IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
26 - 50 of 534 Matches Previous Page  |  Next Page
Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: What steps should you take to best protect your virtualized cloud data? Find out inside.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Privileged access, accounts and credentials are critical assets for enterprises that must be highly protected through a defense-in-depth strategy. Discover ways to combine technology and processes so you can prevent data breaches, address regulatory requirements, and more.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Desktops as a Service: Everything You Need to Know About DaaS & Hosted VDI Chapter 3: How to Succeed with VDI
sponsored by Dell, Inc.
EBOOK: This exclusive chapter from Brian Madden's expert DaaS e-book addresses these two rules by exploring five use cases of VDI and detailing how to succeed with VDI in your environment by keeping three key factors in mind.
Posted: 21 Mar 2016 | Published: 26 Nov 2014

Dell, Inc.

Desktops as a Service: Everything You Need to Know About DaaS & Hosted VDI Chapter 13: Security
sponsored by Dell, Inc.
EBOOK: This hand-picked chapter from Brian Madden's e-book, Desktops as a Service: Everything You Need to Know About DaaS & Hosted VDI discusses the necessary steps to take when planning for VDI security. Read on and explore how VDI deployment options affect security as well as different options available for securing your desktop.
Posted: 21 Mar 2016 | Published: 26 Nov 2014

Dell, Inc.

Experts Weigh in on Network Segmentation Best Practices
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Experts weigh in on the improved security and simplified administration microsegmentation promises in this e-guide. It appears to be the next logical step to securing your data, but will it deliver once the hype dies down?
Posted: 14 Mar 2016 | Published: 29 Feb 2016

NTT Com Security (UK) Ltd

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: In this webcast, data protection analyst Jason Buffington from ESG provides guidance on how virtualization protection and recovery are evolving to provide the high availability today's business units demand.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell, Inc. and Intel®
EGUIDE: This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper shows you the security advantages that micro-segmentation can offer your business. Learn the distinct advantages micro-segmentation delivered by virtualization has over physical data center networks.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

How the Server Revolution is Transforming Traditional Security & 7 Best Practices to Move Faster
sponsored by CloudPassage
RESOURCE: This blog outlines 7 best practices for securing virtual servers. Read on to learn about how to best protect cloud data and simplify virtual security management.
Posted: 21 Jan 2016 | Published: 25 Sep 2015

CloudPassage

Presentation Transcript: Virtualization for Healthcare - 3 Common Myths Debunked
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this presentation transcript to learn three myths surrounding virtualization and how end-to-end desktop virtualization strategies are helping to alleviate these common myths. Also, two customers share best practices and lessons learned for how they tackled these common myths.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

Dell, Inc. and Intel®

Virtualization for Healthcare: 3 Common Myths Debunked
sponsored by Dell, Inc. and Intel®
WEBCAST: Watch this webcast to explore trends and challenges for today's healthcare providers. You'll learn three myths surrounding virtualization and how end-to-end desktop virtualization strategies are helping to alleviate these common myths. Also, two customers share best practices and lessons learned of how they tackled these common myths.
Posted: 11 Dec 2015 | Premiered: Dec 4, 2015

Dell, Inc. and Intel®

3 Signs Your Virtualization Strategy is Stuck in Neutral
sponsored by Commvault
WHITE PAPER: In this white paper, you will highlight three major indicators that your virtualization may be stuck in the mud. Read on now to improve your business operations and holistic data protection, as well as to identify the biggest inhibitors to successful storage virtualization.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Commvault

Case Study: Richardson International
sponsored by Commvault
CASE STUDY: This case study explores Richardson International's, an agribusiness, decision to implement a software solution that could better manage and protect their virtualized corporate information. Read on to see how this software can increase your ROI by cost-efficiently protecting your data and streamlining administration.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

Commvault

Transforming Traditional Data Centers for More Successful App Rollouts
sponsored by F5 Networks
WHITE PAPER: Discover integrated strategies that transform the existing data center infrastructure to operationalize your network while maintaining high availability and predictable performance for existing applications.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

F5 Networks

Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.
Posted: 16 Sep 2015 | Published: 03 Dec 2013

Citrix

Big Data Needs Big Storage: Deciding on an Optimal Storage Platform
sponsored by IBM
WHITE PAPER: This white paper outlines 4 important requirements to consider when deciding on the right storage platform for your Big Data needs. Read on to learn the benefits you can attain by implementing the right storage platform for your enterprise.
Posted: 01 Sep 2015 | Published: 31 Mar 2015

IBM

Three ways AirWatch secures mobile Office365 applications
sponsored by VMware
EGUIDE: This e-guide shows how you can better manage business applications on BYOD and corporate-owned mobile devices. Learn how to encrypt important organizational information and lock down apps across all personal, mobile devices.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

VMware

What to Know: Licensing in a Virtualized World
sponsored by SearchServerVirtualization
EBOOK: With more businesses shifting to a virtualized environment, understanding VM licensing, Oracle virtualization licensing and VMware licensing cost is a must for admins.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

SearchServerVirtualization

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

Maximize Performance and Availability at the Lowest TCO for Your Virtual Environment
sponsored by Quantum Corporation
WHITE PAPER: This brief white paper highlights a storage solution that can efficiently protect data in virtual environments with high-performance deduplication and hybrid flash storage. Read on to see how this solution can enable your enterprise to maximize performance and availability and lower your TCO in your virtual environment.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Quantum Corporation

Case Study: Santa Barbara City College Reduces VM Backup and Restore Times
sponsored by Quantum Corporation
CASE STUDY: In this case study, learn how Santa Barbara City College resolved its struggle with backing up and restoring files from VM environments. See how data protection software and deduplication appliances can provide your enterprise with automated protection that will help to reduce your backup and restore times.
Posted: 15 Feb 2016 | Published: 31 Dec 2014

Quantum Corporation

ComputerWeekly: Why a Private Cloud Was Chosen for the Thames Tunnel Project
sponsored by ComputerWeekly.com
EZINE: In this issue of ComputerWeekly, we examine why one of the UK's largest construction projects—the Thames Tideway Tunnel—decided to use a private cloud setup. Our latest buyer's guide looks at containers and microservices, and we report on what U.S. court documents tell us about Oracle's controversial licensing polices.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

ComputerWeekly.com

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone

Ten Areas Where Citrix XenApp Outperforms Vmware Horizon
sponsored by Citrix
WHITE PAPER: VMware Horizon has left out some of the "no-brainer" features that Citrix XenApp users and admins have been using for years. Understanding the differences between these products is critical to selecting the right solution that satisfies user and IT requirements in your organization. Compare solutions now.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Citrix

Computer Weekly – 20 October 2015: IT Giants Dell and EMC Unite
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

ComputerWeekly.com
26 - 50 of 534 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement