IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization SecurityReports
151 - 175 of 494 Matches Previous Page  | Next Page
VMworld Europe Case Study:  Bull SAS
sponsored by ComputerWeekly.com
CASE STUDY: Bull SAS collaborated with suppliers to build a private cloud platform capable of keeping sensitive data secure.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

VMworld Europe Case Study: The National Trust
sponsored by ComputerWeekly.com
CASE STUDY: A virtualisation project has allowed the National Trust to reduce its carbon emissions and to drastically cut its IT energy bill.
Posted: 02 Nov 2012 | Published: 02 Nov 2012

ComputerWeekly.com

VMworld Europe Case Study: Tiger Wheel and Tyre
sponsored by ComputerWeekly.com
CASE STUDY: Virtualisation has helped Tiger Wheel and Tyre future proof its infrastructure and gain a competitive edge.
Posted: 02 Nov 2012 | Published: 02 Nov 2012

ComputerWeekly.com

CW Buyer's Guide: Desktop virtualisation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This eight-page buyer's guide looks at desktop virtualisation and identifies some of the options IT directors must consider when planning a virtualisation project.
Posted: 05 Oct 2012 | Published: 05 Oct 2012

ComputerWeekly.com

IT Handbook: Network Considerations for VDI
sponsored by SearchDataCenter.com
EGUIDE: This expert handbook provides essential insight into network infrastructure preparations for transitioning to a virtual desktop infrastructure. Discover additional information in the areas of network resilience and redundancy, bandwidth considerations, and network services and security.
Posted: 27 Sep 2012 | Published: 27 Sep 2012

SearchDataCenter.com

CW+: Study: The economic benefits of cloud to business and the economy
sponsored by ComputerWeekly.com
WHITE PAPER: This is a summary of the report on and results of an independent study to quantify the economicbenefits of cloud computing to business and to Europe’s five largest economies (in alphabetical order,France, Germany, Italy, Spain and the UK).
Posted: 27 Sep 2012 | Published: 06 Jan 2011

ComputerWeekly.com

UK IT priorities 2012
sponsored by ComputerWeekly.com
IT BRIEFING: This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

Businesses are ready for a new approach to IT
sponsored by IBM
WHITE PAPER: Integrated systems are based on "patterns of expertise," which can dramatically improve the responsiveness of the business. This paper details two types of integrated systems - platform and infrastructure - the benefits of each, such as agility, efficiency, simplicity and control, and so much more.
Posted: 19 Jul 2012 | Published: 18 Apr 2012

IBM

Pharmaceutical Services Company Accelerates Virtual Desktops
sponsored by Cisco Systems, Inc.
CASE STUDY: This case study demonstrates how Quintiles Pharmaceutical Services extended WAN optimization to 100 percent of their virtual desktop infrastructure and improved traffic flow with their existing bandwidth, allowing for secure and centralized data and access control, and high levels of employee satisfaction.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

HealthIT Exclusive Sponsor DataCenter eZine: Server Virtualization
sponsored by HP & Intel®
EZINE: This expert e-zine examines four key topics for health care organizations planning to venture into a virtual server implementation – namely security, storage, performance, and hardware considerations. Gain expert advice from industry experts and HIT leaders that have been through the process
Posted: 19 Nov 2012 | Published: 19 Nov 2012

HP & Intel®

Testing your Windows 7 Migration Strategy
sponsored by AppSense
WHITE PAPER: Migrating to Windows 7 can be a costly, complex and time consuming project. Learn how virtualization can actually reduce the time and cost of a Windows 7 migration while ensuring maximum user adoption. Inside, take our quick challenge to test your Windows 7 migration plan. Discover the advantages and pitfalls of a user virtualization strategy.
Posted: 03 Oct 2012 | Published: 01 Feb 2012

AppSense

User Virtualization: Paving the Way to Windows 7
sponsored by AppSense
WHITE PAPER: This exclusive resource presents how you can leverage user virtualisation to your advantage in order to achieve a seamless Windows 7 transition. Learn how to reduce migration complexity and ease system management without added costs.
Posted: 03 Oct 2012 | Published: 16 Aug 2011

AppSense

Securing the Virtual World
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: With the growing need to reduce costs and improve efficiencies and availability of IT resources, organizations have increasingly turned to virtualization. But there are questions around the security within these environments. This paper explores the new security challenges of virtualization and how to overcome them with a layered security approach.
Posted: 27 Sep 2012 | Published: 27 Sep 2012

WatchGuard Technologies, Inc.

Storage Virtualization Benefits and Drawbacks
sponsored by EMC Isilon
EGUIDE: This SearchStorage.com special report addresses both the benefits and disadvantages of storage virtualization as to help keep you up to speed with the ins and outs of this technology.
Posted: 12 Sep 2012 | Published: 13 Dec 2011

EMC Isilon

DVS Simplified Overview Video
sponsored by Citrix Systems, Inc.
WEBCAST: View this webcast to learn how to make yoru virtual desktop management easy, flexible and secure.
Posted: 09 Aug 2012 | Premiered: Aug 9, 2012

Citrix Systems, Inc.

DVS Simplified Appliance
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read this source to learn how to make your virtual desktop management easy, flexible and secure.
Posted: 09 Aug 2012 | Published: 09 Aug 2012

Citrix Systems, Inc.

Security Practices for Vmware
sponsored by Vyatta Inc.
WEBCAST: This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems.
Posted: 03 Aug 2012 | Premiered: Jun 20, 2012

Vyatta Inc.

Symantec NetBackup 5220 Appliance
sponsored by DLT Solutions
WEBCAST: Watch this webcast today for an introduction to an emerging backup system purpose-built to handle the challenges faced by storage admins in the face of today's data growth. Explore the features and specs this hardware has to offer, and learn what benefits it can bring your organization right out of the box.
Posted: 02 Aug 2012 | Premiered: Aug 2, 2012

DLT Solutions

Security Practices for VMware
sponsored by Vyatta Inc.
PRESENTATION TRANSCRIPT: To properly protect your virtual environment, you must address security at the hypervisor, VM, and network level. This presentation transcript details the fundamentals of virtualization security and highlights the importance of establishing effective management policies.
Posted: 26 Jul 2012 | Published: 10 Jul 2012

Vyatta Inc.

ITG Executive Summary: Value Proposition for IBM PureFlex Systems
sponsored by IBM
WHITE PAPER: This paper outlines a system that includes industry-leading capabilities at the infrastructure management level. Read on to discover how this option offers the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and allows organizations to extend common management services to non-SAP apps.
Posted: 23 Jul 2012 | Published: 18 Apr 2012

IBM

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops
sponsored by Trusteer
PRESENTATION TRANSCRIPT: Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

Trusteer

The CISO's Guide to Virtualization Security
sponsored by Rapid7
WHITE PAPER: Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority.
Posted: 18 Jul 2012 | Published: 12 Jan 2012


How to sell the benefits of VDI technology to key decision makers
sponsored by VCE
EGUIDE: Read this eGuide to learn how to increase the ROI from a virtual desktop infrastructure by implementing a well-thought out design, architecture and deployment plan to more easily manage desktops.
Posted: 17 Jul 2012 | Published: 17 Jul 2012

VCE

Cisco Cloud Enablement Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: Have too many questions on whether cloud computing is right for your organization? Access this key resource to alleviate your concerns and set you in the right direction to recognize the full benefits of the cloud.
Posted: 12 Jul 2012 | Published: 30 Sep 2011

Cisco Systems, Inc.

ING transforms its business with HP Converged Cloud
sponsored by HP & Intel®
WHITE PAPER: Work with consultants and technologists to find the best fully functional cloud environment that put you in the best position to meet your business goals. Check out hot tips from this White Paper for adopting a converged cloud solution for your business.
Posted: 12 Jul 2012 | Published: 12 Jul 2012

HP & Intel®
151 - 175 of 494 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement