IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
1 - 25 of 527 Matches Previous Page  |  Next Page
Virtualization Value: VMware vSphere vs. Free Hypervisors
sponsored by VMware
WHITE PAPER: Investing in free hypervisors may seem like a budget no-brainer; however that up-front reduction ends up really costing you in the long run. Learn how to leverage 5 operational advantages of one virtualization platform, and compare its performance to that of free hypervisors.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

VMware

Choosing the Right Virtualization Platform to Meet Business Objectives
sponsored by VMware
WHITE PAPER: Because virtualization tools are designed to take care of immediate needs, they often can't accommodate rapidly changing requirements. Discover how to leverage an adaptive virtualization platform to gain unmatched app support, scalability, and ease of use—without breaking your budget.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

VMware

The Virtual Firewall Buyer's Guide
sponsored by Juniper Networks, Inc.
WHITE PAPER: Today's organizations can benefit from additional layers of protection. Access this concise infographic and explore eight virtual firewall questions you should be asking.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Juniper Networks, Inc.

VMworld Europe 2016: What to expect
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: VMworld Europe 2016 hits Barcelona in October, with VMware expected to announce new and refreshed products and services in support of its end-user computing and cloud strategy. In this e-guide, you'll find case studies featuring last year's winners, along with articles covering the technologies VMware looks set to champion at this year's event.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

ComputerWeekly.com

Blended IT and Security Operations: Where's the Balance?
sponsored by ServiceNow
EGUIDE: Within this informative e-guide, you'll learn the benefits – and the risks – of integrating IT and security operations. Discover how you can leverage information collected from multiple data sources to get an accurate picture about the issues affecting both security and performance.
Posted: 07 Sep 2016 | Published: 31 Aug 2016

ServiceNow

Securely Access Business Apps and Data with BYOD
sponsored by Citrix
VIDEO: A BYOD program can lower costs and improve productivity.But how do you ensure your BYOD program can meet IT security guidelines and allow workers remote access for secure end user computing?View this video that discusses one easy-to-install platform that gives your employees secure mobile access to all your virtual applications anytime, anywhere.
Posted: 31 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Single Sign-On Access to Secure Virtual Apps and Data
sponsored by Citrix
VIDEO: Mobile task workers need access to their Windows apps and desktops anytime, anywhere. This video discusses one mobile workspace platform that makes virtual apps and desktops instantly available to workers through its secure and quick tap and go functionality. Watch now to learn about this platform and its excellent virtual desktop performance.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

ESG Video Interview: Virtualization-Driven Data Protection Modernization
sponsored by IBM
VIDEO: ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.
Posted: 29 Aug 2016 | Premiered: 31 Mar 2016

IBM

Validated Data Protection Solution for Virtualized Environments
sponsored by Veeam Software
WHITE PAPER: In today's virtualized environment, how do you ensure data protection for your data center? This solution brief explains how to achieve data protection in your virtual infrastructure by employing a validated data protection solution for virtualized environments. Access now, to learn about this solution and its plethora of advanced features.
Posted: 23 Aug 2016 | Published: 30 Jun 2016

Veeam Software

Inside the Linux Container Ecosystem: Building the Container Infrastructure
sponsored by Juniper Networks, Inc.
RESOURCE: This report examines Linux container technology, how it evolved, and how it compares to other open platforms that build and run distributed apps. Access the results of the 2016 Container Survey to find out where and how containers are being deployed, who the top vendors are, how to address NFV with containers, and more.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Juniper Networks, Inc.

5 Ways Virtualization Lowers Costs and Boosts Security for Healthcare
sponsored by Citrix
WHITE PAPER: Mandated IT-enabled technology, such as EHR and medical imaging, directly contributes to better patient care and reduced medical errors – but also poses a challenge for IT. Discover 5 use cases that show how virtualization can make life easier for your IT teams, improve security and result in significant cost savings to your organization.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Citrix

Cloud Access Security Brokers Fill Critical Enterprise Void
sponsored by Palerra Inc.
EGUIDE: In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

How to Quantify the Value of a Cloud Access Security Broker
sponsored by Palerra Inc.
WHITE PAPER: In this white paper uncover the reasons why Cloud Access Security Brokers are a crucial piece of any enterprise's security policy and how to make sure you're getting cloud security added into your budget.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

Palerra Inc.

Customer Identity Use Cases: Building a Complete, Contextual Digital Experience
sponsored by Radiant Logic, Inc.
WEBCAST: See how to implement faster authentication with seamless SSO and deploy finer-grained authorization and customized services. Learn about combining these two things to provide your customers with a better digital experience.
Posted: 08 Aug 2016 | Premiered: Oct 8, 2015

Radiant Logic, Inc.

Overcome Identity Integration Challenges
sponsored by Radiant Logic, Inc.
RESOURCE: In this infographic, get a quick grasp of how you can easily integrate identity using a federated identity service based on virtualization. Learn how you can manage groups dynamically, join attributes from all sources to build global user profiles, and more.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

Radiant Logic, Inc.

Microsegmentation Strategies for Smarter Security
sponsored by VMware
EGUIDE: In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Multi-User GPU: Make IT More Dependable and Easier to Manage
sponsored by AMD
VIDEO: Discover a multi-user GPU that delivers workstation-class graphics from the data center, providing the freedom to run any application on virtually any device, anywhere on the network. Watch now to learn more about the world's first hardware virtualized GPU that provides superior performance, enhanced security, and scalability.
Posted: 19 Jul 2016 | Premiered: 19 Jul 2016

AMD

CW Middle East July to Sept 2016:
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
Posted: 13 Jul 2016 | Published: 18 Jul 2016

ComputerWeekly.com

Virtual Workspace:Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: This feature white paper expands on some of the questions you may still have about finding the right workspace aggregator. It addresses some of the questions you may have about choosing the right workspace aggregator.
Posted: 12 Jul 2016 | Published: 12 Jul 2015

Matrix42

Lightning-Fast Virtual System Recovery
sponsored by arcserve
WEBCAST: Discover a unified data protection solution with instant, efficient virtual machine recovery and migration capabilities and watch a demonstration on how this solution works. Explore how this virtual system backup can provide your enterprise with improvements in RPO, RTO, database performance, and more.
Posted: 12 Jul 2016 | Premiered: May 20, 2016

arcserve

A Guide to Red Hat Enterprise Linux and Virtualization Platforms
sponsored by Red Hat
DATA SHEET: In this white paper, learn about the benefits of a virtualization platform that leverages Red Hat Enterprise Linux features. In addition to saving time and money, this option also offers scalability, extended hardware support, enhanced security, and more.
Posted: 12 Jul 2016 | Published: 31 Dec 2015

Red Hat

Fast and Easy Enterprise-Class VDI
sponsored by Dell, Microsoft and Citrix
DATA SHEET: Explore an infrastructure solution for virtual desktops that enables enterprises to start off with a single appliance that scales predictably as they grow. Learn how this cost-effective appliance can provide your enterprise with predictable scale and availability, speed time-to-value, flexible configuration, and more.
Posted: 05 Jul 2016 | Published: 30 Jun 2016

Dell, Microsoft and Citrix

Solve Real-World Challenges With App Virtualization and VDI
sponsored by Citrix
RESOURCE: This infographic reveals how app virtualization and VDI can solve real-world challenges in today's mobile enterprises. Uncover the top 4 use cases for app and desktop virtualization.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Citrix

Secure App and Data Delivery – Across Devices, Networks, and Locations
sponsored by Citrix
WHITE PAPER: Discover a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but also reduces the tools needed to protect them.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Citrix

Evaluating Recovery-in-Place Strategies for Data Protection
sponsored by Veritas
EGUIDE: Inside this exclusive data protection guide, explore a detailed breakdown of recovery-in-place technology, its top use cases and three key considerations to keep in mind when evaluating data protection techniques.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas
1 - 25 of 527 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement