IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
26 - 50 of 552 Matches Previous Page  |  Next Page
SDN-Based Open Networking Building Momentum Among IT Decision Makers
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Two of the most important technologies today are open networking and SDN. For the past few years, both have gained acceptance in data centers due to their promise of improved IT agility, flexibility and manageability.
Posted: 17 Sep 2015 | Published: 02 Sep 2014

Dell, Inc. and Intel®

Wan Virtualization: Scaling Bandwidth and Increasing Application Reliability
sponsored by Citrix
WHITE PAPER: This white paper provides an overview of a cloud-based, WAN virtualization solution that will improve the performance and reliability of business critical applications such as VDI, application virtualization, VoIP, video conferencing, ERP and CRM. Read on now to increase effective network capacity.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.
Posted: 16 Sep 2015 | Published: 03 Dec 2013


Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014


Anywhere Access to SAP Applications with Citrix XenApp
sponsored by Citrix
WHITE PAPER: Access this brief white paper to learn how you can give your workforce universal access to SAP applications while centralizing management for increased security and reduced costs.
Posted: 09 Sep 2015 | Published: 09 Sep 2015


What If Your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell, Inc.
VIDEO: In this video, Brian Madden discovers what happens if application virtualization solutions don't support location-based security.
Posted: 09 Sep 2015 | Premiered: 19 Jan 2015

Dell, Inc.

What If Your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc.
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 04 Sep 2015 | Premiered: 20 Jan 2015

Dell, Inc.

What’s the Best Security Option for Your Hyper-V Virtual Switch?
sponsored by NEC
EGUIDE: In this expert eGuide, you'll learn about the security options for Microsoft's Hyper-V VM and discover which suits your security needs best. View now to learn how to choose the most appropriate method for your organization.
Posted: 03 Sep 2015 | Published: 31 Aug 2015


VMware NSX Security and Micro Segmentation Overview Video
sponsored by VMware
VIDEO: Watch this brief video to learn about a network virtualization platform that provides the network and security foundation for the SDDC. You'll find out how this platform works and how it's providing the key functions of micro-segmentation.
Posted: 02 Sep 2015 | Premiered: 11 Sep 2014


The impact of virtualization security on your VDI environment
sponsored by BitDefender
WHITE PAPER: This paper outlines how the impact of endpoint security on virtualized environments is directly related to the achievable consolidation ratios (the number of virtual machines that can be run on each physical host).
Posted: 02 Sep 2015 | Published: 29 May 2015


How Do Enterprise Data Protection Platform Vendors Stack Up?
sponsored by IBM
WEBCAST: In this webcast, Vinny Choinski, Senior Lab Analyst at Enterprise Strategy Group, examines a software solution designed to protect VMware environments by transferring block-level incremental data from snapshots between virtual environments and the TSM server.
Posted: 01 Sep 2015 | Premiered: Sep 8, 2014


An Intro to Mobile Virtualization Services
sponsored by IBM
WHITE PAPER: As companies face multiple security- and cost-related challenges by supporting the always-on employee, mobile virtualization strategies are evolving. Access this white paper and learn how a comprehensive approach allows you to support remote and branch workers in a secure environment.
Posted: 01 Sep 2015 | Published: 31 Oct 2014


Big Data Needs Big Storage: Deciding on an Optimal Storage Platform
sponsored by IBM
WHITE PAPER: This white paper outlines 4 important requirements to consider when deciding on the right storage platform for your Big Data needs. Read on to learn the benefits you can attain by implementing the right storage platform for your enterprise.
Posted: 01 Sep 2015 | Published: 31 Mar 2015


The One-Stop Shop for All Your Virtualization Needs
sponsored by VMware, Inc.
WHITE PAPER: In the following white paper, learn about a one-stop shop that can help overcome virtually all of your virtualization needs easily and effectively. Access now and learn how to begin reaping the full value from your virtualization strategies once again.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

VMware, Inc.

Case Study - ABN Amro: From VMware Sphere to the Software-Defined Data Center
sponsored by VMware
VIDEO: This video details how one global IT company started its virtualization journey with consolidation and disaster recovery, and are now able to deploy many machines with network virtualization.
Posted: 27 Aug 2015 | Premiered: 30 Nov 2013


Mobile Data Security: Finding the Balance
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 13 Aug 2015 | Published: 07 Aug 2014


Mobilize Your Virtual Enterprise Applications with 4 Steps
sponsored by StarMobile
WHITE PAPER: It's time to capitalize on next-generation remote computing protocols. Access this resource to compare newer app mobilization protocols with traditional ones, and get details on design techniques that better suit mobile environments.
Posted: 07 Aug 2015 | Published: 07 Aug 2015


IPv6 Leakage and DNS Hijacking in Commercial VPN clients
sponsored by
ESSENTIAL GUIDE: Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

How To Solve The Compliance Challenge In The Cloud
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to find out how to solve the compliance challenge in cloud and virtual infrastructure environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015


Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 06 Jul 2015 | Published: 07 Aug 2014


Software-Defined Security and the Agile Data Center
sponsored by CloudPassage
WEBCAST: On this webinar, you'll hear from Neil MacDonald, VP Distinguished Analyst from Gartner Research, and CloudPassage's Co-founder and Chief Strategy Officer, Carson Sweet. They'll share insights into the changes required for security and compliance in the new, more agile data center.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015


Ensuring Security in Virtualized Environments
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how to reap the maximum security benefits for VMware Network Extensible (NetX)/NSX environments.
Posted: 11 Jun 2015 | Published: 03 Jun 2015

Fortinet, Inc.

A guide to storage and virtualisation
sponsored by
ESSENTIAL GUIDE: Virtualisation brings benefits to the datacentre, but it also brings big changes to storage provisioning and management. We look at the key challenges and how to deal with them.
Posted: 28 May 2015 | Published: 28 May 2015

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

26 - 50 of 552 Matches Previous Page    1 2 3 4 5    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement