IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
1 - 25 of 517 Matches Previous Page  |  Next Page
Maximizing Your Video Utilization: The Best Practices
sponsored by Vyopta
EBOOK: In order to ensure maximum return on investment for your video collaboration, taking advantage of new desktop and mobile software that make it possible to deliver high-quality video experience is crucial. This white paper highlights some of the best practices for maximizing enterprise video utilization.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Vyopta

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

Commvault

IPv6 Leakage and DNS Hijacking in Commercial VPN clients
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

ComputerWeekly.com

How To Solve The Compliance Challenge In The Cloud
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to find out how to solve the compliance challenge in cloud and virtual infrastructure environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

HP True Graphics Performance Comparison
sponsored by HP and AMD
VIDEO: See rich content acceleration in action for Citrix virtual desktops and Linux®-based HP Thin Clients – with fast and smooth streaming, high frame rates and zero codec mismatches. Demo comparison done on two HP t520 Thin Clients over LAN in a Citrix infrastructure.
Posted: 09 Jul 2015 | Premiered: 09 Jul 2015

HP and AMD

Effective Data Protection for Your Virtual Environment
sponsored by IBM
VIDEO: This video discusses the capabilities of a strong virtual data protection system to demonstrate how you can best protect data in your virtual environment.
Posted: 09 Jul 2015 | Premiered: 08 Sep 2014

IBM

Lab Review: What is Needed for Virtual Environment Data Security?
sponsored by IBM
WHITE PAPER: In this white paper, a product that claims to protect data in virtual environments is tested to reveal its capabilities.
Posted: 09 Jul 2015 | Published: 31 Aug 2014

IBM

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 06 Jul 2015 | Published: 07 Aug 2014

IBM

When It Makes Sense to Move to Desktop Virtualization: Seven Key Indicators
sponsored by VMware
WHITE PAPER: In this whitepaper, you'll learn 7 key indicators that it's time for your organization to start thinking about desktop virtualization.
Posted: 30 Jun 2015 | Published: 26 Jul 2013

VMware

Software-Defined Security and the Agile Data Center
sponsored by CloudPassage
WEBCAST: On this webinar, you'll hear from Neil MacDonald, VP Distinguished Analyst from Gartner Research, and CloudPassage's Co-founder and Chief Strategy Officer, Carson Sweet. They'll share insights into the changes required for security and compliance in the new, more agile data center.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015

CloudPassage

Virtualization Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at how malware is adapting to virtual networks and tools (advanced malware protection) and processes (hardening, logging, snapshots) that can help organizations secure these environments.
Posted: 17 Jun 2015 | Premiered: 16 Jun 2015

SearchSecurity.com

How You Can Deliver Scalable, Graphics-Rich Virtual Desktops
sponsored by NVIDIA
WHITE PAPER: Download and discover how NVIDIA is redefining virtualization by delivering quality interactive visual experiences with a GPU that can be implemented at scale. Read on and learn how you can gain a competitive edge with all the technology you need to fully virtualize enterprise computing.
Posted: 02 Jun 2015 | Published: 02 Jun 2015

NVIDIA

Insider Security Threats: Three Kinds of Chaos
sponsored by Clearswift
WHITE PAPER: This white paper presents the current information threat landscape and illustrates today's three major internal security challenges. Continue reading to explore new processes to mitigate risk and secure sensitive data.
Posted: 28 May 2015 | Published: 19 Mar 2014

Clearswift

A guide to storage and virtualisation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Virtualisation brings benefits to the datacentre, but it also brings big changes to storage provisioning and management. We look at the key challenges and how to deal with them.
Posted: 28 May 2015 | Published: 28 May 2015

ComputerWeekly.com

Driving Agility and Security with Data Center Consolidation
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores several security strategies for defending virtualized and cloud-based data centers. Access now to learn how to defend both the physical and virtual planes as you imrpove agility through consolidation.
Posted: 07 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Storage Redefined
sponsored by SearchServerVirtualization
EBOOK: Software-defined storage joins the virtualization discussion, and it could play a key role in future-proofing an infrastructure.
Posted: 06 May 2015 | Published: 06 May 2015

SearchServerVirtualization

Podcast: Transform Your Customer‘s Infrastructure and Accelerate Your Profitability with HP Networking Converged Campus Offerings
sponsored by Hewlett-Packard Company
PODCAST: Access this Podcast now to discover the best ways to use software defined networking (SDN) to handle security threats and device management at a fraction of the cost and without any headache.
Posted: 28 Apr 2015 | Premiered: Apr 20, 2015

Hewlett-Packard Company

You name it, Citrix leads it.
sponsored by Citrix
WHITE PAPER: This informative resource highlights four key areas where Citrix is a market leader. Find out how each of its technologies empowers your business with complete mobile workspaces by securely delivering apps, desktops, and data to any device your end-users use.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Citrix

Top 4 Reasons Why Visibility and Control Are Key to Optimizing Your Virtual Infrastructure
sponsored by VMware
WHITE PAPER: What does it take to maximize the performance and cost effectiveness of your virtual infrastructure? Consult the following expert white paper to find out how to do so by addressing visibility and control.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

VMware

The Emerging Need for Software Defined Acceleration
sponsored by Silver Peak
WHITE PAPER: This white paper outlines how IT teams can coordinate across teams; applications, server, storage, and networking. Learn more about Silver Peak and how it offers solutions for accelerating data mobility over distances.
Posted: 23 Mar 2015 | Published: 23 Mar 2015

Silver Peak

Introducing a high-performing, flexible desktop virtualization software
sponsored by Dell, Inc.
DATA SHEET: This informative data sheet highlights a desktop virtualization software solution that combines multiple desktop virtualization technologies in one easy-to-use, integrated system for rapid, secure administration. Find out the benefits to this technology and how its meeting the requirements for greater levels of flexibility and control.
Posted: 23 Mar 2015 | Published: 03 Dec 2014

Dell, Inc.

Mobile Network Operator Enables Secure Access for Consultants
sponsored by Dell, Inc.
CASE STUDY: Inside this brief case study, find out how a mobile network operator adopted a solution that manages, secures, and provisions virtual desktop environments and also broker's connections. Discover how this enabled employees to use their own laptops without exposing the company to risks like viruses and the copying of proprietary information.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

Computer Weekly – 14 April 2015: Taking stock of e-commerce systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

ComputerWeekly.com
1 - 25 of 517 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement