IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization SecurityReports
226 - 250 of 531 Matches Previous Page  | Next Page
SearchStorageUK Essential Guide to Backup
sponsored by SearchStorage.co.UK
EGUIDE: Check out this expert E-Guide to discover the current state of backup, and learn about today's newest available data protection, virtualization and backup technologies.
Posted: 08 May 2012 | Published: 08 May 2012

SearchStorage.co.UK

Focus on Storage in a VMware Environment
sponsored by SearchVirtualStorage.com
EBOOK: Storage is perhaps the most critical component of a virtual infrastructure. Read this expert e-guide to learn about VMware storage management, storage-related improvements in vSphere 5 and more.
Posted: 07 May 2012 | Published: 02 May 2012


Information Security Magazine - May 2012
sponsored by SearchSecurity.com
EZINE: Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.
Posted: 01 May 2012 | Published: 01 May 2012

SearchSecurity.com

Cloud Management: Overcoming today’s Top Risks
sponsored by SearchSecurity.com
EGUIDE: Under a cloud paradigm, as services become more concentrated, risks follow suit, so it is important to understand and account for these changes and adjust security programs accordingly. View this e-guide to explore the top security risks in cloud computing today and how to overcome them.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

SearchSecurity.com

Three Steps to PCI Compliance in the Cloud
sponsored by SearchSecurity.com
EGUIDE: PCI virtualization compliance is extremely challenging, requiring organizations to not only revalidate service providers, but face ongoing operational problems that that can arise during compliance audits. In this e-guide uncover three steps you can implement to ensure the environment stays compliant over a long-term deployment.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

SearchSecurity.com

How Can I Virtualize My Mission-critical Servers While Maintaining or Improving Security?
sponsored by CA Technologies.
WHITE PAPER: Organizations often struggle to fully realize the benefits of virtualization due to the complexity of controlling identities, access and information. In this resource, uncover how to successfully deploy virtualization projects, while providing the right security controls over privileged user access across virtual and physical environments.
Posted: 15 May 2012 | Published: 15 May 2012

CA Technologies.

Improving VDI with Scalable Infrastructure
sponsored by F5 Networks
WHITE PAPER: Access this white paper to discover ways to improve virtual desktop infrastructure with scalable solutions. Learn how to optimize traffic between virtual desktop servers and target machines, enhance security and more.
Posted: 09 May 2012 | Published: 09 May 2012

F5 Networks

May Technical Guide on PCI DSS Guidance
sponsored by SearchSecurity.com
EGUIDE: This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Posted: 08 May 2012 | Published: 07 May 2012

SearchSecurity.com

Best Practices for Shared Infrastructure Data Storage in the Federal Government
sponsored by MicroTech & Netapp
WHITE PAPER: Read this white paper to discover how the U.S. Federal Government is consolidating and improving storage operations with emerging virtualization and cloud technologies, and discover how similar solutions can benefit your business.
Posted: 07 May 2012 | Published: 31 Dec 2011

MicroTech & Netapp

Five Best Practices to Protect Your Virtual Environment
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment.
Posted: 01 May 2012 | Published: 20 Apr 2012

Juniper Networks, Inc.

Backup & Recovery for VMware Environments with Avamar 6.0
sponsored by EMC Corporation
WHITE PAPER: This white paper highlights several new features within EMC® Avamar® 6.0 that specifically target and greatly advance the capabilities and performance of VMware® data protection.
Posted: 23 Apr 2012 | Published: 31 Oct 2011

EMC Corporation

Overcoming virtualization security risks: Best practices
sponsored by Kaspersky Lab
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Kaspersky Lab

Top 5 VM Backup Mistakes
sponsored by DLT Solutions
EGUIDE: This tip guide is your key to overcoming today's top VM backup mistakes. Read on to learn more.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

DLT Solutions

Tackling File Server Sprawl: File Virt Software vs. Scalable NAS
sponsored by Sanbolic Inc.
EGUIDE: Check out this E-Guide today to learn how you can overcome file server sprawl in today's data-driven IT.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Sanbolic Inc.

A Pragmatic Approach to Network Security for Virtualized Computing Environments
sponsored by Palo Alto Networks
WHITE PAPER: Organizations often struggle when it comes to virtualization technologies, especially in providing adequate network security for modern computing environments. In this paper, explore the common challenges organizations face today and uncover a framework and best practices that organizations can use to address them.
Posted: 16 Apr 2012 | Published: 16 Apr 2012

Palo Alto Networks

Backup and Recovery for Enterprise Applications in VMWare Environments
sponsored by EMC Corporation
WHITE PAPER: This ESG white paper is your key to improving backup operations in your virtual environment. Read on to learn more.
Posted: 16 Apr 2012 | Published: 31 Mar 2011

EMC Corporation

Virtual Server Backup Essential Guide
sponsored by SearchVirtualStorage.com
EGUIDE: Check out this expert E-Guide to discover what you can do to start improving VM backup and restore operations today.
Posted: 16 Apr 2012 | Published: 11 Apr 2012


EMC Backup and Recovery for VMWare
sponsored by EMC Corporation
WHITE PAPER: Check out this white paper to make sure you're getting the most bang for your buck when it comes to VM backup, data protection and DR for virtual environments.
Posted: 12 Apr 2012 | Published: 12 Apr 2012

EMC Corporation

Eguide: Healthcare Center Improves the well-being of their Data Protection
sponsored by Syncsort
EGUIDE: Check out this brief case study to learn how one community health center was able to greatly improve backup, DR and storage operations.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

Syncsort

Presentation Transcript: Virtual Server Backup
sponsored by CommVault
PRESENTATION TRANSCRIPT: Check out this Q&A with ESG analyst Mark Bowker for today's best practices regarding virtual server backup.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

CommVault

Virtual Certainty: Best Practices for Gaining Monitoring Clarity in VMware Environments
sponsored by Nimsoft, Inc.
WHITE PAPER: Read this white paper to learn best practices for monitoring virtual environments. Discover how to minimize challenges such as lack of visibility, inefficiency and complexity so you can stay enjoying all the benefits virtualization has to offer.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Nimsoft, Inc.

Computer Weekly - 3 April 2012: Data security best practice
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.
Posted: 02 Apr 2012 | Published: 03 Apr 2012

ComputerWeekly.com

Increase Visibility Into Virtual Infrastructures With a Layered Security Strategy
sponsored by CA Technologies.
EGUIDE: Brought to you by SearchNetworking.com, this expert E-Guide unveils how you can increase your visibility with a layered security strategy.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

CA Technologies.

NexGen n5 Storage System
sponsored by NexGen Storage
WHITE PAPER: Check out this ESG Report for a hands-on introduction to a hybrid solid-state storage solution designed to deliver fast performance for mixed-application workloads in both consolidated and virtual server environments. Read on to learn about the features of this technology, and to discover how it stacked up against ESG's lab testing.
Posted: 30 Mar 2012 | Published: 29 Mar 2012

NexGen Storage

vSphere 5: Friend or Foe of Storage?
sponsored by SearchStorage.com
EGUIDE: Check out this E-Guide to discover the features associated with vSphere 5, and specifically discover two functions designed to help you get a better handle on resource utilization in the face of today's data massive growth. Read on to learn more.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

SearchStorage.com
226 - 250 of 531 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement