IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization SecurityReports
126 - 150 of 513 Matches Previous Page  | Next Page
Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

IT Security Case Studies
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

Desktop Virtualization: Partnering for a Successful Long-term Strategy
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper explains how IT departments can move from a traditional desktop infrastructure to a unified desktop with multiple deployment options by identifying the best option for transition to a new desktop delivery method, such as managed deployment, a cloud offering, or a hybrid approach.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

VMware, Inc.

Juniper Virtual Cloud Security Does and Don'ts
sponsored by IBM and Juniper
WHITE PAPER: This exclusive paper looks at six critical dos and don'ts for security in virtualized data centers, discussing best practices that help your organization overcome the common problems that will inevitably arise.
Posted: 01 Aug 2013 | Published: 01 Aug 2013

IBM and Juniper

Kettering Health Network and their use of P4800 and VDI
sponsored by HP and Intel® Xeon® processors
CASE STUDY: This white paper demonstrates how Kettering Health Network - a top 10 U.S. health system three years running - adopted client virtualization technology to make it easier for clinicians to access applications and records no matter where they are located in the facility. This helps maximize clinician-patient time by reducing clinician-PC time.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP and Intel® Xeon® processors

Guidelines and best practices for virtual systems in health care IT
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com offers nine rules every health care facility should follow when adopting virtualized technologies. Uncover the risks and rewards involved with utilizing virtual systems, and learn more about what the future is likely to bring.
Posted: 01 Aug 2013 | Published: 15 May 2013

HP & Intel®

Six Essential Steps for Unleashing the Power of Enterprise Mobility
sponsored by Cisco
WHITE PAPER: While devices are driving the mobile revolution, they are merely the first step to a truly mobile-friendly enterprise.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Cisco

VMware vSphere with Operations Management on HP Converged Infrastructure
sponsored by HP and VMware
WHITE PAPER: Read this whitepaper and learn how to aggregate workload data, apply predictive analytics and perform capacity planning, allowing you to deliver improved service-level agreements (SLAs), achieve infrastructure and application availability and gain higher resource utilization.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

HP and VMware

VMware Horizon Suite on HP Converged Infrastructure
sponsored by HP and VMware
WHITE PAPER: Read this whitepaper to learn how removing technology barriers via desktop virtualization can enable IT to shift from a reactive strategy to a proactive approach, delivering services that enhance agility and productivity rather than simply addressing problems as they arise.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

HP and VMware

How to Improve Migrations with User and Desktop Virtualization
sponsored by AppSense
VIDEO: Watch this quick video to learn how user and desktop virtualization can not only help make Windows 7 migration simpler, but can make management easier for your IT department while creating a much better user experience.
Posted: 27 Jul 2013 | Premiered: 27 Jul 2013

AppSense

Nationwide Children's Hospital achieve a smooth migration process with AppSense
sponsored by AppSense
CASE STUDY: In this case-study, find out how Nationwide Children’s Hospital improved desktop manageability and security, increased flexibility for remote workers, and decreased logon times by migrating to virtual desktops.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

AppSense

Case Study: Fransicican Missionaries of Our Lady Health System
sponsored by AppSense
WHITE PAPER: Read this whitepaper to learn how one major healthcare provider that manages roughly 13,000 employees and 8000 contract staff were able to use user virtualization to improve clinical workflow and gain a competitive advantage.
Posted: 19 Jul 2013 | Published: 18 Jul 2013

AppSense

Case Study: Global Law Firm Solves Privilege Management Issues with User Virtualization
sponsored by AppSense
CASE STUDY: In this case-study, you’ll discover how a global, highly regulated law firm was able to eliminate end-user management issues with a people-centric user virtualization solution.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

AppSense

How to Optimize IT Initiatives with User Virtualization
sponsored by AppSense
WHITE PAPER: This whitepaper explains how user virtualization works to span both physical and virtual desktops, allowing you to manage all aspects of the user independent of your method of desktop delivery.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

AppSense

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

Mobility, Virtualization and the Next-Generation Workplace
sponsored by Cisco Systems, Inc.
WHITE PAPER: By reading this report from Forrester Consulting, you’ll gain an understanding of the benefits, challenges and timelines for implementing workspace initiatives such as BYOD programs as well as collaboration, desktop virtualization, app virtualization and security solutions.
Posted: 12 Jul 2013 | Published: 30 Jun 2012

Cisco Systems, Inc.

Claranet Managed Application Hosting services
sponsored by Claranet
WHITE PAPER: Access this brief resource to learn details of one managed application hosting service which uses the latest advances in virtualization, security and storage technologies to part- or fully- manage their customer's applications. Read on to learn the benefits it can bring to your organization.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Claranet

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Tackling data growth challenges with NetApp storage systems
sponsored by NetApp
WHITE PAPER: This ESG Lab Spotlight explores how NetApp Data ONTAP 8.2 can help organizations create a highly efficient, flexible, and scalable data storage environment that supports a shared IT infrastructure foundation.
Posted: 26 Jun 2013 | Published: 26 Jun 2013

NetApp

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST: Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013

CenterBeam

Mobile Device Security Lacking in Most Hospital Policy Discussions
sponsored by Essextec
EZINE: This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Essextec

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Multi-Hypervisor Environments: Worth the Work?
sponsored by SearchCIO.com
EZINE: Are multi-hypervisor environments the right solution to virtualization oligarchy? Perhaps, but CIOs must also beware adding unnecessary complexities.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

SearchCIO.com

Best Practices: Approaching Disaster Recovery Costs and Cloud Strategies for Your Organization
sponsored by NetApp and SunGard
EGUIDE: Read this expert e-guide that will present you with a smart approach to disaster recovery spending in a virtualized environment.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

NetApp and SunGard
126 - 150 of 513 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement