Software  >   Systems Software  >   Server Software  >   Server Virtualization Software  >  

VMM

RSS Feed    Add to Google    Add to My Yahoo!
VMM Reports
 
E-Guide: Top virtualization security risks and how to prevent them
sponsored by CA Technologies.
EGUIDE: There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced by all. In addition, you’ll find best practices for preventing hypervisor malware.
Posted: 13 Jun 2011 | Published: 13 Jun 2011

CA Technologies.

Presentation Transcript: Securing the Virtualized Environment - Keeping the Dream Alive
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: View this presentation transcript as Neil Anderson, a Principal Consultant from the Infrastructure Protection & Mobility team explores roadblocks of securing virtual environments, common pitfalls, and offers advice on combating these issues.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Virtual Data Center E-Zine - Volume 11
sponsored by Virtual Data Center E-Zine - Volume 11
EZINE: Data center managers face increasing challenges as virtual machines spread across the enterprise. Automation, monitoring and management tools can offer some much needed relief in the battle to keep control in a virtualized environment. In this month's issue of Virtual Data Center, learn how to choose the right virtual tools for the job.
Posted: 05 Jun 2009 | Published: 05 Jun 2009


Virtual Data Center eZine - Volume 2
sponsored by Virtual Data Center eZine - Volume 2
EDITORIAL RESOURCE GUIDE: Read this second issue of the Virtual Data Center E-Zine to learn strategies for taking on two of biggest virtualization challenges: I/O bottlenecks and email system virtualization.
Posted: 19 May 2008 | Published: 01 May 2008


Presentation Transcript: Are We All Crazy? Why Would We Want To Put A Hypervisor On A Laptop?
sponsored by Neocleus
PRESENTATION TRANSCRIPT: In recent months, IT companies have been talking about putting a bare-metal hypervisor on a laptop. In this presentation transcript, independent industry expert, Brian Madden, takes a step back and discusses why you would want to put a hypervisor on a laptop. Learn about the real-world benefits and what's just hype.
Posted: 24 Jul 2009 | Published: 24 Jul 2009

Neocleus

Auto-Snapshot Manager/Microsoft Edition for Hyper-V
sponsored by Dell, Inc.
WHITE PAPER: Dell's Auto-Snapshot Manager / Microsoft Edition is an innovative bundled data protection feature of the Dell EqualLogic PS Series iSCSI SAN. It's designed to help deliver high-performance, redundant, highly-available storage platforms for Hyper-V deployments - supporting departmental to mission-critical Windows server applications.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Dell, Inc.

Dell High Availability Solutions Guide for Microsoft Hyper-V
sponsored by Dell, Inc.
WHITE PAPER: This Dell High Availability Solutions Guide for Microsoft Hyper-V introduces different options to implement HA for Hyper-V environments.
Posted: 28 Jan 2010 | Published: 11 Dec 2008

Dell, Inc.

HP and VMware Take the Cost and Complexity Out of IT
sponsored by VMware, Inc.
WHITE PAPER: To meet the constant demand to deploy, maintain and grow a broad array of services and applications, IT organization must continually add new servers. Read this to learn about creating a fully functional virtual machine that can run its own operating system and applications just like a real computer.
Posted: 23 Feb 2009 | Published: 23 Feb 2009

VMware, Inc.

Dell Storage Solutions Guide for Microsoft Hyper-V
sponsored by Dell and Microsoft
WHITE PAPER: This guide primarily focused on storage arrays based on their support for key virtualization features, such as high availability and virtual machine migration.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Dell and Microsoft

Practical Steps to Mitigate Virtualization Security Risks
sponsored by Tripwire, Inc.
WHITE PAPER: Read this whitepaper to learn seven practical steps that IT organizations can take to mitigate the unique security challenges of virtualization. While some are directed specifically at virtualized environments, many of these steps are best practices.
Posted: 10 Oct 2008 | Published: 01 Apr 2008

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
VMM White Papers | VMM Multimedia | VMM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement