IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
1 - 25 of 530 Matches Previous Page  |  Next Page
Deep Security AWS Success
sponsored by Trend Micro
CASE STUDY: This case study highlights how one organization integrated a security platform into their virtualized environment to ensure compliance for public cloud and AWS to provide secure gaming, social networking, and e-commerce services to its customers.
Posted: 27 Mar 2015 | Published: 31 Dec 2014

Trend Micro

The Emerging Need for Software Defined Acceleration
sponsored by Silver Peak
WHITE PAPER: This white paper outlines how IT teams can coordinate across teams; applications, server, storage, and networking. Learn more about Silver Peak and how it offers solutions for accelerating data mobility over distances.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Silver Peak

Introducing a high-performing, flexible desktop virtualization software
sponsored by Dell, Inc.
DATA SHEET: This informative data sheet highlights a desktop virtualization software solution that combines multiple desktop virtualization technologies in one easy-to-use, integrated system for rapid, secure administration. Find out the benefits to this technology and how its meeting the requirements for greater levels of flexibility and control.
Posted: 23 Mar 2015 | Published: 03 Dec 2014

Dell, Inc.

Mobile Network Operator Enables Secure Access for Consultants
sponsored by Dell, Inc.
CASE STUDY: Inside this brief case study, find out how a mobile network operator adopted a solution that manages, secures, and provisions virtual desktop environments and also broker's connections. Discover how this enabled employees to use their own laptops without exposing the company to risks like viruses and the copying of proprietary information.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

ESG Lab Validation: Enterprise Storage for Performance-driven Databases
sponsored by NetApp
WHITE PAPER: This ESG Lab Report documents the real world performance, reliability, availability, and serviceability of NetApp EFSeries flash arrays in Oracle database environments. A combination of hands on testing by ESG Lab and audited inhouse performance testing executed by NetApp were used to create this report.
Posted: 22 Mar 2015 | Published: 22 Mar 2015

NetApp

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

Data Center Micro-Segmentation
sponsored by VMware
WHITE PAPER: Access this white paper to explore the security capabilities of an SDDC approach and the VMware NSX network virtualization platform.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

VMware

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

Embracing bring your own device (BYOD)
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to examine the three major categories of BYOD – laptops, tablets, and smartphones. Explore the benefits and risks associated with each of these categories and discover recommendations on how to successfully implement an approach in order to embrace BYOD in a way that makes sense for your organization.
Posted: 17 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Bridging the data security gap
sponsored by IBM
WHITE PAPER: This white paper describes the four main areas of data security and how to approach each one.
Posted: 16 Mar 2015 | Published: 31 May 2013

IBM

Three Things Your Old Version of vSphere Doesn’t Do
sponsored by VMware
WHITE PAPER: View this information brief to learn more about why it's time for you to update your virtualization software. This brief explores these added capabilities, and the corresponding benefits, that you gain when you add operations management to your vSphere implementation.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

VMware

7 Signs It's Time to Extend Virtualization from the Data Center to Devices
sponsored by VMware
DATA SHEET: Access this informative data sheet to explore the seven signs that it's time to extend virtualization from the data center to devices.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

VMware

Maximizing Your Desktop and Application Virtualization Implementation - Part 2 of 3
sponsored by VMware, Inc.
BOOK: This informative resource highlights desktop and application virtualization management best practices for image management, BYOD and physical environments, automating desktop provisioning, and more.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

VMware, Inc.

Desktop as a Service: Delivering the Customer Experience Users Require Without the Up-Front Costs
sponsored by VMware
WHITE PAPER: In this white paper, find out how DaaS is moving beyond client virtualization efforts by moving VDI to hosted cloud service providers.
Posted: 25 Feb 2015 | Published: 29 Aug 2014

VMware

Delivering user-centric IT solutions that improve workplace productivity
sponsored by Unisys
WHITE PAPER: Access this white paper to discover how workspace-as-a-service is an end-to-end solution to enable the journey from a traditional, device-centric landscape to a future-proof, user-centric landscape and allowing organizations to assemble the best-fit working environment and applications for each user on any device they choose.
Posted: 24 Feb 2015 | Published: 31 Dec 2014


The State of Application Delivery in 2015
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper examines how applications have changed the landscape for CRM and other business processes enterprise-wide. Read on to learn more.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

F5 Networks

How Smart Enterprises are Tackling Workspace Transformation
sponsored by Unisys
WHITE PAPER: Access this white paper to discover how workspace-as-a-service is a user centric approach to modern workspaces that allows for anytime, anywhere access.
Posted: 19 Feb 2015 | Published: 31 Dec 2014


MicroScope E-Zine February 2015: An issue covering the IT skills issue and SDN
sponsored by MicroScope
EZINE: An issue highlighting the need for investment in the next generation of skilled staff.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

MicroScope

Improving clinical workflow and increasing desktop security with VDI
sponsored by AppSense
CASE STUDY: To improve clinical workflow and increase desktop security, one healthcare organization implemented an environment manager to assist with VDI deployment. Discover how this strategy allowed them to reduce Windows launch times, provide a consistent user experience, simplify IT resources, and enable dynamic printing changes based on location.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

AppSense

Case Study: How one healthcare center cut costs on Windows 7 migration and increased user productivity with virtualization
sponsored by AppSense
CASE STUDY: Access this case study to discover how a healthcare organization was able to leverage virtualization to manage a diverse combination of users, apps, and data across the enterprise desktop environment with a powerful user-based policies and personalization within their healthcare environment.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

AppSense

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

What if your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell, Inc. and Intel®
VIDEO: In this video, Brian Madden faces what happens if application virtualization solutions doesn't support location-based security.
Posted: 19 Jan 2015 | Premiered: 19 Jan 2015

Dell, Inc. and Intel®

3 Questions Every CIO Should Ask About Virtual Server Data Protection
sponsored by CommVault
WHITE PAPER: This whitepaper examines what today's IT leaders need to know about providing comprehensive protection for virtual machines – especially in terms of scalability, recovery capabilities and application integration.
Posted: 07 Jan 2015 | Published: 13 May 2014

CommVault

Service Virtualization & Gartner
sponsored by Parasoft Corporation
WHITE PAPER: Access this resource to examine the key challenges and recommendations surrounding the development of an effective centralized release management process. You'll also get 11 steps succeed during the process.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Parasoft Corporation
1 - 25 of 530 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement