IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization SecurityReports
26 - 50 of 492 Matches Previous Page  | Next Page
Select the right VMware, Hyper-V protection for a modern data center
sponsored by Veeam Software
WEBCAST: This webinar explains how Nutanix and Veeam work together to enable performance and granular backup for critical workloads on any hypervisor.
Posted: 05 May 2014 | Premiered: Apr 17, 2014

Veeam Software

Testing the Cloud: Definitions, Requirements, and Solutions
sponsored by Ixia
WHITE PAPER: Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Structured Approach to Migrating Oracle Apps from a Physical to Virtual Environment
sponsored by VCE
WHITE PAPER: This paper presents a structured approach to migrating Oracle apps from a physical to a virtual environment. Inside, discover why this approach meets many of the challenges presented by the virtualization of Oracle databases and applications, and learn how you can get started.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

VCE

Download PHD Virtual Backup for Hyper-V, Free for 15 days
sponsored by PHD Virtual
SOFTWARE DOWNLOAD: This free trial provides PHD Virtual Backup for Hyper-V, an easy to use, flexible and affordable offsite backup and archiving solution.
Posted: 18 Apr 2014 | Premiered: 18 Apr 2014

PHD Virtual

5 Steps for Improving Virtual Backup & Data Recovery in Large Enterprises
sponsored by PHD Virtual
WHITE PAPER: This paper explores both the benefits that virtualization brings to the backup and recovery space as well as the benefits, advantages and features that backup and recovery can bring to a large virtual environment.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

PHD Virtual

The Key to Seamless SSO
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource features a virtualized federated identity service that extends authentication beyond the security layer and reaches external applications, ensuring enterprise-wide protection.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

IDC Report: Simplifying Data Protection for Virtual Environments
sponsored by PHD Virtual
WHITE PAPER: This IDC Vendor Profile discusses the firm PHD Virtual Technologies and its virtualized data protection solutions. In addition, this document examines PHD's supplier profile and strategy as well as some of the challenges PHD could encounter as it tries to differentiate itself in a market that is getting increasingly competitive.
Posted: 10 Apr 2014 | Published: 31 Dec 2012

PHD Virtual

How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control, and other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Dell cloud client-computing solutions for Microsoft VDI and Dell vWorkspace
sponsored by Dell and Microsoft
WHITE PAPER: This whitepaper examines a solution that combines the best of Dell and Microsoft solutions in order to implement flexible delivery mechanisms, deploy highly cost-effective virtual desktops, fix problems before they arise to minimize downtime and reduce the time it takes to deploy virtual machines.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Dell and Microsoft

Mobile, Secure AND Cost-Efficient Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Citrix

Bring Distributed Environments Under Control with Desktop Virtualization
sponsored by Dell and Microsoft
WHITE PAPER: This resource highlights the fact that IT departments are no longer dealing with one set of PCs all using the same operating system. It also shows how desktop virtualization can be implemented to improve efficiency and security.
Posted: 17 Mar 2014 | Published: 18 Nov 2013

Dell and Microsoft

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.
Posted: 06 Mar 2014 | Premiered: 06 Mar 2014

CommVault Systems, Inc.

The CIO Guide to Virtual Server Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper takes on the data protection concerns that many organizations face when they virtualize and offers some insight into how these challenges can be met.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CommVault Systems, Inc.

Leveraging Virtualization for Operational Efficiency
sponsored by IBM
WHITE PAPER: This IDC whitepaper explores the evolving role of Linux and its extended ecosystem in support of production applications. Inside,you'll also find case studies of customers who deployed a variety of Linux workloads on Power Systems servers rather than on x86 servers, with a low initial cost of acquisition.
Posted: 21 Feb 2014 | Published: 31 Jan 2013

IBM

The Truth About Microsoft Licensing and the DaaS Delivery Model
sponsored by NaviSite, Inc.
WHITE PAPER: Learn more about the Desktop-as-a-Service (DaaS) delivery model and how it is helping businesses successfully manage and control their increasingly mobile-centric IT environments. This is a podcast presentation transcript.
Posted: 11 Feb 2014 | Published: 21 Oct 2013

NaviSite, Inc.

Nike Adopts Desktop-as-a-Service and Reaps the Benefits
sponsored by NaviSite, Inc.
WEBCAST: Paul August, infrastructure architect for end-user computing at Nike, explains how they were able to leverage Desktop-as-a-Service to create a standardized desktop that gives IT the security controls they want while providing end-users the worldwide flexibility and access they need.
Posted: 11 Feb 2014 | Premiered: Sep 26, 2013

NaviSite, Inc.

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Building a Reliable Virtual Desktop
sponsored by VMware, Inc.
EGUIDE: Implementing virtual desktop infrastructure is no longer the complicated chore it once was. Still, there’s a lot to consider in making sure VDI performs reliably.
Posted: 15 Jan 2014 | Published: 15 Jan 2014

VMware, Inc.

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Real-time visibility into your virtual data center
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper discusses a real-time modeling system for virtualized IT environments that provides an operational view of IT services and the servers, hypervisors, VMs, middleware, databases, applications, and network links that enable them to work.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Managing Risk in an Active Directory Integrated Virtualized Environment
sponsored by Dell Software
WHITE PAPER: Read this exclusive resource to find out about the security risks of Active Directory integrated virtualization.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Dell Software

Trend Micro Deep Security: VMWare vSphere with Operations Management
sponsored by Trend Micro
WHITE PAPER: This informative resource introduces a security and operations management solution that protects virtualized datacenters and desktops from the latest threats. Read on to learn how this solution can help your organization address 5 main areas of concern, including security, business continuity, and 3 more.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Trend Micro

Backup and Recovery Changes Drive IT Infrastructure and Business Transformation
sponsored by EMC & Arrow
WHITE PAPER: This White Paper gives an overview of what's causing chagnes within today's IT organizations and datacenters and discusses how backup and recovery can enable broader IT infrastructure and business transformation. It also shows how EMC is helping firms accelerate the transformation of legacy backup processes.
Posted: 17 Feb 2014 | Published: 31 Dec 2012

EMC & Arrow

2014 Magic Quadrant for User Authentication
sponsored by SafeNet Asia Ltd
ANALYST REPORT: View this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

SafeNet Asia Ltd
26 - 50 of 492 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement