IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization SecurityReports
1 - 25 of 501 Matches Previous Page  | Next Page
Secure by Design: How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control and Other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This whitepaper examines how Citrix XenApp and Citrix XenDesktop solutions can dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple, flexible remote access that enhances business productivity.
Posted: 20 Aug 2014 | Published: 23 Jul 2014

Citrix

Top 5 Reasons Why You Can’t Afford Not to Virtualize
sponsored by VMware
WHITE PAPER: This white paper explains why embracing virtualization now is a necessary step for organizations across all industries. It gives the top 5 reasons that organizations need to move forward with virtualization.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

VMware

Explore the Modern Virtualization Landscape
sponsored by VMware
WHITE PAPER: This informative resource explores the top trends in virtualization. It also highlights some of the challenges that organizations face with virtualization.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

VMware

5 Software-Defined Data Center Tips to Consider Before Investing
sponsored by Hewlett-Packard Company
EGUIDE: The software-defined data (SND) center combines programmable networks, servers and storage. This expert E-Guide uncovers SDDC tips to show you what to look for beyond basic flexibility.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

Office 365 Single Sign-On: High Availability without High Complexity
sponsored by Centrify Corporation
WHITE PAPER: For most organizations, a leap forward in user experience, productivity, IT simplifications and cost saving starts with a move to Office 365 (O365).  However, organizations that fail to implement O365 reliably can actually cause more harm than actual benefits.
Posted: 15 Aug 2014 | Published: 31 Dec 2013

Centrify Corporation

Navigating the to Cloud Success: Avoiding Vendor Lock-in and other Cloud Conflicts
sponsored by Dell and Microsoft
WHITE PAPER: In this informative resource, you'll discover new solutions for removing the ambiguity surrounding the cloud, and ensure that all cloud projects fulfill their business goals.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

Private Cloud Infrastructures: The Basics
sponsored by Dell and Microsoft
WHITE PAPER: In this helpful resource, you'll get the basics on what IT departments need to know about private cloud networks, and how to implement them in your organization.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Dell and Microsoft

VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth
sponsored by Citrix
WHITE PAPER: This paper explores a collection of services that can help drive a modern, mobile workforce toward greater agility and productivity, one project at a time.
Posted: 14 Aug 2014 | Published: 31 Dec 2013

Citrix

Software-defined networking and network virtualization, unifying the virtual overlay and physical underlay
sponsored by HP
WHITE PAPER: When it comes to network virtualization, Software Defined Networking (SDN) allows the network provider to integrate physical and virtual enviornments.  It can also unlock intellegence and visability that was once overlooked.  You have a choice in how this integration is accomplished - choose to get even more than just a solution.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

HP

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 13 Aug 2014 | Published: 25 Jul 2014

BlackBerry

DCIG 2014-15 Virtual Server Backup Buyer’s Guide
sponsored by Unitrends
WHITE PAPER: Explore this in-depth buyer's guide to discover everything you need to know regarding virtual server backup software. Read on now to learn more.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Unitrends

Key Resource Center on DataCore Software
sponsored by DataCore Software Corporation
RESOURCE CENTER: Companies today are increasingly switching to network virtualization as they see the true benefits it's had on companies in the past. However, virtual storage plays a key role in network virtualization, and if your data isn't stored properly it can spell disaster later on.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

DataCore Software Corporation

Ballarat Grammar secures BYOD with HP Network Protector SDN Application
sponsored by HP
CASE STUDY: BYOD has been a huge trend for industries worldwide, but what about students in schools?  Backed by a protected SDN application, this case study proves its usefulness in education.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

HP

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

IBM

IDG Solution Brief;  CIOs revealed what they want from their private cloud strategy. Learn how Red Hat is meeting their needs.
sponsored by Red Hat
WHITE PAPER: This executive brief provides results of a CIO Magazine Quick Pulse poll sponsored by Red Hat which highlights the industry move to private cloud technology and hybrid cloud environments through dual-source virtualization wherein companies value security, performance and support in a quest to build the new IT paradigm.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Red Hat

IDC Whitepaper:  Red Hat Enterprise Virtualization
sponsored by Red Hat
WHITE PAPER: Explore this whitepaper to discover how one hypervisor platform can provide your enterprise immediate business benefit and ROI. Read on now to learn more.
Posted: 04 Aug 2014 | Published: 30 Apr 2014

Red Hat

British Airways Uses Virtualization for Scalable IT Infrastructure
sponsored by Red Hat
WHITE PAPER: Red Hat, the world’s leading provider of open source solutions, today announced that British Airways, a global airline and market leader in the travel industry, has deployed Red Hat Enterprise Virtualization on its infrastructure. Through this Red Hat technology, British Airways is benefiting from a highly available and scalable IT architecture.
Posted: 04 Aug 2014 | Published: 05 Feb 2014

Red Hat

How can virtualization become your engine for smart growth?
sponsored by Red Hat
VIDEO: Not all virtualization is the same. You can lower capital and operational expenses, improve virtualized workload performance and manage your heterogeneous hypervisor environment, all while reducing virtual machine sprawl. Learn how leading organizations around the globe are growing with open, flexible virtualization solutions.
Posted: 04 Aug 2014 | Premiered: 23 May 2014

Red Hat

SDN 101 - Why should you care?
sponsored by Citrix
WEBCAST: With so much focus being placed on software defined networks (SDN) you may be asking yourself, "Why should I care?" In this on-demand website hosted by Jim Metzler, VP at Ashton, Metzler & Associates and Steve Shah, Sr. Director at Citrix, learn the advantages of implementing SDN on your network.
Posted: 31 Jul 2014 | Premiered: Feb 19, 2014

Citrix

SDN & Security for Next-Generation Data Centers
sponsored by Fortinet, Inc.
WEBCAST: In this two-part webcast, hear what Gartner analyst Mark Fabbi has to say about how software-defined networking will affect data centers and network security.
Posted: 29 Jul 2014 | Premiered: Jun 30, 2014

Fortinet, Inc.

Data Center Trends and Network Security Impact
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reviews the major data center trends that enterprises and service providers should be preparing for, as well as their anticipated impact on network security.
Posted: 29 Jul 2014 | Published: 31 Dec 2012

Fortinet, Inc.

Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 25 Jul 2014 | Published: 25 Jul 2014

BlackBerry

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, explore several best practises that should be implemented to support workforce mobility.
Posted: 24 Jul 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Secure by Design: How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control and Other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This whitepaper examines how Citrix XenApp and Citrix XenDesktop solutions can dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple, flexible remote access that enhances business productivity.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

Citrix

Easy-to-Manage Security Solutions for Today's Threats and Technologies
sponsored by CDW Corporation
WHITE PAPER: This informative white paper describes one company's easy-to-manage security solutions, which are prepared to confront today's evolving threats and emerging technologies.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation
1 - 25 of 501 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement