IT Agents  >   Professional Organizations  >   Information Industry Professional Organizations  >  

Web Communities

RSS Feed    Add to Google    Add to My Yahoo!
Web Communities Reports
 
How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures?
sponsored by CA Technologies.
WHITE PAPER: Read this solution brief to learn how to improve control over systems, applications and information to reduce risk in both physical and virtual server environments.
Posted: 25 Nov 2010 | Published: 01 Sep 2010

CA Technologies.

Accelerate Business Through a Cost-efficient Virtual Workforce: Citrix Transforms IT into an On-Demand Service for Virtual Workers
sponsored by Citrix
WHITE PAPER: This white paper defines a virtual workforce, describes the challenges and requirements that organisations face when supporting a virtual workforce, and explains how Citrix solutions can address these requirements and scale accordingly to foster and support future growth.
Posted: 18 Sep 2009 | Published: 25 May 2009

Citrix

The Best of Both Worlds: The Hybrid Cloud
sponsored by CA Technologies.
WHITE PAPER: To handle the demands of modern business, CIOs must manage their internal data centers more effectively and learn how to leverage public cloud resources. The solution: a hybrid cloud strategy facilitated by a dynamic data center. Read on to learn more.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

CA Technologies.

Five Tips for Better Virtual Meetings
sponsored by Citrix Online Go To Meeting
WHITE PAPER: Virtual meetings are all the rage these days. More workers are mobile, the marketplace is global and technology seamlessly links people and places like never before. In this white paper, we will go over five proven strategies that is sure to help you deliver productive virtual meetings.
Posted: 01 Oct 2011 | Published: 30 Sep 2011

Citrix Online Go To Meeting

Securing Virtual Environments
sponsored by CA Technologies.
PODCAST: Listen to this podcast for insight as well as an understanding of what security solutions are available now to help you address the issues.
Posted: 06 Oct 2010 | Premiered: Oct 6, 2010

CA Technologies.

The CISO's Guide to Virtualization Security
sponsored by Rapid7
WHITE PAPER: Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority.
Posted: 18 Jul 2012 | Published: 12 Jan 2012

Rapid7

E-Guide: Run Antivirus Scans in Virtual Environments Without Compromising System Performance
sponsored by CA Technologies.
EGUIDE: This expert e-guide from SearchServerVirtualization.com explains considerations to keep in mind when planning antivirus scans in your virtual environment.
Posted: 15 Oct 2010 | Published: 15 Oct 2010

CA Technologies.

Content-Aware Identity & Access Management in a Virtual Environment
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how CA Technologies Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Posted: 01 Oct 2010 | Published: 01 Jun 2010

CA Technologies

Oxilion Deploys Red Hat Enterprise Virtualization to Keep Customers Satisfied
sponsored by Red Hat.
WHITE PAPER: Access this white paper to discover a new virtualization platform with cloud capabilities that delivers flexibility, scalability and cost requirements to virtual data centers.
Posted: 16 May 2011 | Published: 16 May 2011

Red Hat.

The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement