IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
151 - 175 of 542 Matches Previous Page  |  Next Page
Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Storage Magazine: How to improve your virtual server storage setups
sponsored by IBM.
EZINE: In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.
Posted: 26 Aug 2013 | Published: 28 May 2013


How Citrix ShareFile Enables Secure Data Sharing in the Enterprise
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix Systems, Inc.

Citrix Xendesktop : Desktop Virtualization for all – Technical overview
sponsored by Citrix
WHITE PAPER: In this whitepaper, you’ll find a discussion of the various options that FlexCast provides to help meet the computing requirements of various user types.
Posted: 26 Aug 2013 | Published: 26 Aug 2013


Amplify Productivity With XenDesktop
sponsored by Citrix and HP
WHITE PAPER: This whitepaper will show you how you can establish a blueprint to simplify, design, order and deploy client virtualization within your environment with low-risk implementation.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Citrix and HP

E-Guide: Evaluating network security virtualization products
sponsored by Sophos, Inc.
EGUIDE: This expert e-guide from will help you determine whether virtual security options are a good fit for your organization. Inside, uncover the value of network security virtualization products, learn about security features to look for, and more.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

Sophos, Inc.

15 Minute Guide: Optimizing Oracle DBA Efficiency
sponsored by EMC Corporation
WHITE PAPER: Oracle's DBA efficiency can be optimized with EMC's virtual IT infrastructure.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

EMC Corporation

Do Mobile Users Need Full Desktop Access?
sponsored by VMware, Inc.
EGUIDE: In this expert guide from, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

VMware, Inc.

Desktop Virtualization: Partnering for a Successful Long-term Strategy
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper explains how IT departments can move from a traditional desktop infrastructure to a unified desktop with multiple deployment options by identifying the best option for transition to a new desktop delivery method, such as managed deployment, a cloud offering, or a hybrid approach.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

VMware, Inc.

Juniper Virtual Cloud Security Does and Don'ts
sponsored by IBM and Juniper
WHITE PAPER: This exclusive paper looks at six critical dos and don'ts for security in virtualized data centers, discussing best practices that help your organization overcome the common problems that will inevitably arise.
Posted: 01 Aug 2013 | Published: 01 Aug 2013

IBM and Juniper

Guidelines and best practices for virtual systems in health care IT
sponsored by HP & Intel®
EGUIDE: This e-guide from offers nine rules every health care facility should follow when adopting virtualized technologies. Uncover the risks and rewards involved with utilizing virtual systems, and learn more about what the future is likely to bring.
Posted: 01 Aug 2013 | Published: 15 May 2013

HP & Intel®

Kettering Health Network and their use of P4800 and VDI
sponsored by HP and Intel® Xeon® processors
CASE STUDY: This white paper demonstrates how Kettering Health Network - a top 10 U.S. health system three years running - adopted client virtualization technology to make it easier for clinicians to access applications and records no matter where they are located in the facility. This helps maximize clinician-patient time by reducing clinician-PC time.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP and Intel® Xeon® processors

Six Essential Steps for Unleashing the Power of Enterprise Mobility
sponsored by Cisco
WHITE PAPER: While devices are driving the mobile revolution, they are merely the first step to a truly mobile-friendly enterprise.
Posted: 31 Jul 2013 | Published: 31 Jul 2013


VMware vSphere with Operations Management on HP Converged Infrastructure
sponsored by HP and VMware
WHITE PAPER: Read this whitepaper and learn how to aggregate workload data, apply predictive analytics and perform capacity planning, allowing you to deliver improved service-level agreements (SLAs), achieve infrastructure and application availability and gain higher resource utilization.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

HP and VMware

VMware Horizon Suite on HP Converged Infrastructure
sponsored by HP and VMware
WHITE PAPER: Read this whitepaper to learn how removing technology barriers via desktop virtualization can enable IT to shift from a reactive strategy to a proactive approach, delivering services that enhance agility and productivity rather than simply addressing problems as they arise.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

HP and VMware

How to Improve Migrations with User and Desktop Virtualization
sponsored by AppSense
VIDEO: Watch this quick video to learn how user and desktop virtualization can not only help make Windows 7 migration simpler, but can make management easier for your IT department while creating a much better user experience.
Posted: 27 Jul 2013 | Premiered: 27 Jul 2013


Nationwide Children's Hospital achieve a smooth migration process with AppSense
sponsored by AppSense
CASE STUDY: In this case-study, find out how Nationwide Children’s Hospital improved desktop manageability and security, increased flexibility for remote workers, and decreased logon times by migrating to virtual desktops.
Posted: 22 Jul 2013 | Published: 22 Jul 2013


Case Study: Fransicican Missionaries of Our Lady Health System
sponsored by AppSense
WHITE PAPER: Read this whitepaper to learn how one major healthcare provider that manages roughly 13,000 employees and 8000 contract staff were able to use user virtualization to improve clinical workflow and gain a competitive advantage.
Posted: 19 Jul 2013 | Published: 18 Jul 2013


Case Study: Global Law Firm Solves Privilege Management Issues with User Virtualization
sponsored by AppSense
CASE STUDY: In this case-study, you’ll discover how a global, highly regulated law firm was able to eliminate end-user management issues with a people-centric user virtualization solution.
Posted: 19 Jul 2013 | Published: 19 Jul 2013


How to Optimize IT Initiatives with User Virtualization
sponsored by AppSense
WHITE PAPER: This whitepaper explains how user virtualization works to span both physical and virtual desktops, allowing you to manage all aspects of the user independent of your method of desktop delivery.
Posted: 19 Jul 2013 | Published: 19 Jul 2013


Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013


Mobility, Virtualization and the Next-Generation Workplace
sponsored by Cisco Systems, Inc.
WHITE PAPER: By reading this report from Forrester Consulting, you’ll gain an understanding of the benefits, challenges and timelines for implementing workspace initiatives such as BYOD programs as well as collaboration, desktop virtualization, app virtualization and security solutions.
Posted: 12 Jul 2013 | Published: 30 Jun 2012

Cisco Systems, Inc.

Claranet Managed Application Hosting services
sponsored by Claranet
WHITE PAPER: Access this brief resource to learn details of one managed application hosting service which uses the latest advances in virtualization, security and storage technologies to part- or fully- manage their customer's applications. Read on to learn the benefits it can bring to your organization.
Posted: 28 Jun 2013 | Published: 28 Jun 2013


How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

151 - 175 of 542 Matches Previous Page    5 6 7 8 9 10    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement