IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed   
Virtualization Security Reports
1 - 25 of 561 Matches Previous Page  |  Next Page
Event recap: VMworld 2018 Europe
sponsored by ComputerWeekly.com
EGUIDE: It is the 20th anniversary year for VMware and at the VMware European conference in Barcelona, the company famous for its hypervisor, showcased how it had changed the face of IT, and where it was heading next.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

ComputerWeekly.com

Software-Based Networking: The Engine for a Dynamic Network
sponsored by SearchNetworking.com
EBOOK: In this expert handbook, learn about the ongoing evolution of software-based networking and SDN, and learn about the impact that software is having on the interoperability, flexibility, and responsiveness of modern networks.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

SearchNetworking.com

11 Limitations of Network-Centric Security In The Cloud
sponsored by Lacework
RESOURCE: Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report to learn how you can modernize your network security.
Posted: 24 Sep 2018 | Published: 24 Sep 2018

Lacework

Using CHARON Virtualization to Update Legacy VAX Systems
sponsored by Stromasys
WHITE PAPER: In this case study, find out how a large financial services company kept their mission-critical, legacy apps running by using virtualization -- exactly replicating the functionality of the aging VAX system they built their business around.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Stromasys

IT Security Roadmap 2019; How to survive emerging threats and thrive in complexity
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: In this virtual conference, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com, our experts will examine the shifts in enterprise IT, the future of endpoint security, and how to mitigate IT complexity new technology trends bring. We'll bring together expert insights for achieving a secure and compliant infrastructure.
Posted: 12 Sep 2018 | Premiered: Sep 7, 2018

SearchSecurity.com

How to Manage Third-Party Access
sponsored by Cyxtera
WHITE PAPER: Find out how companies are finding simple ways to mitigate security risks when allowing third-party access to their systems while maintaining low IT costs.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cyxtera

Container Security: A Best Practice Guide
sponsored by Alert Logic
ESSENTIAL GUIDE: In this guide, get a basic understanding of containers, considerations, trade-offs and differences of container types (namely Docker and Kubernetes). Read on to gain security best practices for when your organization moves its applications to containers.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Alert Logic

10 Thing You Need to Know About Data Virtualization
sponsored by TIBCO
WHITE PAPER: If you are considering data virtualization for your business, it's important to get the answers to core questions. In this white paper you will gain essential knowledge about data virtualization, including answers to 10 common questions.
Posted: 29 Aug 2018 | Published: 22 Feb 2018


Focus: Campus local area networks (LAN)
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

ComputerWeekly.com

Software-Based Networking: The Engine for a Dynamic Network
sponsored by SearchNetworking.com
EBOOK: In this expert handbook, learn about the ongoing evolution of software-based networking and SDN, and learn about the impact that software is having on the interoperability, flexibility, and responsiveness of modern networks.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

SearchNetworking.com

3 Microsegmentation Challenges Facing NetOps and SecOps
sponsored by Plixer
RESOURCE: Learn about 3 key microsegmentation challenges and find out how organizations can further improve their network's defense with cooperation and open communication across their app/virtualization, NetOps, and SecOps teams.
Posted: 01 Jun 2018 | Published: 29 Mar 2018


Charlotte Customer Case Study: Better Business Results from Simplified IT
sponsored by Dell EMC and VMware
CASE STUDY: Because of its dispersed environment, Charlotte Pipe and Foundry was searching for a better way to run operations instead of by provisioning and managing servers at remote locations. Read this study to learn how they did so using a hyper-converged strategy that gave them the ability to put virtual machines in an all-in-one appliance.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Dell EMC and VMware

Dell EMC Ready Architectures for VDI
sponsored by Dell EMC and Nutanix
RESOURCE: This five-chapter validation guide illustrates the architecture, components, testing methods, and test results for Dell EMC XC hyper-converged devices with VMware Horizon 7 for VDI. It includes the test environment configuration and best practices for systems that have undergone testing. Your copy awaits you here.
Posted: 22 Oct 2018 | Published: 30 Sep 2018

Dell EMC and Nutanix

4 Steps to Transforming Network Security
sponsored by VMware
RESOURCE: Can traditional perimeter protection work now that a clear perimeter no longer exists? Doubtful. Download this resource to uncover 4 Steps to transforming network security, how security can enable digital transformation and not impede it and more.
Posted: 10 Oct 2018 | Published: 31 May 2018

VMware

How NSX Automates Security Workflows
sponsored by VMware
WHITE PAPER: In this brief we'll discuss how VMware NSX enables essential security workflows—such as provisioning, moves/adds/changes, and threat response—through automation.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

VMware

Secure Virtualization Trusted by Government Agencies
sponsored by Red Hat
WHITE PAPER: Red tape in the virtual environments of a small business and a government agency are starkly different – especially when it comes to security. Click to learn about a virtualization platform designed to negate security threats within hypervisors and VMs without compromising performance, and learn why it's trusted by agencies like the NSA.
Posted: 07 Aug 2018 | Published: 31 Jul 2016

Red Hat

4 Steps to Transforming Network Security
sponsored by VMware
WHITE PAPER: This white paper explores how to transform network security to face modern cyberthreats. Find out how to intelligently align security with the needs of your business by learning about 4 key components of a digital security strategy.
Posted: 31 Jul 2018 | Published: 31 May 2018

VMware

Microsegmentation Builds Security Into Your Data Center's DNA
sponsored by VMware
WHITE PAPER: This white paper explores how to add a second layer of defense behind perimeter firewalls with microsegmentation. Learn how organizations like those in the education sector can take a new approach to data center security that's designed to halt the spread of malware.
Posted: 30 Jul 2018 | Published: 31 May 2016

VMware

Data Protection for Hyper-V Environments
sponsored by Druva Software
RESOURCE: Reading this paper will introduce you to a cloud platform that unifies the backup and archival capabilities of Hyper-V environments to remove the burden of legacy infrastructure, perform host-level or image-level backups, exact simple recovery of full VMs, and more.
Posted: 25 Jul 2018 | Published: 25 Jul 2018

Druva Software

Red Hat Virtualization Suite: Integrating with CloudForms in the Modern Datacenter
sponsored by Red Hat
PRODUCT REVIEW: Download this resource to learn how Red Hat's Virtualization Suite aims to address data center challenges by providing centralized management, automated workload management, and more.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

Red Hat

Boost productivity with a high-definition user workspace
sponsored by Citrix
WHITE PAPER: Download this white paper to learn how a HDX technology can help your organization successfully extend the delivery of virtual apps and desktops to remote, mobile and branch office users — all while maintaining a high level of security and control over corporate data.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

Citrix

Maximizing the Value of Virtualization with Red Hat
sponsored by Red Hat
WHITE PAPER: Virtualization is well-known as a straightforward method to maximizing your IT system's value, but what if there was a way to add even more? Access this resource to learn all of the additional features and functionality that Red Hat Virtualization can bring to virtualized servers and workstations within your existing systems.
Posted: 11 Jun 2018 | Published: 11 Jun 2018

Red Hat

Delivering Powerful GPU Acceleration & Simplified Management for Remote Users
sponsored by AMD
PRODUCT LITERATURE: It can be difficult to deliver optimal performance for high-end 3D applications from remote offices and field locations. Download this white paper to discover how Multiuser GPU acceleration can enhance performance for mobile and remote access, and simplify management.
Posted: 09 May 2018 | Published: 09 May 2018

AMD

Multi-User GPU Technology
sponsored by AMD
PRODUCT LITERATURE: Read this resource to learn how Multiuser GPU technology can enhance performance, improve remote access, lower costs, and more.
Posted: 09 May 2018 | Published: 09 May 2018

AMD

Multi-User GPU Technology
sponsored by AMD
PRODUCT LITERATURE: Download this resource to see how Multiuser GPU technology can offer your organization key benefits including seamless mobility and collaboration, full workstation acceleration, version control, and data security.
Posted: 09 May 2018 | Published: 09 May 2018

AMD
1 - 25 of 561 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement