IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
1 - 25 of 509 Matches Previous Page  |  Next Page
When It Makes Sense to Move to Desktop Virtualization: Seven Key Indicators
sponsored by VMware
WHITE PAPER: In this whitepaper, you'll learn 7 key indicators that it's time for your organization to start thinking about desktop virtualization.
Posted: 30 Jun 2015 | Published: 26 Jul 2013

VMware

Software-Defined Security and the Agile Data Center
sponsored by CloudPassage
WEBCAST: On this webinar, you'll hear from Neil MacDonald, VP Distinguished Analyst from Gartner Research, and CloudPassage's Co-founder and Chief Strategy Officer, Carson Sweet. They'll share insights into the changes required for security and compliance in the new, more agile data center.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015

CloudPassage

Virtualization Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at how malware is adapting to virtual networks and tools (advanced malware protection) and processes (hardening, logging, snapshots) that can help organizations secure these environments.
Posted: 17 Jun 2015 | Premiered: 16 Jun 2015

SearchSecurity.com

How You Can Deliver Scalable, Graphics-Rich Virtual Desktops
sponsored by NVIDIA
WHITE PAPER: Download and discover how NVIDIA is redefining virtualization by delivering quality interactive visual experiences with a GPU that can be implemented at scale. Read on and learn how you can gain a competitive edge with all the technology you need to fully virtualize enterprise computing.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

NVIDIA

VDI for 3D Model Global Collaboration in Construction
sponsored by NVIDIA/VMware
CASE STUDY: Download this case study to discover how one organization deployed virtual desktops to allow global team members to securely work together on graphically intense, centralized designs and 3D models. Find out how this increased efficiency while protecting valuable information.
Posted: 02 Jun 2015 | Published: 31 Jan 2014


Securely Delivering 3D Graphics for Naval Training Simulator
sponsored by NVIDIA/VMware
CASE STUDY: Access this case study to see how NC State University virtualized their entire simulator in order to provide a flexible, secure, reliable, graphics-rich computing environment to both academic and training programs.
Posted: 02 Jun 2015 | Published: 31 Jan 2014


Unleashing the Freedom to Create in VFX
sponsored by NVIDIA/VMware
CASE STUDY: Access this case study to learn how Jellyfish pictures implemented a desktop-as-a-service for graphics processing units (DaaS-GPU) platform. Find out the benefits of this platform and how it gives employees the ability to work from any device and any location. Also, learn how it compares to a physical workstation.
Posted: 02 Jun 2015 | Published: 31 Dec 2014


Insider Security Threats: Three Kinds of Chaos
sponsored by Clearswift
WHITE PAPER: This white paper presents the current information threat landscape and illustrates today's three major internal security challenges. Continue reading to explore new processes to mitigate risk and secure sensitive data.
Posted: 28 May 2015 | Published: 19 Mar 2014

Clearswift

A guide to storage and virtualisation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Virtualisation brings benefits to the datacentre, but it also brings big changes to storage provisioning and management. We look at the key challenges and how to deal with them.
Posted: 28 May 2015 | Published: 28 May 2015

ComputerWeekly.com

Storage Redefined
sponsored by SearchServerVirtualization
EBOOK: Software-defined storage joins the virtualization discussion, and it could play a key role in future-proofing an infrastructure.
Posted: 06 May 2015 | Published: 06 May 2015

SearchServerVirtualization

Putting an End to Migration Angst
sponsored by F5 Networks
WHITE PAPER: Read this short research white paper to discover how virtualization is allowing IT and network managers to improve their enterprise.
Posted: 05 May 2015 | Published: 05 May 2015

F5 Networks

Getting the most out of your cloud deployment
sponsored by BitDefender
WHITE PAPER: In this white paper, discover tips for efficiently transitioning to the cloud and ensuring cloud application security.
Posted: 28 Apr 2015 | Published: 31 Dec 2014

BitDefender

Next Generation Security for Virtualized Datacenters
sponsored by BitDefender
WHITE PAPER: In this white paper, discover what a virtual environment needs in order to maintain its security.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

BitDefender

Newest Data Center Dilemma: Security vs. Performance
sponsored by BitDefender
WHITE PAPER: This white paper elaborates on the security concerns of virtualized environments and why traditional security approaches don't work.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Evolve or Die: Security Adaptation in a Virtual World
sponsored by BitDefender
WHITE PAPER: This white paper describes and suggests solutions for some of the biggest issues in virtualization security.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Securing the Virtual Infrastructure without Impacting Performance
sponsored by BitDefender
WHITE PAPER: This white paper discusses some of the most common security pitfalls found in virtualized environments and suggests ways to avoid them.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

The six most important things to know about VDI/DaaS security
sponsored by BitDefender
WHITE PAPER: This white paper describes the challenges of securing virtual desktops and suggests solutions for overcoming these challenges.
Posted: 23 Apr 2015 | Published: 31 Dec 2014

BitDefender

Extend Security and Control from the Data Center Edge to the core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

Computer Weekly – 14 April 2015: Taking stock of e-commerce systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

ComputerWeekly.com

The Emerging Need for Software Defined Acceleration
sponsored by Silver Peak
WHITE PAPER: This white paper outlines how IT teams can coordinate across teams; applications, server, storage, and networking. Learn more about Silver Peak and how it offers solutions for accelerating data mobility over distances.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Silver Peak

Introducing a high-performing, flexible desktop virtualization software
sponsored by Dell, Inc.
DATA SHEET: This informative data sheet highlights a desktop virtualization software solution that combines multiple desktop virtualization technologies in one easy-to-use, integrated system for rapid, secure administration. Find out the benefits to this technology and how its meeting the requirements for greater levels of flexibility and control.
Posted: 23 Mar 2015 | Published: 03 Dec 2014

Dell, Inc.

Mobile Network Operator Enables Secure Access for Consultants
sponsored by Dell, Inc.
CASE STUDY: Inside this brief case study, find out how a mobile network operator adopted a solution that manages, secures, and provisions virtual desktop environments and also broker's connections. Discover how this enabled employees to use their own laptops without exposing the company to risks like viruses and the copying of proprietary information.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

Embracing bring your own device (BYOD)
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to examine the three major categories of BYOD – laptops, tablets, and smartphones. Explore the benefits and risks associated with each of these categories and discover recommendations on how to successfully implement an approach in order to embrace BYOD in a way that makes sense for your organization.
Posted: 17 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.
1 - 25 of 509 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement