IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security White Papers (View All Report Types)
26 - 50 of 257 Matches Previous Page  |  Next Page
Virtualizing Exchange 2013 - The Right Way
sponsored by Veeam Software
WHITE PAPER: This white paper explains the factors that should be examined when deciding to virtualize MicrosoftExchange 2013.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Veeam Software

VMware Horizon 6 Overview
sponsored by Global Knowledge
WHITE PAPER: Explore this resource to discover a new VMware platform that can help you better manage your virtual machines and applications both within the datacenter and the cloud. Read on now to learn more about this new platform and the advanced features and tools it brings to the table.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Top 5 Reasons Why You Can’t Afford Not to Virtualize
sponsored by VMware
WHITE PAPER: This white paper explains why embracing virtualization now is a necessary step for organizations across all industries. It gives the top 5 reasons that organizations need to move forward with virtualization.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

VMware

Using Desktop Virtualization to Simplify Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This whitepaper examines how Citrix XenApp and Citrix XenDesktop solutions can dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple, flexible remote access that enhances business productivity.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

Citrix

All-Flash Reference Architecture for VMware Horizon View
sponsored by NetApp
WHITE PAPER: Read this in-depth technical report to discover how to increase performance and lower your per-desktop costs with a NetApp all-flash reference architecture for VMware Horizon View.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

NetApp

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

The CIO Guide to Virtual Server Data Protection
sponsored by Commvault
WHITE PAPER: In this white paper, discover the three questions you need to be asking about data protection in your virtualized environment.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Commvault

Is the cloud safe? Breaking down the barriers to cloud computing
sponsored by ComputerWeekly.com
WHITE PAPER: Research by Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services. In this report, we examine how to overcome these top five concerns to help IT managers put in place a strategy for cloud computing with confidence
Posted: 20 Dec 2013 | Published: 12 Sep 2010

ComputerWeekly.com

IBM SmartCloud Desktop Infrastructure Reference Architecture: Citrix VDI-in-a-Box powered by IBM System x
sponsored by IBM and Intel.
WHITE PAPER: This brief whitepaper looks at powerful and effective features of a combined hardware and software desktop virtualization platform that provides organizations with an all-in-one VDI strategy for simplified, efficient deployment.
Posted: 07 Jul 2014 | Published: 03 Jun 2013

IBM and Intel.

How to Handle Business Data Protection Needs in a Physical or Virtual Environment
sponsored by arcserve
WHITE PAPER: This white paper dives into the details about virtualization and unveils some hidden complexities when it comes to backup and recovery requirements.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

arcserve

Heighten Security and Improve Availability With an Application Delivery Solution
sponsored by Citrix
WHITE PAPER: Find out which application virtualization and delivery solutions are capable of working together to provide you with both high availability and stellar security.
Posted: 20 Jun 2014 | Published: 31 Dec 2010

Citrix

Top Five Mistakes in Consolidating and Virtualizing the Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights the benefits and potential challenges that come with data center consolidation and virtualization.
Posted: 20 Jun 2014 | Published: 31 Jan 2013

Cisco Systems, Inc.

Testing the Cloud: Definitions, Requirements, and Solutions
sponsored by Ixia
WHITE PAPER: Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Structured Approach to Migrating Oracle Apps from a Physical to Virtual Environment
sponsored by VCE
WHITE PAPER: Access this in-depth white paper to discover a structured approach to migrating Oracle apps from a physical to a virtual environment. Read on to find out why this approach meets many of the challenges presented by the virtualization of Oracle databases and applications, and learn how you can get started.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

VCE

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Real-time visibility into your virtual data center
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper discusses a real-time modeling system for virtualized IT environments that provides an operational view of IT services and the servers, hypervisors, VMs, middleware, databases, applications, and network links that enable them to work.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Analyst Paper: Linux and Virtualization Bring Operational Efficiency
sponsored by IBM
WHITE PAPER: This IDC whitepaper explores the evolving role of Linux and its extended ecosystem in support of production applications. Inside,you'll also find case studies of customers who deployed a variety of Linux workloads on Power Systems servers rather than on x86 servers, with a low initial cost of acquisition.
Posted: 21 Feb 2014 | Published: 31 Jan 2013

IBM

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Dell Software
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Dell Software

Trend Micro Deep Security: VMWare vSphere with Operations Management
sponsored by Trend Micro
WHITE PAPER: This informative resource introduces a security and operations management solution that protects virtualized datacenters and desktops from the latest threats. Read on to learn how this solution can help your organization address 5 main areas of concern, including security, business continuity, and 3 more.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Trend Micro

Backup and Recovery Changes Drive IT Infrastructure and Business Transformation
sponsored by EMC & Arrow
WHITE PAPER: This White Paper gives an overview of what's causing chagnes within today's IT organizations and datacenters and discusses how backup and recovery can enable broader IT infrastructure and business transformation. It also shows how EMC is helping firms accelerate the transformation of legacy backup processes.
Posted: 17 Feb 2014 | Published: 31 Dec 2012

EMC & Arrow

Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks Next Generation Firewall
sponsored by Citrix and Palo Alto Networks
WHITE PAPER: As desktop virtualization continues to grow in popularity, organizations are looking to optimize their potential benefits. This guide explores virtual desktop infrastructure, potential implementation challenges and how to overcome these challenges.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Citrix and Palo Alto Networks

Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers
sponsored by Trend Micro
WHITE PAPER: In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Trend Micro

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Mapping Security For Your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
Posted: 15 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company
26 - 50 of 257 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement