IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
26 - 50 of 514 Matches Previous Page  |  Next Page
Unleashing the Freedom to Create in VFX
sponsored by NVIDIA/VMware
CASE STUDY: Access this case study to learn how Jellyfish pictures implemented a desktop-as-a-service for graphics processing units (DaaS-GPU) platform. Find out the benefits of this platform and how it gives employees the ability to work from any device and any location. Also, learn how it compares to a physical workstation.
Posted: 02 Jun 2015 | Published: 31 Dec 2014


A guide to storage and virtualisation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Virtualisation brings benefits to the datacentre, but it also brings big changes to storage provisioning and management. We look at the key challenges and how to deal with them.
Posted: 28 May 2015 | Published: 28 May 2015

ComputerWeekly.com

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

Introducing a high-performing, flexible desktop virtualization software
sponsored by Dell, Inc.
DATA SHEET: This informative data sheet highlights a desktop virtualization software solution that combines multiple desktop virtualization technologies in one easy-to-use, integrated system for rapid, secure administration. Find out the benefits to this technology and how its meeting the requirements for greater levels of flexibility and control.
Posted: 23 Mar 2015 | Published: 03 Dec 2014

Dell, Inc.

Mobile Network Operator Enables Secure Access for Consultants
sponsored by Dell, Inc.
CASE STUDY: Inside this brief case study, find out how a mobile network operator adopted a solution that manages, secures, and provisions virtual desktop environments and also broker's connections. Discover how this enabled employees to use their own laptops without exposing the company to risks like viruses and the copying of proprietary information.
Posted: 23 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

A Software Defined Data Center Approach for a "Zero Trust" Security Strategy
sponsored by VMware
WHITE PAPER: Access this white paper to learn about the security capabilities made possible by an SDDC approach and the VMware NSX network virtualization platform. You'll discover how the software defined data center can optimize security capabilities how the NSX platform delivers three levels of security in data centers.
Posted: 18 Mar 2015 | Published: 31 Dec 2014

VMware

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

Embracing bring your own device (BYOD)
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to examine the three major categories of BYOD – laptops, tablets, and smartphones. Explore the benefits and risks associated with each of these categories and discover recommendations on how to successfully implement an approach in order to embrace BYOD in a way that makes sense for your organization.
Posted: 17 Mar 2015 | Published: 31 Dec 2014

Dell, Inc.

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

What if your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell, Inc. and Intel®
VIDEO: In this video, Brian Madden faces what happens if application virtualization solutions doesn't support location-based security.
Posted: 19 Jan 2015 | Premiered: 19 Jan 2015

Dell, Inc. and Intel®

Six Areas Where Citrix XenApp Outperforms VMware Horizon Apps
sponsored by Citrix
WHITE PAPER: In this white paper, explore an application virtualization strategy that includes the capabilities organizations need for full mobile productivity and how any strategy you choose should take into consideration the end-user and IT.
Posted: 02 Jan 2015 | Published: 28 Nov 2014

Citrix

Accelerate Graphics in Virtual Environments
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper examines the top challenges associated with demanding graphics software and explains why virtualized graphics may be the answer organizations need when it comes to overcoming these challenges.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Dell, Inc. and Intel®

Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Storage Redefined
sponsored by SearchServerVirtualization
EBOOK: Software-defined storage joins the virtualization discussion, and it could play a key role in future-proofing an infrastructure.
Posted: 06 May 2015 | Published: 06 May 2015

SearchServerVirtualization

Computer Weekly – 14 April 2015: Taking stock of e-commerce systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

ComputerWeekly.com

MicroScope E-Zine February 2015
sponsored by Kaseya
EZINE: An issue highlighting the need for investment in the next generation of skilled staff.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

Kaseya

Secure VDI Desktops the Same Way you Would Physical Ones
sponsored by Dell
EGUIDE: Download this expert resource now to learn about protecting your virtual desktops and much more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Dell

CW Europe – December 2014 Edition
sponsored by ComputerWeekly.com
EZINE: The Computer Weekly European User Awards crowned 19 winners and three honourable mentions for 2014. This issue of CW Europe showcases all of our awards winners, revealing why they won and what the judges' said when they made their selections.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

ComputerWeekly.com

Case Study: GHY International
sponsored by IBM
CASE STUDY: Read this case study to examine how a leading company leverages Linux-systems and virtualization to offer its variety of services to end users.
Posted: 23 Oct 2014 | Published: 30 Apr 2013

IBM

How to Bring Shadow IT into the Light - 8 Steps Along the Path
sponsored by Rackspace
WHITE PAPER: This white paper describes eight steps to help CIOs and other IT leaders to bring these potential risks to light. The key is to gain benefits from the cloud without risking your company's data.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Rackspace

Transforming the financial industry with virtualized desktops
sponsored by HGST
CASE STUDY: This case study outlines how the recent growth in the premium financial industry and workforce caused a leading company to transition to a virtual desktop infrastructure and how a leading product helped with their challenges.
Posted: 10 Oct 2014 | Published: 30 Sep 2014

HGST

What network virtualization technology can do for your network
sponsored by Extreme Networks
EGUIDE: This expert E-Guide discusses why a hybride approach may be the best way to begin.  Additionally, find out where data center network fabric and SDN intersect.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks

Presentation Transcript: Modernizing Corporate Desktops for the Mobile Cloud Era
sponsored by VMware, Inc.
TRANSCRIPT: This transcript looks at how VMware and Google provide a solution for customers that are looking to move to a modern device and use cloud-hosted desktops.
Posted: 09 Oct 2014 | Published: 31 Jul 2014

VMware, Inc.
26 - 50 of 514 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement