IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
26 - 50 of 539 Matches Previous Page  |  Next Page
Future of IT Infrastructure
sponsored by Verizon
WHITE PAPER: Digital is changing the way that most aspects of business are being handled. Instead of worrying about protocols and lead times, your IT function should be focusing on creating the right business rules. Learn more about the latest intelligent networking solutions offering greater visibility and control.
Posted: 06 May 2016 | Published: 27 Apr 2016

Verizon

Case Study: University of LaVerne Implements Data Protection Solution for Virtualized Environment
sponsored by Iron Mountain
CASE STUDY: In this case study, see how one organization implemented a cloud data replication service to help modernize their off-site data protection. Read on to witness how they were able to enhance program control with an automated easy-to-use system, lower storage costs with deduplication and compression, and more.
Posted: 05 May 2016 | Published: 31 Dec 2015

Iron Mountain

How to Get the Most from your Virtualization Investments!
sponsored by TechTarget
RESOURCE: Access this exclusive guide, Delivering on Virtualization's Promise, to explore everything you need to know about effective server virtualization management, including VM provisioning, application availability, and performance monitoring. Simply participate in our brief Server Hardware Research Program to claim your free copy of this report.
Posted: 29 Apr 2016 | Published: 29 Apr 2016

TechTarget

How a Good VDI Pilot Gets Successful Deployments off the Ground
sponsored by Dell, Inc., Intel and VMware
EGUIDE: Countless VDI projects circle the drain because administrators don't test virtual desktop performance thoroughly. Access this e-guide to learn why implementing a VDI pilot program is the most critical step in the transition from physical to virtual desktops. Read on to prepare your organization for a successful, full-scale VDI deployment.
Posted: 29 Apr 2016 | Published: 27 Apr 2016

Dell, Inc., Intel and VMware

The Ultimate Guide for Virtual Server Protection
sponsored by Commvault
WHITE PAPER: Are you staying ahead of the tidal wave of consolidation? Read on to discover 4 questions you should be asking about your virtual server data protection. Also, learn how to optimize your storage, cloud or otherwise, to accommodate your rapidly scaled-out virtual infrastructure.
Posted: 28 Apr 2016 | Published: 31 Dec 2015

Commvault

Comprehensive data protection for physical, virtual and cloud infrastructures
sponsored by IBM
WHITE PAPER: What steps should you take to best protect your virtualized cloud data? Find out inside.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

IBM

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Privileged access, accounts and credentials are critical assets for enterprises that must be highly protected through a defense-in-depth strategy. Discover ways to combine technology and processes so you can prevent data breaches, address regulatory requirements, and more.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

It’s Time to Virtualize All Your Business-Critical Applications
sponsored by VMware, Inc.
WHITE PAPER: In this exclusive resource, uncover the top five most common questions about virtualizing business critical applications, and see for yourself the compelling arguments you can use to help gain support for a total virtualization initiative.
Posted: 21 Mar 2016 | Published: 21 Mar 2016

VMware, Inc.

Experts Weigh in on Network Segmentation Best Practices
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Experts weigh in on the improved security and simplified administration microsegmentation promises in this e-guide. It appears to be the next logical step to securing your data, but will it deliver once the hype dies down?
Posted: 14 Mar 2016 | Published: 29 Feb 2016

NTT Com Security (UK) Ltd

Secure By Design
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 02 Mar 2016 | Published: 31 Dec 2015

Citrix

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: In this webcast, data protection analyst Jason Buffington from ESG provides guidance on how virtualization protection and recovery are evolving to provide the high availability today's business units demand.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell, Inc. and Intel®
EGUIDE: This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Inc. and Intel®

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper shows you the security advantages that micro-segmentation can offer your business. Learn the distinct advantages micro-segmentation delivered by virtualization has over physical data center networks.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

VDI—Simplify Your Migration to Windows 10 and Embrace Desktop Apps
sponsored by Citrix
WHITE PAPER: In this white paper, you will discover how to streamline your migration to Windows 10 with a virtualized infrastructure that simplifies BYOD, app compatibility, and corporate desktop management. Access this paper now to answer your burning questions about this OS and how it pertains to desktop virtualization.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

Citrix

Presentation Transcript: Virtualization for Healthcare - 3 Common Myths Debunked
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this presentation transcript to learn three myths surrounding virtualization and how end-to-end desktop virtualization strategies are helping to alleviate these common myths. Also, two customers share best practices and lessons learned for how they tackled these common myths.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

Dell, Inc. and Intel®

Virtualization for Healthcare: 3 Common Myths Debunked
sponsored by Dell, Inc. and Intel®
WEBCAST: Watch this webcast to explore trends and challenges for today's healthcare providers. You'll learn three myths surrounding virtualization and how end-to-end desktop virtualization strategies are helping to alleviate these common myths. Also, two customers share best practices and lessons learned of how they tackled these common myths.
Posted: 11 Dec 2015 | Premiered: Dec 4, 2015

Dell, Inc. and Intel®

3 Signs Your Virtualization Strategy is Stuck in Neutral
sponsored by Commvault
WHITE PAPER: In this white paper, you will highlight three major indicators that your virtualization may be stuck in the mud. Read on now to improve your business operations and holistic data protection, as well as to identify the biggest inhibitors to successful storage virtualization.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Commvault

Software-Defined Security for the Software-Defined Infrastructure
sponsored by Intel Security
VIDEO: Learn how a software-defined security approach can help you to improve the security for software-defined infrastructures (SDI) and simplify security management when you're ready for virtualization. Watch now to find out how this approach works and how you can provision security when and where it's needed.
Posted: 06 May 2016 | Premiered: 12 Feb 2016

Intel Security

Three ways AirWatch secures mobile Office365 applications
sponsored by VMware
EGUIDE: This e-guide shows how you can better manage business applications on BYOD and corporate-owned mobile devices. Learn how to encrypt important organizational information and lock down apps across all personal, mobile devices.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

VMware

What to Know: Licensing in a Virtualized World
sponsored by SearchServerVirtualization
EBOOK: With more businesses shifting to a virtualized environment, understanding VM licensing, Oracle virtualization licensing and VMware licensing cost is a must for admins.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

SearchServerVirtualization

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

Maximize Performance and Availability at the Lowest TCO for Your Virtual Environment
sponsored by Quantum Corporation
WHITE PAPER: This brief white paper highlights a storage solution that can efficiently protect data in virtual environments with high-performance deduplication and hybrid flash storage. Read on to see how this solution can enable your enterprise to maximize performance and availability and lower your TCO in your virtual environment.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Quantum Corporation

Case Study: Santa Barbara City College Reduces VM Backup and Restore Times
sponsored by Quantum Corporation
CASE STUDY: In this case study, learn how Santa Barbara City College resolved its struggle with backing up and restoring files from VM environments. See how data protection software and deduplication appliances can provide your enterprise with automated protection that will help to reduce your backup and restore times.
Posted: 15 Feb 2016 | Published: 31 Dec 2014

Quantum Corporation

ComputerWeekly: Why a Private Cloud Was Chosen for the Thames Tunnel Project
sponsored by ComputerWeekly.com
EZINE: In this issue of ComputerWeekly, we examine why one of the UK's largest construction projects—the Thames Tideway Tunnel—decided to use a private cloud setup. Our latest buyer's guide looks at containers and microservices, and we report on what U.S. court documents tell us about Oracle's controversial licensing polices.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

ComputerWeekly.com

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone
26 - 50 of 539 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement