IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed   
Virtualization Security Reports
1 - 25 of 553 Matches Previous Page  |  Next Page
Using CHARON Virtualization to Update Legacy VAX Systems
sponsored by Stromasys
WHITE PAPER: In this case study, find out how a large financial services company kept their mission-critical, legacy apps running by using virtualization -- exactly replicating the functionality of the aging VAX system they built their business around.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Stromasys

IT Security Roadmap 2019; How to survive emerging threats and thrive in complexity
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: In this virtual conference, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com, our experts will examine the shifts in enterprise IT, the future of endpoint security, and how to mitigate IT complexity new technology trends bring. We'll bring together expert insights for achieving a secure and compliant infrastructure.
Posted: 12 Sep 2018 | Premiered: Sep 7, 2018

SearchSecurity.com

How to Manage Third-Party Access
sponsored by Cyxtera
WHITE PAPER: Find out how companies are finding simple ways to mitigate security risks when allowing third-party access to their systems while maintaining low IT costs.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cyxtera

Container Security: A Best Practice Guide
sponsored by Alert Logic
ESSENTIAL GUIDE: In this guide, get a basic understanding of containers, considerations, trade-offs and differences of container types (namely Docker and Kubernetes). Read on to gain security best practices for when your organization moves its applications to containers.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Alert Logic

10 Thing You Need to Know About Data Virtualization
sponsored by TIBCO
WHITE PAPER: If you are considering data virtualization for your business, it's important to get the answers to core questions. In this white paper you will gain essential knowledge about data virtualization, including answers to 10 common questions.
Posted: 29 Aug 2018 | Published: 22 Feb 2018


4 Steps to Transforming Network Security
sponsored by VMware
WHITE PAPER: This white paper explores how to transform network security to face modern cyberthreats. Find out how to intelligently align security with the needs of your business by learning about 4 key components of a digital security strategy.
Posted: 31 Jul 2018 | Published: 31 May 2018

VMware

Microsegmentation Builds Security Into Your Data Center's DNA
sponsored by VMware
WHITE PAPER: This white paper explores how to add a second layer of defense behind perimeter firewalls with microsegmentation. Learn how organizations like those in the education sector can take a new approach to data center security that's designed to halt the spread of malware.
Posted: 30 Jul 2018 | Published: 31 May 2016

VMware

Focus: Campus local area networks (LAN)
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

ComputerWeekly.com

Data Protection for Hyper-V Environments
sponsored by Druva Software
RESOURCE: Reading this paper will introduce you to a cloud platform that unifies the backup and archival capabilities of Hyper-V environments to remove the burden of legacy infrastructure, perform host-level or image-level backups, exact simple recovery of full VMs, and more.
Posted: 25 Jul 2018 | Published: 25 Jul 2018

Druva Software

Software-Based Networking: The Engine for a Dynamic Network
sponsored by SearchNetworking.com
EBOOK: In this expert handbook, learn about the ongoing evolution of software-based networking and SDN, and learn about the impact that software is having on the interoperability, flexibility, and responsiveness of modern networks.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

SearchNetworking.com

Boost productivity with a high-definition user workspace
sponsored by Citrix
WHITE PAPER: Download this white paper to learn how a HDX technology can help your organization successfully extend the delivery of virtual apps and desktops to remote, mobile and branch office users — all while maintaining a high level of security and control over corporate data.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

Citrix

3 Microsegmentation Challenges Facing NetOps and SecOps
sponsored by Plixer
RESOURCE: Learn about 3 key microsegmentation challenges and find out how organizations can further improve their network's defense with cooperation and open communication across their app/virtualization, NetOps, and SecOps teams.
Posted: 01 Jun 2018 | Published: 29 Mar 2018


Virtualisation therapy for your disaster recovery plan
sponsored by IBM
EGUIDE: Computer Weekly takes a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.
Posted: 04 May 2018 | Published: 04 May 2018

IBM

Application Visibility in Virtualized Environment
sponsored by FixStream
WHITE PAPER: Download this white paper to read about a big data artificial intelligence platform that unifies IT operations correlation, visualization and analytics to provide a single pane of glass view into enterprise virtualized environments.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

FixStream

How to Simplify your Network
sponsored by Verizon
RESOURCE: Learn about Verizon's Virtual Network Services that can turn your physical network into an on-demand virtual network to help simplify management and control costs while increasing business agility, scalability and responsiveness.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

Verizon

Secure, Cost-effective, unified Access for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper to gain valuable insights into combining centralized configuration with reporting, event logging and analysis to create a comprehensive, real-time network monitoring and control center.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Fortinet, Inc.

The Economic Advantages of Open Architecture Platforms in NFV Deployments
sponsored by Big Switch Networks
RESEARCH CONTENT: This ACG research report details NVF in service provider's environments and reveals its strengths in determining the economic advantages on both cost and revenue-generating aspects of designs.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Big Switch Networks

Industry's Largest NFV Deployment
sponsored by Big Switch Networks
CASE STUDY: In this case study, discover how Dell, Red Hat and Big Switch's collaboration led to the NFV deployment for a tier-1 US service provider - the industry's largest deployment of NFV infrastructure to date.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Big Switch Networks

Secure Virtualization Trusted by Government Agencies
sponsored by Red Hat
WHITE PAPER: Red tape in the virtual environments of a small business and a government agency are starkly different – especially when it comes to security. Click to learn about a virtualization platform designed to negate security threats within hypervisors and VMs without compromising performance, and learn why it's trusted by agencies like the NSA.
Posted: 07 Aug 2018 | Published: 31 Jul 2016

Red Hat

Red Hat Virtualization Suite: Integrating with CloudForms in the Modern Datacenter
sponsored by Red Hat
PRODUCT REVIEW: Download this resource to learn how Red Hat's Virtualization Suite aims to address data center challenges by providing centralized management, automated workload management, and more.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

Red Hat

Maximizing the Value of Virtualization with Red Hat
sponsored by Red Hat
WHITE PAPER: Virtualization is well-known as a straightforward method to maximizing your IT system's value, but what if there was a way to add even more? Access this resource to learn all of the additional features and functionality that Red Hat Virtualization can bring to virtualized servers and workstations within your existing systems.
Posted: 11 Jun 2018 | Published: 11 Jun 2018

Red Hat

Delivering Powerful GPU Acceleration & Simplified Management for Remote Users
sponsored by AMD
PRODUCT LITERATURE: It can be difficult to deliver optimal performance for high-end 3D applications from remote offices and field locations. Download this white paper to discover how Multiuser GPU acceleration can enhance performance for mobile and remote access, and simplify management.
Posted: 09 May 2018 | Published: 09 May 2018

AMD

Multi-User GPU Technology
sponsored by AMD
PRODUCT LITERATURE: Read this resource to learn how Multiuser GPU technology can enhance performance, improve remote access, lower costs, and more.
Posted: 09 May 2018 | Published: 09 May 2018

AMD

Multi-User GPU Technology
sponsored by AMD
PRODUCT LITERATURE: Download this resource to see how Multiuser GPU technology can offer your organization key benefits including seamless mobility and collaboration, full workstation acceleration, version control, and data security.
Posted: 09 May 2018 | Published: 09 May 2018

AMD

How Service Providers Can Be Successful With NFV Open Source
sponsored by netElastic Systems
EGUIDE: Learn how to have a successful transition to NFV open source by gaining valuable insight on how open source for NFV applications will require service providers to adopt new ways of designing, deploying and supporting their network infrastructure.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

netElastic Systems
1 - 25 of 553 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement