IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization SecurityWhite Papers (View All Report Types)
51 - 75 of 286 Matches Previous Page  | Next Page
VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth
sponsored by Citrix
WHITE PAPER: This paper explores a collection of services that can help drive a modern, mobile workforce toward greater agility and productivity, one project at a time.
Posted: 28 May 2014 | Published: 07 Nov 2013

Citrix

Testing the Cloud: Definitions, Requirements, and Solutions
sponsored by Ixia
WHITE PAPER: Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Structured Approach to Migrating Oracle Apps from a Physical to Virtual Environment
sponsored by VCE
WHITE PAPER: This paper presents a structured approach to migrating Oracle apps from a physical to a virtual environment. Inside, discover why this approach meets many of the challenges presented by the virtualization of Oracle databases and applications, and learn how you can get started.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

VCE

The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

The CIO Guide to Virtual Server Data Protection
sponsored by CommVault
WHITE PAPER: This white paper takes on the data protection concerns that many organizations face when they virtualize and offers some insight into how these challenges can be met.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CommVault

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Dell Software
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Dell Software

The Truth About Microsoft Licensing and the DaaS Delivery Model
sponsored by NaviSite, Inc.
WHITE PAPER: Learn more about the Desktop-as-a-Service (DaaS) delivery model and how it is helping businesses successfully manage and control their increasingly mobile-centric IT environments. This is a podcast presentation transcript.
Posted: 11 Feb 2014 | Published: 21 Oct 2013

NaviSite, Inc.

Is the cloud safe? Breaking down the barriers to cloud computing
sponsored by ComputerWeekly.com
WHITE PAPER: Research by Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services. In this report, we examine how to overcome these top five concerns to help IT managers put in place a strategy for cloud computing with confidence
Posted: 20 Dec 2013 | Published: 12 Sep 2010

ComputerWeekly.com

Empowering Your Entire Workforce End-to-End with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This paper explores a collection of services that can help drive a modern, mobile workforce toward greater agility and productivity, one project at a time.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

Citrix

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Real-time visibility into your virtual data center
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper discusses a real-time modeling system for virtualized IT environments that provides an operational view of IT services and the servers, hypervisors, VMs, middleware, databases, applications, and network links that enable them to work.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Analyst Paper: Linux and Virtualization Bring Operational Efficiency
sponsored by IBM
WHITE PAPER: This IDC whitepaper explores the evolving role of Linux and its extended ecosystem in support of production applications. Inside,you'll also find case studies of customers who deployed a variety of Linux workloads on Power Systems servers rather than on x86 servers, with a low initial cost of acquisition.
Posted: 21 Feb 2014 | Published: 31 Jan 2013

IBM

Trend Micro Deep Security: VMWare vSphere with Operations Management
sponsored by Trend Micro
WHITE PAPER: This informative resource introduces a security and operations management solution that protects virtualized datacenters and desktops from the latest threats. Read on to learn how this solution can help your organization address 5 main areas of concern, including security, business continuity, and 3 more.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Trend Micro

Backup and Recovery Changes Drive IT Infrastructure and Business Transformation
sponsored by EMC & Arrow
WHITE PAPER: This White Paper gives an overview of what's causing chagnes within today's IT organizations and datacenters and discusses how backup and recovery can enable broader IT infrastructure and business transformation. It also shows how EMC is helping firms accelerate the transformation of legacy backup processes.
Posted: 17 Feb 2014 | Published: 31 Dec 2012

EMC & Arrow

Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks Next Generation Firewall
sponsored by Citrix and Palo Alto Networks
WHITE PAPER: As desktop virtualization continues to grow in popularity, organizations are looking to optimize their potential benefits. This guide explores virtual desktop infrastructure, potential implementation challenges and how to overcome these challenges.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Citrix and Palo Alto Networks

Deep Security 9: Comprehensive security platform for physical, virtual, and cloud servers
sponsored by Trend Micro
WHITE PAPER: In this white paper, learn why legacy security tools are hindering cloud success. Click now to discover a cost-effective cloud security solution that ensures data protection and compliance in the virtual sphere to avoid data breaches and business disruption.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Trend Micro

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Mapping Security For Your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
Posted: 15 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

Why SSL VPN Still Matters
sponsored by F5 Networks
WHITE PAPER: This resource showcases a two-pronged approach to secure remote access afforded by SSL VPN solutions, which provide comprehensive security and mobile access for all devices running Android. Find out why SSL VPN will continue to be important to corporate remote access strategies.
Posted: 15 Nov 2013 | Published: 13 Jan 2012

F5 Networks

Server Security Survey Report
sponsored by Bit9, Inc.
WHITE PAPER: In October 2013, Bit9 conducted a survey on server security designed to analyze challenges in the inability to detect or stop advanced attacks – click now to discover key findings and takeaways.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

Bit9, Inc.

Plas Plastic Case Study: Virtualization Delivers Greater Flexibility
sponsored by Dell and Microsoft
WHITE PAPER: In this case study, see how one organization is benefiting from virtualizing its networks for a more scalable, efficient, and reliable IT infrastructure that is prepared for continuous growth and productivity.
Posted: 08 Nov 2013 | Published: 30 Apr 2013

Dell and Microsoft

Unclutter Your Data Center With Consolidated Log Management
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.
Posted: 17 Oct 2013 | Published: 13 Jun 2013

VMware, Inc.

Log Analytics: Simplifying Complex IT Environments
sponsored by VMware, Inc.
WHITE PAPER: Access this white paper for interviews with IT operations teams looking for better ways to effectively collect, analyze, and harness key information from logs in today's complex IT environment.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

VMware, Inc.

Automated Log Analytics Critical For Security and Compliance Management
sponsored by VMware, Inc.
WHITE PAPER: Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management.
Posted: 15 Oct 2013 | Published: 01 Jun 2013

VMware, Inc.
51 - 75 of 286 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement