IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed    Add to Google    Add to My Yahoo!
Virtualization Security Reports
51 - 75 of 538 Matches Previous Page  |  Next Page
Transforming Traditional Data Centers for More Successful App Rollouts
sponsored by F5 Networks
WHITE PAPER: Discover integrated strategies that transform the existing data center infrastructure to operationalize your network while maintaining high availability and predictable performance for existing applications.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

F5 Networks

Best Practices for Virtualizing Servers
sponsored by Lenovo and Intel
EGUIDE: In the following e-guide, learn from the experts at SearchServerVirtualization.com as they examine some of the top virtualization considerations including, how blades compare to rack servers, when the appropriate time to upgrade your aging server is, as well as how to optimize your server resource use.
Posted: 24 Sep 2015 | Published: 24 Sep 2015

Lenovo and Intel

Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.
Posted: 16 Sep 2015 | Published: 03 Dec 2013

Citrix

Top Use Cases for App Virtualization
sponsored by Citrix
WEBCAST: Empower a mobile workforce with secure access to apps and data from a diverse set of mobile devices. Attend this webinar to learn about the top app virtualization use cases, complete with real-world customer examples.
Posted: 20 Aug 2015 | Premiered: Aug 20, 2015

Citrix

Maximizing Your Video Utilization: The Best Practices
sponsored by Vyopta
EBOOK: Access now to learn the best practices for maximizing enterprise video utilization and adoption within your enterprise.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Vyopta

IPv6 Leakage and DNS Hijacking in Commercial VPN clients
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

ComputerWeekly.com

A guide to storage and virtualisation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Virtualisation brings benefits to the datacentre, but it also brings big changes to storage provisioning and management. We look at the key challenges and how to deal with them.
Posted: 28 May 2015 | Published: 28 May 2015

ComputerWeekly.com

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
WHITE PAPER: This white paper explores how to enable comprehensive data center security through network virtualization. Access now to learn how to overcome the three major issues with traditional network security and how to defend your data center from within.
Posted: 21 Apr 2015 | Published: 04 Mar 2015

VMware

Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Dell, Inc. and Intel®

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

Dell, Inc. and Intel®

What if your App Virtualization Solution Didn't Have Two-Factor Authentication?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to see Brian Madden explore some crazy authentication strategies available in order to authenticate users with more than just a password. Discover the importance of selecting an application virtualization solution that has all the features your organization needs.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

What if your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell, Inc. and Intel®
VIDEO: In this video, Brian Madden faces what happens if application virtualization solutions doesn't support location-based security.
Posted: 19 Jan 2015 | Premiered: 19 Jan 2015

Dell, Inc. and Intel®

Accelerate Graphics in Virtual Environments
sponsored by Dell
WHITE PAPER: Find out how graphics technology from Citrix, Dell and NVIDIA can help you deliver rich graphics capabilities.
Posted: 17 Nov 2014 | Published: 10 Nov 2014

Dell

Accelerate Graphics in Virtual Environments
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper examines the top challenges associated with demanding graphics software and explains why virtualized graphics may be the answer organizations need when it comes to overcoming these challenges.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Dell, Inc. and Intel®

Five Ways Network Virtualization Will Revolutionize IT
sponsored by Global Knowledge
WHITE PAPER: Discover how Network Functions Virtualization (NFV) will revolutionize IT and change the way you think about network connectivity, and perhaps even application development.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Global Knowledge

Ten Areas Where Citrix XenApp Outperforms Vmware Horizon
sponsored by Citrix
WHITE PAPER: VMware Horizon has left out some of the "no-brainer" features that Citrix XenApp users and admins have been using for years. Understanding the differences between these products is critical to selecting the right solution that satisfies user and IT requirements in your organization. Compare solutions now.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Citrix

Computer Weekly – 20 October 2015: IT Giants Dell and EMC Unite
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

ComputerWeekly.com

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

Commvault

Storage Redefined
sponsored by SearchServerVirtualization
EBOOK: Software-defined storage joins the virtualization discussion, and it could play a key role in future-proofing an infrastructure.
Posted: 06 May 2015 | Published: 06 May 2015

SearchServerVirtualization

Computer Weekly – 14 April 2015: Taking stock of e-commerce systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

ComputerWeekly.com

5 Steps to Building a Private Cloud Environment in Your Enterprise
sponsored by Dell and Microsoft
EGUIDE: Building a private cloud isn't a quick process. In this expert e-guide, discover the first 5 steps you need to take to conceive, build, and maintain a private cloud within your enterprise. Read now to get started, and access these key first steps for your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Dell and Microsoft

MicroScope E-Zine February 2015
sponsored by Kaseya
EZINE: An issue highlighting the need for investment in the next generation of skilled staff.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

Kaseya

Secure VDI Desktops the Same Way you Would Physical Ones
sponsored by Dell
EGUIDE: Download this expert resource now to learn about protecting your virtual desktops and much more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Dell

CW Europe – December 2014 Edition
sponsored by ComputerWeekly.com
EZINE: The Computer Weekly European User Awards crowned 19 winners and three honourable mentions for 2014. This issue of CW Europe showcases all of our awards winners, revealing why they won and what the judges' said when they made their selections.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

ComputerWeekly.com

Case Study: GHY International
sponsored by IBM
CASE STUDY: Read this case study to examine how a leading company leverages Linux-systems and virtualization to offer its variety of services to end users.
Posted: 23 Oct 2014 | Published: 30 Apr 2013

IBM
51 - 75 of 538 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement