IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
101 - 125 of 552 Matches Previous Page  |  Next Page
All-Flash Reference Architecture for VMware Horizon View
sponsored by NetApp
WHITE PAPER: Read this in-depth technical report to discover how to increase performance and lower your per-desktop costs with a NetApp all-flash reference architecture for VMware Horizon View.
Posted: 02 Jul 2014 | Published: 02 Jul 2014


VDI and Beyond: Addressing Top IT Challenges to Drive Agility and Growth
sponsored by Citrix
WHITE PAPER: This paper explores a collection of services that can help drive a modern, mobile workforce toward greater agility and productivity, one project at a time.
Posted: 28 May 2014 | Published: 07 Nov 2013


How to Save 100s of Backup Maintenance Hours
sponsored by Veeam Software
WEBCAST: This webinar highlights the difficulties of maintaining outdaed backup approaches. It also highlights the benefits of Veeam Backup and Replication, a solution that provides flexible, reliable and fast recovery of virtualized applications and data.
Posted: 06 May 2014 | Premiered: Apr 10, 2014

Veeam Software

The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

The CIO Guide to Virtual Server Data Protection
sponsored by Commvault
WHITE PAPER: In this white paper, discover the three questions you need to be asking about data protection in your virtualized environment.
Posted: 27 Feb 2014 | Published: 27 Feb 2014


IT Priorities 2014: UK Europe, France and Germany
sponsored by
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software

Is the cloud safe? Breaking down the barriers to cloud computing
sponsored by
WHITE PAPER: Research by Savvis has identified the five biggest concerns preventing IT managers from opting for cloud-based services. In this report, we examine how to overcome these top five concerns to help IT managers put in place a strategy for cloud computing with confidence
Posted: 20 Dec 2013 | Published: 12 Sep 2010

How to Handle Business Data Protection Needs in a Physical or Virtual Environment
sponsored by arcserve
WHITE PAPER: This white paper dives into the details about virtualization and unveils some hidden complexities when it comes to backup and recovery requirements.
Posted: 02 Jul 2014 | Published: 31 Dec 2013


Heighten Security and Improve Availability With an Application Delivery Solution
sponsored by Citrix
WHITE PAPER: Find out which application virtualization and delivery solutions are capable of working together to provide you with both high availability and stellar security.
Posted: 20 Jun 2014 | Published: 31 Dec 2010


Top Five Mistakes in Consolidating and Virtualizing the Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights the benefits and potential challenges that come with data center consolidation and virtualization.
Posted: 20 Jun 2014 | Published: 31 Jan 2013

Cisco Systems, Inc.

Select the right VMware, Hyper-V protection for a modern data center
sponsored by Veeam Software
WEBCAST: This webinar explains how Nutanix and Veeam work together to enable performance and granular backup for critical workloads on any hypervisor.
Posted: 05 May 2014 | Premiered: Apr 17, 2014

Veeam Software

Testing the Cloud: Definitions, Requirements, and Solutions
sponsored by Ixia
WHITE PAPER: Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
Posted: 02 May 2014 | Published: 02 May 2014


Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Structured Approach to Migrating Oracle Apps from a Physical to Virtual Environment
sponsored by VCE
WHITE PAPER: Access this in-depth white paper to discover a structured approach to migrating Oracle apps from a physical to a virtual environment. Read on to find out why this approach meets many of the challenges presented by the virtualization of Oracle databases and applications, and learn how you can get started.
Posted: 24 Apr 2014 | Published: 31 Dec 2013


How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014


Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013


Real-time visibility into your virtual data center
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This whitepaper discusses a real-time modeling system for virtualized IT environments that provides an operational view of IT services and the servers, hypervisors, VMs, middleware, databases, applications, and network links that enable them to work.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Hewlett Packard Enterprise

Analyst Paper: Linux and Virtualization Bring Operational Efficiency
sponsored by IBM
WHITE PAPER: This IDC whitepaper explores the evolving role of Linux and its extended ecosystem in support of production applications. Inside,you'll also find case studies of customers who deployed a variety of Linux workloads on Power Systems servers rather than on x86 servers, with a low initial cost of acquisition.
Posted: 21 Feb 2014 | Published: 31 Jan 2013


Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Dell Software
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Dell Software

Trend Micro Deep Security: VMWare vSphere with Operations Management
sponsored by Trend Micro
WHITE PAPER: This informative resource introduces a security and operations management solution that protects virtualized datacenters and desktops from the latest threats. Read on to learn how this solution can help your organization address 5 main areas of concern, including security, business continuity, and 3 more.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Trend Micro

Backup and Recovery Changes Drive IT Infrastructure and Business Transformation
sponsored by EMC & Arrow
WHITE PAPER: This White Paper gives an overview of what's causing chagnes within today's IT organizations and datacenters and discusses how backup and recovery can enable broader IT infrastructure and business transformation. It also shows how EMC is helping firms accelerate the transformation of legacy backup processes.
Posted: 17 Feb 2014 | Published: 31 Dec 2012

EMC & Arrow

Building a Reliable Virtual Desktop
sponsored by HP and AMD
EBOOK: Implementing virtual desktop infrastructure is no longer the complicated chore it once was. Still, there’s a lot to consider in making sure VDI performs reliably.
Posted: 15 Jan 2014 | Published: 15 Jan 2014

HP and AMD

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd

Accelerate the Software Development Lifecycle
sponsored by Parasoft Corporation
WEBCAST: Access the following web presentation to uncover expert tips and tricks to leverage service virtualization to accelerate the SDLC. Discover how you can easily implement these techniques and more to gain data acceleration benefits but more importantly, how you can improve software deliverables.
Posted: 03 Jan 2014 | Premiered: Jan 3, 2014

Parasoft Corporation

Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks Next Generation Firewall
sponsored by Citrix and Palo Alto Networks
WHITE PAPER: As desktop virtualization continues to grow in popularity, organizations are looking to optimize their potential benefits. This guide explores virtual desktop infrastructure, potential implementation challenges and how to overcome these challenges.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Citrix and Palo Alto Networks
101 - 125 of 552 Matches Previous Page    3 4 5 6 7 8    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement