IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
26 - 50 of 545 Matches Previous Page  |  Next Page
It’s Time to Virtualize All Your Business-Critical Applications
sponsored by VMware, Inc.
WHITE PAPER: In this exclusive resource, uncover the top five most common questions about virtualizing business critical applications, and see for yourself the compelling arguments you can use to help gain support for a total virtualization initiative.
Posted: 21 Mar 2016 | Published: 21 Mar 2016

VMware, Inc.

Desktops as a Service: Everything You Need to Know About DaaS & Hosted VDI Chapter 3: How to Succeed with VDI
sponsored by Dell, Inc.
EBOOK: This exclusive chapter from Brian Madden's expert DaaS e-book addresses these two rules by exploring five use cases of VDI and detailing how to succeed with VDI in your environment by keeping three key factors in mind.
Posted: 21 Mar 2016 | Published: 26 Nov 2014

Dell, Inc.

Desktops as a Service: Everything You Need to Know About DaaS & Hosted VDI Chapter 13: Security
sponsored by Dell, Inc.
EBOOK: This hand-picked chapter from Brian Madden's e-book, Desktops as a Service: Everything You Need to Know About DaaS & Hosted VDI discusses the necessary steps to take when planning for VDI security. Read on and explore how VDI deployment options affect security as well as different options available for securing your desktop.
Posted: 21 Mar 2016 | Published: 26 Nov 2014

Dell, Inc.

Experts Weigh in on Network Segmentation Best Practices
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Experts weigh in on the improved security and simplified administration microsegmentation promises in this e-guide. It appears to be the next logical step to securing your data, but will it deliver once the hype dies down?
Posted: 14 Mar 2016 | Published: 29 Feb 2016

NTT Com Security (UK) Ltd

A Solutions Guide to Hyperconverged Infrastructure for Enterprise Applications
sponsored by Softchoice Corporation
WHITE PAPER: From this white paper, you will learn why hyperconverged infrastructure is the perfect web-scale infrastructure for enterprise applications, and see how this combo is revolutionizing today's enterprise data centers. Read on to discover how this HCI delivers compromise-free performance.
Posted: 10 Mar 2016 | Published: 31 May 2015

Softchoice Corporation

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Federal Agencies Meet the Challenges of Virtualization with Hyper-Convergence
sponsored by EMC Converged Platforms.
PRODUCT OVERVIEW: In this white paper, learn how to virtualize your federal organization's IT with a hyper-converged infrastructure (HCI) appliance that also reduces operational burden with automated deployment. Read on to overcome common IT infrastructure woes with HCI.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

EMC Converged Platforms.

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: In this webcast, data protection analyst Jason Buffington from ESG provides guidance on how virtualization protection and recovery are evolving to provide the high availability today's business units demand.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell, Inc. & Intel®
EGUIDE: This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. & Intel®

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper shows you the security advantages that micro-segmentation can offer your business. Learn the distinct advantages micro-segmentation delivered by virtualization has over physical data center networks.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

Case Study: Calypso Drinks Enhances Disaster Recovery Provision
sponsored by Icomm Technologies
CASE STUDY: In this case study, discover how Calypso Drinks mitigated their increasing storage requirements, by investing in a combined iSCSI SAN and virtualization solution. Download this cost-saving study to reduce your power consumption and time spent on administration and support, and unlock untapped IT agility.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

Icomm Technologies

XenApp vs. Horizon: Comparing 10 Features
sponsored by Citrix
WHITE PAPER: In this white paper, you will discover the best-in-class features of one application virtualization platform, and compare its features to market equivalents. Read on to ensure virtualization solutions deliver rich experience for your users and comply with security regulations.
Posted: 02 Feb 2016 | Published: 31 Aug 2015

Citrix

ComputerWeekly: Why a Private Cloud Was Chosen for the Thames Tunnel Project
sponsored by ComputerWeekly.com
EZINE: In this issue of ComputerWeekly, we examine why one of the UK's largest construction projects—the Thames Tideway Tunnel—decided to use a private cloud setup. Our latest buyer's guide looks at containers and microservices, and we report on what U.S. court documents tell us about Oracle's controversial licensing polices.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

ComputerWeekly.com

How the Server Revolution is Transforming Traditional Security & 7 Best Practices to Move Faster
sponsored by CloudPassage
RESOURCE: This blog outlines 7 best practices for securing virtual servers. Read on to learn about how to best protect cloud data and simplify virtual security management.
Posted: 21 Jan 2016 | Published: 25 Sep 2015

CloudPassage

VDI—Simplify Your Migration to Windows 10 and Embrace Desktop Apps
sponsored by Citrix
WHITE PAPER: In this white paper, you will discover how to streamline your migration to Windows 10 with a virtualized infrastructure that simplifies BYOD, app compatibility, and corporate desktop management. Access this paper now to answer your burning questions about this OS and how it pertains to desktop virtualization.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

Citrix

Presentation Transcript: Virtualization for Healthcare - 3 Common Myths Debunked
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this presentation transcript to learn three myths surrounding virtualization and how end-to-end desktop virtualization strategies are helping to alleviate these common myths. Also, two customers share best practices and lessons learned for how they tackled these common myths.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

Dell, Inc. and Intel®

Virtualization for Healthcare: 3 Common Myths Debunked
sponsored by Dell, Inc. and Intel®
WEBCAST: Watch this webcast to explore trends and challenges for today's healthcare providers. You'll learn three myths surrounding virtualization and how end-to-end desktop virtualization strategies are helping to alleviate these common myths. Also, two customers share best practices and lessons learned of how they tackled these common myths.
Posted: 11 Dec 2015 | Premiered: Dec 4, 2015

Dell, Inc. and Intel®

3 Signs Your Virtualization Strategy is Stuck in Neutral
sponsored by Commvault
WHITE PAPER: In this white paper, you will highlight three major indicators that your virtualization may be stuck in the mud. Read on now to improve your business operations and holistic data protection, as well as to identify the biggest inhibitors to successful storage virtualization.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Commvault

Case Study: Richardson International
sponsored by Commvault
CASE STUDY: This case study explores Richardson International's, an agribusiness, decision to implement a software solution that could better manage and protect their virtualized corporate information. Read on to see how this software can increase your ROI by cost-efficiently protecting your data and streamlining administration.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

Commvault

Transforming Traditional Data Centers for More Successful App Rollouts
sponsored by F5 Networks
WHITE PAPER: Discover integrated strategies that transform the existing data center infrastructure to operationalize your network while maintaining high availability and predictable performance for existing applications.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

F5 Networks

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

Maximize Performance and Availability at the Lowest TCO for Your Virtual Environment
sponsored by Quantum Corporation
WHITE PAPER: This brief white paper highlights a storage solution that can efficiently protect data in virtual environments with high-performance deduplication and hybrid flash storage. Read on to see how this solution can enable your enterprise to maximize performance and availability and lower your TCO in your virtual environment.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Quantum Corporation

Case Study: Santa Barbara City College Reduces VM Backup and Restore Times
sponsored by Quantum Corporation
CASE STUDY: In this case study, learn how Santa Barbara City College resolved its struggle with backing up and restoring files from VM environments. See how data protection software and deduplication appliances can provide your enterprise with automated protection that will help to reduce your backup and restore times.
Posted: 15 Feb 2016 | Published: 31 Dec 2014

Quantum Corporation

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone

Ten Areas Where Citrix XenApp Outperforms Vmware Horizon
sponsored by Citrix
WHITE PAPER: VMware Horizon has left out some of the "no-brainer" features that Citrix XenApp users and admins have been using for years. Understanding the differences between these products is critical to selecting the right solution that satisfies user and IT requirements in your organization. Compare solutions now.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Citrix
26 - 50 of 545 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement