IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
26 - 50 of 532 Matches Previous Page  |  Next Page
Inside the Linux Container Ecosystem: Building the Container Infrastructure
sponsored by Juniper Networks, Inc.
RESOURCE: This report examines Linux container technology, how it evolved, and how it compares to other open platforms that build and run distributed apps. Access the results of the 2016 Container Survey to find out where and how containers are being deployed, who the top vendors are, how to address NFV with containers, and more.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Juniper Networks, Inc.

5 Ways Virtualization Lowers Costs and Boosts Security for Healthcare
sponsored by Citrix
WHITE PAPER: Mandated IT-enabled technology, such as EHR and medical imaging, directly contributes to better patient care and reduced medical errors – but also poses a challenge for IT. Discover 5 use cases that show how virtualization can make life easier for your IT teams, improve security and result in significant cost savings to your organization.
Posted: 16 Aug 2016 | Published: 01 Jul 2016

Citrix

Microsegmentation Strategies for Smarter Security
sponsored by VMware
EGUIDE: In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Multi-User GPU: Make IT More Dependable and Easier to Manage
sponsored by AMD
VIDEO: Discover a multi-user GPU that delivers workstation-class graphics from the data center, providing the freedom to run any application on virtually any device, anywhere on the network. Watch now to learn more about the world's first hardware virtualized GPU that provides superior performance, enhanced security, and scalability.
Posted: 19 Jul 2016 | Premiered: 19 Jul 2016

AMD

CW Middle East July to Sept 2016:
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Middle East we look at how CIOs in the region are formulating their virtualisation strategies as organisations warm to the benefits of cloud computing.
Posted: 13 Jul 2016 | Published: 18 Jul 2016

ComputerWeekly.com

Virtual Workspace:Finding the Right Workspace Aggregator
sponsored by Matrix42
WHITE PAPER: This feature white paper expands on some of the questions you may still have about finding the right workspace aggregator. It addresses some of the questions you may have about choosing the right workspace aggregator.
Posted: 12 Jul 2016 | Published: 12 Jul 2015

Matrix42

Lightning-Fast Virtual System Recovery
sponsored by arcserve
WEBCAST: Discover a unified data protection solution with instant, efficient virtual machine recovery and migration capabilities and watch a demonstration on how this solution works. Explore how this virtual system backup can provide your enterprise with improvements in RPO, RTO, database performance, and more.
Posted: 12 Jul 2016 | Premiered: May 20, 2016

arcserve

A Guide to Red Hat Enterprise Linux and Virtualization Platforms
sponsored by Red Hat
DATA SHEET: In this white paper, learn about the benefits of a virtualization platform that leverages Red Hat Enterprise Linux features. In addition to saving time and money, this option also offers scalability, extended hardware support, enhanced security, and more.
Posted: 12 Jul 2016 | Published: 31 Dec 2015

Red Hat

Solve Real-World Challenges With App Virtualization and VDI
sponsored by Citrix
RESOURCE: This infographic reveals how app virtualization and VDI can solve real-world challenges in today's mobile enterprises. Uncover the top 4 use cases for app and desktop virtualization.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Citrix

Secure App and Data Delivery – Across Devices, Networks, and Locations
sponsored by Citrix
WHITE PAPER: Discover a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but also reduces the tools needed to protect them.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Citrix

Veeam withCisco UCS C240Configuration Guide
sponsored by Veeam Software
ESSENTIAL GUIDE: Discover a backup and replication solution that can increase the value of your backup and reinvent data protection in your virtual environments. This technology can enable your enterprise to benefit from features such as source-side deduplication and compression, parallel processing, 24/7 application availability, and more.
Posted: 31 May 2016 | Published: 31 May 2016

Veeam Software

Case Study: VMware empowers King Abdulaziz City for Science and Technology to Provide Reliable Cloud
sponsored by VMware
CASE STUDY: By providing internet and IT services to academic institutions, governments are faced with the challenge of meeting customer demands. Many use cloud services but finding one that has rich user features but remain easy to manage is tough. Read on to learn about an organization that was able to overcome these challenges and stay ahead of competitors.
Posted: 31 May 2016 | Published: 31 May 2016

VMware

Ten essential network virtualization definitions
sponsored by VMware
EGUIDE: There is some confusion surrounding network virtualization as there is no one definition. In this exclusive guide, you'll find ten definitions to help you better understand the basics and build the best software-defined network possible.
Posted: 24 May 2016 | Published: 17 May 2016

VMware

Case Study: University of LaVerne Implements Data Protection Solution for Virtualized Environment
sponsored by Iron Mountain
CASE STUDY: In this case study, see how one organization implemented a cloud data replication service to help modernize their off-site data protection. Read on to witness how they were able to enhance program control with an automated easy-to-use system, lower storage costs with deduplication and compression, and more.
Posted: 05 May 2016 | Published: 31 Dec 2015

Iron Mountain

Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: What steps should you take to best protect your virtualized cloud data? Find out inside.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Your Network Virtualization Career Path
sponsored by VMware
WHITE PAPER: Virtualization, automation, and the cloud are all transforming the way networking professionals do their jobs. In this resource, discover why virtual network infrastructures are replacing their traditional counterparts, and prepare your skill set to match this shift.
Posted: 14 Apr 2016 | Published: 14 Apr 2016

VMware

Secure By Design
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 02 Mar 2016 | Published: 31 Dec 2015

Citrix

Cloud Access Security Brokers Fill Critical Enterprise Void
sponsored by Palerra Inc.
EGUIDE: In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.
Posted: 11 Aug 2016 | Published: 08 Aug 2016

Palerra Inc.

Evaluating Recovery-in-Place Strategies for Data Protection
sponsored by Veritas
EGUIDE: Inside this exclusive data protection guide, explore a detailed breakdown of recovery-in-place technology, its top use cases and three key considerations to keep in mind when evaluating data protection techniques.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

Nemertes Research: Re-Architecting the Enterprise Network For WLAN, Cloud, Mobility, Bandwidth, and Cybercrimes
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Software-Defined Security for the Software-Defined Infrastructure
sponsored by Intel Security
VIDEO: Learn how a software-defined security approach can help you to improve the security for software-defined infrastructures (SDI) and simplify security management when you're ready for virtualization. Watch now to find out how this approach works and how you can provision security when and where it's needed.
Posted: 06 May 2016 | Premiered: 12 Feb 2016

Intel Security

Three ways AirWatch secures mobile Office365 applications
sponsored by VMware
EGUIDE: This e-guide shows how you can better manage business applications on BYOD and corporate-owned mobile devices. Learn how to encrypt important organizational information and lock down apps across all personal, mobile devices.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

VMware

What to Know: Licensing in a Virtualized World
sponsored by SearchServerVirtualization
EBOOK: With more businesses shifting to a virtualized environment, understanding VM licensing, Oracle virtualization licensing and VMware licensing cost is a must for admins.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

SearchServerVirtualization

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

Maximize Performance and Availability at the Lowest TCO for Your Virtual Environment
sponsored by Quantum Corporation
WHITE PAPER: This brief white paper highlights a storage solution that can efficiently protect data in virtual environments with high-performance deduplication and hybrid flash storage. Read on to see how this solution can enable your enterprise to maximize performance and availability and lower your TCO in your virtual environment.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Quantum Corporation
26 - 50 of 532 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement