IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization SecurityReports
126 - 150 of 503 Matches Previous Page  | Next Page
Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

IT Security Case Studies
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

Network Evolution University: Cloud Networking - Designing the Hybrid Cloud
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it.
Posted: 20 May 2013 | Premiered: 22 May 2013

SearchNetworking.com

The 10 “Must-Haves” for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: This whitepaper provides a security framework and evaluator's checklist you can use to make sure you are securing mobile devices and data properly, including the 10 "must haves" for secure enterprise mobility.
Posted: 26 Mar 2013 | Published: 28 Feb 2013

Citrix

Integrated Data Protection for VMware Infrastructure
sponsored by HP Autonomy
WHITE PAPER: Explore details of a solution that provides the fast, efficient, and reliable data protection your organization needs in your virtual and cloud environments.
Posted: 04 Mar 2013 | Published: 31 Aug 2012

HP Autonomy

Security as a Service: Benefits and Risks of Cloud-Based Security
sponsored by SearchSecurity.com
EGUIDE: Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

SearchSecurity.com

March Pulse E-Zine
sponsored by SearchHealthIT.com
EZINE: Specialists like radiologists try to fit their RIS into the EHR criteria. It's a bit like fitting a square peg into a round hole.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchHealthIT.com

Virtualization Security: Protecting Virtualized Environments
sponsored by ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

ComputerWeekly.com

Network Evolution University: Deploying Network Virtualization
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom deep dives on technologies that include SDN, virtual network overlays and virtualization platforms.
Posted: 15 Feb 2013 | Premiered: 15 Feb 2013

SearchNetworking.com

Mobility, Virtualization and the Next-Generation Workplace
sponsored by Cisco Systems, Inc.
WHITE PAPER: By reading this report from Forrester Consulting, you’ll gain an understanding of the benefits, challenges and timelines for implementing workspace initiatives such as BYOD programs as well as collaboration, desktop virtualization, app virtualization and security solutions.
Posted: 12 Jul 2013 | Published: 30 Jun 2012

Cisco Systems, Inc.

Claranet Managed Application Hosting services
sponsored by Claranet
WHITE PAPER: Access this brief resource to learn details of one managed application hosting service which uses the latest advances in virtualization, security and storage technologies to part- or fully- manage their customer's applications. Read on to learn the benefits it can bring to your organization.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Claranet

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Tackling data growth challenges with NetApp storage systems
sponsored by NetApp
WHITE PAPER: This ESG Lab Spotlight explores how NetApp Data ONTAP 8.2 can help organizations create a highly efficient, flexible, and scalable data storage environment that supports a shared IT infrastructure foundation.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

NetApp

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam

Mobile Device Security Lacking in Most Hospital Policy Discussions
sponsored by Essextec
EZINE: This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Essextec

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Multi-Hypervisor Environments: Worth the Work?
sponsored by SearchCIO.com
EZINE: Are multi-hypervisor environments the right solution to virtualization oligarchy? Perhaps, but CIOs must also beware adding unnecessary complexities.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

SearchCIO.com

Best Practices: Approaching Disaster Recovery Costs and Cloud Strategies for Your Organization
sponsored by NetApp and SunGard
EGUIDE: Read this expert e-guide that will present you with a smart approach to disaster recovery spending in a virtualized environment.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

NetApp and SunGard

Hitachi Storage Virtualization
sponsored by Hitachi Data Systems
VIDEO: Watch this video to learn how one vendor's storage virtualization solution gives you access to all of your resources from a single interface, significantly simplifies management and reduces the overall costs of your IT environment.
Posted: 26 Apr 2013 | Premiered: 16 Apr 2013

Hitachi Data Systems

Oracle Engineered Systems: Complete Data Center Infrastructure for SAP Landscapes
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Consult this white paper to learn more about how to deploy an SAP landscape effectively. There's no denying that it requires a great deal of effort, but by consulting this resource your business may be able to avoid the headache. Find out how you can spend your time wisely by reading this white paper now.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment
sponsored by EMC
WHITE PAPER: This white paper reveals the benefits of virtual private cloud deployment and how one leading vendor's cloud virtualization technologies support the implementation of secure private cloud deployments of Microsoft Exchange Server and Microsoft SharePoint.
Posted: 17 Apr 2013 | Published: 28 Feb 2013

EMC

Optimizing Microsoft® SharePoint with Dell
sponsored by Dell and Microsoft
WHITE PAPER: The workplace is quickly becoming a highly mobilized environment where employees can work remotely. As executives work from home or during travel, important company data is housed in remote buildings far from the protection of the office walls. View this resource to learn more about protecting your business with governance and compliance.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Dell and Microsoft

Agentless Security for Vmware Virtual Data Centers and Cloud
sponsored by Trend Micro
WHITE PAPER: This resource will help you understand how applying traditional architectures to virtual environments can hurt your organization's productivity and security posture, and what you need to do in order to secure your virtual environment effectively. Read on to learn more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

FAQ: How can Virtualized Storage be Used for Medical Images?
sponsored by HP & Intel®
EGUIDE: This E-Guide explores frequently asked questions related to the use of virtualized storage technology for medical images. Additionally, with stringent regulations forcing health care organizations to generate electronic records, virtualized storage is becoming an increasingly viable option.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

HP & Intel®
126 - 150 of 503 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement