IT Management  >   Systems Operations  >   Security  >   Application Security  >  

Virtualization Security

RSS Feed   
Virtualization Security Reports
1 - 25 of 558 Matches Previous Page  |  Next Page
Vembu VMBackup Overview
sponsored by Vembu Technologies
WHITE PAPER: Access this paper to view a VM replication approach that adds critical optimizations to both restore and replication operations to dramatically minimize overhead on ESXi hosts and production VMs. The solution was also recently tested on a mission-critical OLTP scenario, the results of which are also inside.
Posted: 16 Jan 2019 | Published: 31 Dec 2016

Vembu Technologies

The Present and Future of Hybrid Cloud Workspaces
sponsored by Citrix Ready
WEBCAST: Tune in to this webinar to hear from Citrix and HPE experts as they weigh in on the state of today's digital workspaces and VDI environments – and discover a new option that aims to reduce traditional VDI complexity, integrate further automation opportunities, and more.
Posted: 07 Jan 2019 | Premiered: Dec 6, 2018

Citrix Ready

Veeam and Cisco UCS: Intelligent Data Management for the Hyper-available Enterprise
sponsored by Cisco and Veeam
WHITE PAPER: Read this paper to learn how together Veeam and Cisco are strengthening virtual environments' backup and recovery. Included inside is an evaluation of using Veeam Availability Suite software in conjunction with Cisco UCS, assessing the reliability, operational efficiency, performance, and manageability of deploying the two.
Posted: 07 Jan 2019 | Published: 31 Oct 2018

Cisco and Veeam

Get Up to Speed on VMware vSAN Troubleshooting Basics
sponsored by VMware and Intel
EGUIDE: Virtualization and Linux expert Stuart Burns offers step-by-step guidance on VMware vSAN troubleshooting in this e-guide, including a visual of the web client and how to troubleshoot during host failure. Read on for the essentials.
Posted: 05 Dec 2018 | Published: 29 Nov 2018

VMware and Intel

Event recap: VMworld 2018 Europe
sponsored by ComputerWeekly.com
EGUIDE: It is the 20th anniversary year for VMware and at the VMware European conference in Barcelona, the company famous for its hypervisor, showcased how it had changed the face of IT, and where it was heading next.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

ComputerWeekly.com

11 Limitations of Network-Centric Security In The Cloud
sponsored by Lacework
RESOURCE: Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report to learn how you can modernize your network security.
Posted: 24 Sep 2018 | Published: 24 Sep 2018

Lacework

Container Security: A Best Practice Guide
sponsored by Alert Logic
ESSENTIAL GUIDE: In this guide, get a basic understanding of containers, considerations, trade-offs and differences of container types (namely Docker and Kubernetes). Read on to gain security best practices for when your organization moves its applications to containers.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Alert Logic

Focus: Campus local area networks (LAN)
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

ComputerWeekly.com

Software-Based Networking: The Engine for a Dynamic Network
sponsored by SearchNetworking.com
EBOOK: In this expert handbook, learn about the ongoing evolution of software-based networking and SDN, and learn about the impact that software is having on the interoperability, flexibility, and responsiveness of modern networks.
Posted: 18 Jul 2018 | Published: 18 Jul 2018

SearchNetworking.com

Charlotte Customer Case Study: Better Business Results from Simplified IT
sponsored by Dell EMC and VMware
CASE STUDY: Because of its dispersed environment, Charlotte Pipe and Foundry was searching for a better way to run operations instead of by provisioning and managing servers at remote locations. Read this study to learn how they did so using a hyper-converged strategy that gave them the ability to put virtual machines in an all-in-one appliance.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

Dell EMC and VMware

Dell EMC Ready Architectures for VDI
sponsored by Dell EMC and Nutanix
RESOURCE: This five-chapter validation guide illustrates the architecture, components, testing methods, and test results for Dell EMC XC hyper-converged devices with VMware Horizon 7 for VDI. It includes the test environment configuration and best practices for systems that have undergone testing. Your copy awaits you here.
Posted: 22 Oct 2018 | Published: 30 Sep 2018

Dell EMC and Nutanix

Software-Based Networking: The Engine for a Dynamic Network
sponsored by SearchNetworking.com
EBOOK: In this expert handbook, learn about the ongoing evolution of software-based networking and SDN, and learn about the impact that software is having on the interoperability, flexibility, and responsiveness of modern networks.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

SearchNetworking.com

4 Steps to Transforming Network Security
sponsored by VMware
RESOURCE: Can traditional perimeter protection work now that a clear perimeter no longer exists? Doubtful. Download this resource to uncover 4 Steps to transforming network security, how security can enable digital transformation and not impede it and more.
Posted: 10 Oct 2018 | Published: 31 May 2018

VMware

How NSX Automates Security Workflows
sponsored by VMware
WHITE PAPER: In this brief we'll discuss how VMware NSX enables essential security workflows—such as provisioning, moves/adds/changes, and threat response—through automation.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

VMware

Using CHARON Virtualization to Update Legacy VAX Systems
sponsored by Stromasys
WHITE PAPER: In this case study, find out how a large financial services company kept their mission-critical, legacy apps running by using virtualization -- exactly replicating the functionality of the aging VAX system they built their business around.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Stromasys

IT Security Roadmap 2019; How to survive emerging threats and thrive in complexity
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: In this virtual conference, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com, our experts will examine the shifts in enterprise IT, the future of endpoint security, and how to mitigate IT complexity new technology trends bring. We'll bring together expert insights for achieving a secure and compliant infrastructure.
Posted: 12 Sep 2018 | Premiered: Sep 7, 2018

SearchSecurity.com

How to Manage Third-Party Access
sponsored by Cyxtera
WHITE PAPER: Find out how companies are finding simple ways to mitigate security risks when allowing third-party access to their systems while maintaining low IT costs.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cyxtera

10 Thing You Need to Know About Data Virtualization
sponsored by TIBCO
WHITE PAPER: If you are considering data virtualization for your business, it's important to get the answers to core questions. In this white paper you will gain essential knowledge about data virtualization, including answers to 10 common questions.
Posted: 29 Aug 2018 | Published: 22 Feb 2018


Secure Virtualization Trusted by Government Agencies
sponsored by Red Hat
WHITE PAPER: Red tape in the virtual environments of a small business and a government agency are starkly different – especially when it comes to security. Click to learn about a virtualization platform designed to negate security threats within hypervisors and VMs without compromising performance, and learn why it's trusted by agencies like the NSA.
Posted: 07 Aug 2018 | Published: 31 Jul 2016

Red Hat

4 Steps to Transforming Network Security
sponsored by VMware
WHITE PAPER: This white paper explores how to transform network security to face modern cyberthreats. Find out how to intelligently align security with the needs of your business by learning about 4 key components of a digital security strategy.
Posted: 31 Jul 2018 | Published: 31 May 2018

VMware

Microsegmentation Builds Security Into Your Data Center's DNA
sponsored by VMware
WHITE PAPER: This white paper explores how to add a second layer of defense behind perimeter firewalls with microsegmentation. Learn how organizations like those in the education sector can take a new approach to data center security that's designed to halt the spread of malware.
Posted: 30 Jul 2018 | Published: 31 May 2016

VMware

Data Protection for Hyper-V Environments
sponsored by Druva Software
RESOURCE: Reading this paper will introduce you to a cloud platform that unifies the backup and archival capabilities of Hyper-V environments to remove the burden of legacy infrastructure, perform host-level or image-level backups, exact simple recovery of full VMs, and more.
Posted: 25 Jul 2018 | Published: 25 Jul 2018

Druva Software

Red Hat Virtualization Suite: Integrating with CloudForms in the Modern Datacenter
sponsored by Red Hat
PRODUCT REVIEW: Download this resource to learn how Red Hat's Virtualization Suite aims to address data center challenges by providing centralized management, automated workload management, and more.
Posted: 05 Jul 2018 | Published: 05 Jul 2018

Red Hat

Boost productivity with a high-definition user workspace
sponsored by Citrix
WHITE PAPER: Download this white paper to learn how a HDX technology can help your organization successfully extend the delivery of virtual apps and desktops to remote, mobile and branch office users — all while maintaining a high level of security and control over corporate data.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

Citrix

Maximizing the Value of Virtualization with Red Hat
sponsored by Red Hat
WHITE PAPER: Virtualization is well-known as a straightforward method to maximizing your IT system's value, but what if there was a way to add even more? Access this resource to learn all of the additional features and functionality that Red Hat Virtualization can bring to virtualized servers and workstations within your existing systems.
Posted: 11 Jun 2018 | Published: 11 Jun 2018

Red Hat
1 - 25 of 558 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement