May 2015 | Published: 19 Mar 2014

Clearswift

Driving Agility and Security with Data Center Consolidation
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores several security strategies for defending virtualized and cloud-based data centers. Access now to learn how to defend both the physical and virtual planes as you imrpove agility through consolidation.
Posted: 07 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

You name it, Citrix leads it.
sponsored by Citrix
WHITE PAPER: This informative resource highlights four key areas where Citrix is a market leader. Find out how each of its technologies empowers your business with complete mobile workspaces by securely delivering apps, desktops, and data to any device your end-users use.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Citrix

Top 4 Reasons Why Visibility and Control Are Key to Optimizing Your Virtual Infrastructure
sponsored by VMware
WHITE PAPER: What does it take to maximize the performance and cost effectiveness of your virtual infrastructure? Consult the following expert white paper to find out how to do so by addressing visibility and control.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

VMware

The Emerging Need for Software Defined Acceleration
sponsored by Silver Peak
WHITE PAPER: This white paper outlines how IT teams can coordinate across teams; applications, server, storage, and networking. Learn more about Silver Peak and how it offers solutions for accelerating data mobility over distances.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Silver Peak

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

Embracing bring your own device (BYOD)
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to examine the three major categories of BYOD – laptops, tablets, and smartphones. Explore the benefits and risks associated with each of these categories and discover recommendations on how to successfully implement an approach in order to embrace BYOD in a way that makes sense for your organization.
Posted: 17 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Three Things Your Old Version of vSphere Doesn’t Do
sponsored by VMware
WHITE PAPER: View this information brief to learn more about why it's time for you to update your virtualization software. This brief explores these added capabilities, and the corresponding benefits, that you gain when you add operations management to your vSphere implementation.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

VMware

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

Implementing Software-Defined Security with CloudPassage Halo
sponsored by CloudPassage
WHITE PAPER: This paper summarizes the five architectural principles of SDSec and the ways in whichCloudPassage has implemented them by building the Halo SDSec platform for cloud infrastructure. Read on to learn more.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

Cloud Infrastructure Security: It's Time to Rethink Your Strategy
sponsored by CloudPassage
WHITE PAPER: This white paper discusses why, in order to truly reap the benefits of the cloud, leaders need to rethink their approach to infrastructure security.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

CloudPassage

Top 10 Considerations for Getting Started with VMware Virtualization
sponsored by VMware
WHITE PAPER: Access this white paper to learn the top 10 considerations for planning your move to virtualization in order to avoid the most popular complications that occur during the process. You'll explore security and compliance concerns, the pros and cons of choosing virtual storage over traditional storage, and more.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

VMware

There’s Never Been a Better Time to Virtualize
sponsored by VMware
WHITE PAPER: Access this white paper to learn more about the benefits of server virtualization. You'll learn about the benefits you can expect with virtualization, including, cost savings, streamlined manageability, maximized uptime, improved business continuity and security, and more.
Posted: 11 Nov 2014 | Published: 30 Jun 2014

VMware

Accelerate Graphics in Virtual Environments
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper examines the top challenges associated with demanding graphics software and explains why virtualized graphics may be the answer organizations need when it comes to overcoming these challenges.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Dell, Inc. and Intel®

Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Are You Ready for Windows Server 2012 Migration?
sponsored by Dell and Microsoft
WHITE PAPER: Read this white paper to learn about the improved virtualization, storage, networking, and other features of Windows Server 2012. Time is running out for Windows Server 2003 support and now is the right time to begin your migration to Windows Server 2012.
Posted: 04 Nov 2014 | Published: 11 Dec 2013

Dell and Microsoft

Top 5 Reasons Why Financial Services Firms Should Consider SDN Now
sponsored by Alcatel-Lucent
WHITE PAPER: This exclusive white paper takes an in-depth look at the top 5 reasons why firms should consider SDN now. Read on to take the first step towards an efficient networking solution that will help you get the most out of SDN.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

Alcatel-Lucent

IDC Whitepaper: Red Hat Enterprise Virtualization
sponsored by Red Hat
WHITE PAPER: Explore this white paper to discover how one hypervisor platform can provide your enterprise immediate business benefit and ROI. Read on now to learn more.
Posted: 08 Oct 2014 | Published: 30 Apr 2014

Red Hat

How to Bring Shadow IT into the Light - 8 Steps Along the Path
sponsored by Rackspace
WHITE PAPER: This white paper describes eight steps to help CIOs and other IT leaders to bring these potential risks to light. The key is to gain benefits from the cloud without risking your company's data.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Rackspace
1 - 25 of 261 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement