IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
1 - 25 of 534 Matches Previous Page  |  Next Page
Multi-User GPU: Make IT More Dependable and Easier to Manage
sponsored by AMD
WEBCAST: Discover a multi-user GPU that delivers workstation-class graphics from the data center, providing the freedom to run any application on virtually any device, anywhere on the network. Watch now to learn more about the world's first hardware virtualized GPU that provides superior performance, enhanced security, and scalability.
Posted: 19 Jul 2016 | Premiered: Jul 19, 2016

AMD

CW Middle East July to Sept 2016:
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
Posted: 13 Jul 2016 | Published: 18 Jul 2016

ComputerWeekly.com

Virtual Workspace:Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: This feature white paper expands on some of the questions you may still have about finding the right workspace aggregator. It addresses some of the questions you may have about choosing the right workspace aggregator.
Posted: 12 Jul 2016 | Published: 12 Jul 2015

Matrix42

Lightning-Fast Virtual System Recovery
sponsored by arcserve
WEBCAST: Discover a unified data protection solution with instant, efficient virtual machine recovery and migration capabilities and watch a demonstration on how this solution works. Explore how this virtual system backup can provide your enterprise with improvements in RPO, RTO, database performance, and more.
Posted: 12 Jul 2016 | Premiered: May 20, 2016

arcserve

A Guide to Red Hat Enterprise Linux and Virtualization Platforms
sponsored by Red Hat
DATA SHEET: In this white paper, learn about the benefits of a virtualization platform that leverages Red Hat Enterprise Linux features. In addition to saving time and money, this option also offers scalability, extended hardware support, enhanced security, and more.
Posted: 12 Jul 2016 | Published: 31 Dec 2015

Red Hat

Fast and Easy Enterprise-Class VDI
sponsored by Dell, Inc. and Intel®
DATA SHEET: Explore an infrastructure solution for virtual desktops that enables enterprises to start off with a single appliance that scales predictably as they grow. Learn how this cost-effective appliance can provide your enterprise with predictable scale and availability, speed time-to-value, flexible configuration, and more.
Posted: 05 Jul 2016 | Published: 30 Jun 2016

Dell, Inc. and Intel®

VM Data Protection for Dummies
sponsored by Veeam and Quantum
EBOOK: Discover innovative, modern data protection solutions for data in virtualized environments and explore best practices for choosing the VM protection solution that's right for your enterprise. With the right solution, your enterprise can cost-efficiently secure your virtual environments and backup your data.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Veeam and Quantum

Case Study: Virtualization Strengthening Security
sponsored by emc first distribution
CASE STUDY: Learn how a government agency with very particular needs boosted performance for its systems that were struggling to secure a growing volume of important data on physical workstations.
Posted: 24 Jun 2016 | Published: 30 Sep 2015

emc first distribution

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc.
WHITE PAPER: Explore some of today's challenges in endpoint security and how desktop virtualization strategies can significantly reduce risks and improve protection at endpoints. You'll also examine real-world examples of organizations using desktop virtualization architectures with thin clients to enhance security.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc.
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Securing virtual desktop infrastructure with NetScaler
sponsored by Citrix
WHITE PAPER: Migrating to virtual desktop technologies is a key initiative for many enterprises due to the benefits the technology has to offer. However, in order to realize the desktop and data security benefits of virtual apps and desktops, it's critical to make sure that the VDI is secure. Read on to learn about taking advantage of the benefits VDI offers.
Posted: 15 Jun 2016 | Published: 31 Aug 2015

Citrix

Solve Real-World Challenges With App Virtualization and VDI
sponsored by Citrix
RESOURCE: This infographic reveals how app virtualization and VDI can solve real-world challenges in today's mobile enterprises. Uncover the top 4 use cases for app and desktop virtualization.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Citrix

Secure App and Data Delivery – Across Devices, Networks, and Locations
sponsored by Citrix
WHITE PAPER: Discover a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Citrix

Evaluating Recovery-in-Place Strategies for Data Protection
sponsored by Veritas
EGUIDE: Inside this exclusive data protection guide, explore a detailed breakdown of recovery-in-place technology, its top use cases and three key considerations to keep in mind when evaluating data protection techniques.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

Agile Security at the Speed of Modern Business
sponsored by CloudPassage
WHITE PAPER: An agile security solution implements orchestration and automation to keep up with diverse, fluid and fast-moving infrastructures. Learn how agile security can empower your CISO and their teams to move at the speed of modern business and become enablers of innovation and growth.
Posted: 07 Jun 2016 | Published: 01 May 2016

CloudPassage

Veeam withCisco UCS C240Configuration Guide
sponsored by Veeam Software
ESSENTIAL GUIDE: Discover a backup and replication solution that can increase the value of your backup and reinvent data protection in your virtual environments. This technology can enable your enterprise to benefit from features such as source-side deduplication and compression, parallel processing, and 24/7 application availability.
Posted: 31 May 2016 | Published: 31 May 2016

Veeam Software

IBM Data Protection for Virtual Environments
sponsored by IBM
WHITE PAPER: Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.
Posted: 24 May 2016 | Published: 31 Jul 2015

IBM

Application Awareness: The Critical Enabler in Virtualized Networks
sponsored by Ipoque
WHITE PAPER: Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.
Posted: 17 May 2016 | Published: 29 Apr 2016

Ipoque

Nemertes Research: Re-Architecting the Enterprise Network For WLAN, Cloud, Mobility, Bandwidth, and Cybercrimes
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Future of IT Infrastructure
sponsored by Verizon
WHITE PAPER: Digital is changing the way that most aspects of business are being handled. Instead of worrying about protocols and lead times, your IT function should be focusing on creating the right business rules. Learn more about the latest intelligent networking solutions offering greater visibility and control.
Posted: 06 May 2016 | Published: 27 Apr 2016

Verizon

Case Study: University of LaVerne Implements Data Protection Solution for Virtualized Environment
sponsored by Iron Mountain
CASE STUDY: In this case study, see how one organization implemented a cloud data replication service to help modernize their off-site data protection. Read on to witness how they were able to enhance program control with an automated easy-to-use system, lower storage costs with deduplication and compression, and more.
Posted: 05 May 2016 | Published: 31 Dec 2015

Iron Mountain

How to Get the Most from your Virtualization Investments!
sponsored by TechTarget
RESOURCE: Access this exclusive guide, Delivering on Virtualization's Promise, to explore everything you need to know about effective server virtualization management, including VM provisioning, application availability, and performance monitoring. Simply participate in our brief Server Hardware Research Program to claim your free copy of this report.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

TechTarget

How a Good VDI Pilot Gets Successful Deployments off the Ground
sponsored by Dell, Inc., Intel and VMware
EGUIDE: Countless VDI projects circle the drain because administrators don't test virtual desktop performance thoroughly. Access this e-guide to learn why implementing a VDI pilot program is the most critical step in the transition from physical to virtual desktops. Read on to prepare your organization for a successful, full-scale VDI deployment.
Posted: 29 Apr 2016 | Published: 27 Apr 2016

Dell, Inc., Intel and VMware

The Ultimate Guide for Virtual Server Protection
sponsored by Commvault
WHITE PAPER: Are you staying ahead of the tidal wave of consolidation? Read on to discover 4 questions you should be asking about your virtual server data protection. Also, learn how to optimize your storage, cloud or otherwise, to accommodate your rapidly scaled-out virtual infrastructure.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Commvault

Software-Defined Security for the Software-Defined Infrastructure
sponsored by Intel Security
VIDEO: Learn how a software-defined security approach can help you to improve the security for software-defined infrastructures (SDI) and simplify security management when you're ready for virtualization. Watch now to find out how this approach works and how you can provision security when and where it's needed.
Posted: 06 May 2016 | Premiered: 12 Feb 2016

Intel Security
1 - 25 of 534 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement