IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
1 - 25 of 521 Matches Previous Page  |  Next Page
Computer Weekly – 14 April 2015: Taking stock of e-commerce systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

ComputerWeekly.com

Top 4 Reasons Why Visibility and Control Are Key to Optimizing Your Virtual Infrastructure
sponsored by VMware
WHITE PAPER: What does it take to maximize the performance and cost effectiveness of your virtual infrastructure? Consult the following expert white paper to find out how to do so by addressing visibility and control.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

VMware

Deep Security AWS Success
sponsored by Trend Micro
CASE STUDY: This case study highlights how one organization integrated a security platform into their virtualized environment to ensure compliance for public cloud and AWS to provide secure gaming, social networking, and e-commerce services to its customers.
Posted: 27 Mar 2015 | Published: 31 Dec 2014

Trend Micro

The Emerging Need for Software Defined Acceleration
sponsored by Silver Peak
WHITE PAPER: This white paper outlines how IT teams can coordinate across teams; applications, server, storage, and networking. Learn more about Silver Peak and how it offers solutions for accelerating data mobility over distances.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Silver Peak

Introducing a high-performing, flexible desktop virtualization software
sponsored by Dell, Inc.
DATA SHEET: This informative data sheet highlights a desktop virtualization software solution that combines multiple desktop virtualization technologies in one easy-to-use, integrated system for rapid, secure administration. Find out the benefits to this technology and how its meeting the requirements for greater levels of flexibility and control.
Posted: 23 Mar 2015 | Published: 03 Dec 2014

Dell, Inc.

Mobile Network Operator Enables Secure Access for Consultants
sponsored by Dell, Inc.
CASE STUDY: Inside this brief case study, find out how a mobile network operator adopted a solution that manages, secures, and provisions virtual desktop environments and also broker's connections. Discover how this enabled employees to use their own laptops without exposing the company to risks like viruses and the copying of proprietary information.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

ESG Lab Validation: Enterprise Storage for Performance-driven Databases
sponsored by NetApp
WHITE PAPER: This ESG Lab Report documents the real world performance, reliability, availability, and serviceability of NetApp EFSeries flash arrays in Oracle database environments. A combination of hands on testing by ESG Lab and audited inhouse performance testing executed by NetApp were used to create this report.
Posted: 22 Mar 2015 | Published: 22 Mar 2015

NetApp

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

Data Center Micro-Segmentation
sponsored by VMware
WHITE PAPER: Access this white paper to explore the security capabilities of an SDDC approach and the VMware NSX network virtualization platform.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

VMware

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

Embracing bring your own device (BYOD)
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to examine the three major categories of BYOD – laptops, tablets, and smartphones. Explore the benefits and risks associated with each of these categories and discover recommendations on how to successfully implement an approach in order to embrace BYOD in a way that makes sense for your organization.
Posted: 17 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Bridging the data security gap
sponsored by IBM
WHITE PAPER: This white paper describes the four main areas of data security and how to approach each one.
Posted: 16 Mar 2015 | Published: 31 May 2013

IBM

Three Things Your Old Version of vSphere Doesn’t Do
sponsored by VMware
WHITE PAPER: View this information brief to learn more about why it's time for you to update your virtualization software. This brief explores these added capabilities, and the corresponding benefits, that you gain when you add operations management to your vSphere implementation.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

VMware

7 Signs It's Time to Extend Virtualization from the Data Center to Devices
sponsored by VMware
DATA SHEET: Access this informative data sheet to explore the seven signs that it's time to extend virtualization from the data center to devices.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

VMware

Maximizing Your Desktop and Application Virtualization Implementation - Part 2 of 3
sponsored by VMware, Inc.
BOOK: This informative resource highlights desktop and application virtualization management best practices for image management, BYOD and physical environments, automating desktop provisioning, and more.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

VMware, Inc.

Desktop as a Service: Delivering the Customer Experience Users Require Without the Up-Front Costs
sponsored by VMware
WHITE PAPER: In this white paper, find out how DaaS is moving beyond client virtualization efforts by moving VDI to hosted cloud service providers.
Posted: 25 Feb 2015 | Published: 29 Aug 2014

VMware

The State of Application Delivery in 2015
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper examines how applications have changed the landscape for CRM and other business processes enterprise-wide. Read on to learn more.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

F5 Networks

MicroScope E-Zine February 2015: An issue covering the IT skills issue and SDN
sponsored by MicroScope
EZINE: An issue highlighting the need for investment in the next generation of skilled staff.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

MicroScope

Bridging the Data Security Gap: Unified Data Protection for 4 Key Data Environments
sponsored by IBM
WHITE PAPER: This white paper explores how to bridge the data security gap amid the digital information explosion in four major areas: Big data, virtual environments and the cloud, enterprise data, and enterprise applications.
Posted: 12 Feb 2015 | Published: 31 May 2013

IBM

Improving clinical workflow and increasing desktop security with VDI
sponsored by AppSense
CASE STUDY: To improve clinical workflow and increase desktop security, one healthcare organization implemented an environment manager to assist with VDI deployment. Discover how this strategy allowed them to reduce Windows launch times, provide a consistent user experience, simplify IT resources, and enable dynamic printing changes based on location.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

AppSense

Case Study: How one healthcare center cut costs on Windows 7 migration and increased user productivity with virtualization
sponsored by AppSense
CASE STUDY: Access this case study to discover how a healthcare organization was able to leverage virtualization to manage a diverse combination of users, apps, and data across the enterprise desktop environment with a powerful user-based policies and personalization within their healthcare environment.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

AppSense

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

What if your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell, Inc. and Intel®
VIDEO: In this video, Brian Madden faces what happens if application virtualization solutions doesn't support location-based security.
Posted: 19 Jan 2015 | Premiered: 19 Jan 2015

Dell, Inc. and Intel®

3 Questions Every CIO Should Ask About Virtual Server Data Protection
sponsored by CommVault
WHITE PAPER: This whitepaper examines what today's IT leaders need to know about providing comprehensive protection for virtual machines – especially in terms of scalability, recovery capabilities and application integration.
Posted: 07 Jan 2015 | Published: 13 May 2014

CommVault

VDI Comparison: Five Reasons XenDesktop Beats Horizon View
sponsored by Citrix
WHITE PAPER: This white paper explores five ways Citrix XenDesktop and VMware Horizon View compare. Find out how to determine which solution will best help you achieve the goals of your own VDI initiative.
Posted: 05 Jan 2015 | Published: 31 Jan 2014

Citrix
1 - 25 of 521 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement