Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

virtualization security

Results 126 - 150 of 173Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Dell Software     Published Date: Aug 30, 2013
In this new technical brief, discover the top 10 ways Foglight for Virtualization, Free Edition, can help you with troubleshooting virtualization challenges. Read this technical brief today.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology, it management
    
Dell Software
Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality, it management
    
Cisco
Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
Kaspersky
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis
    
Cisco
Published By: Trend Micro     Published Date: Oct 12, 2012
The security software you choose for virtual environments will have a significant impact on your organization's return on investment.
Tags : 
information technology, security, software, trend micro
    
Trend Micro
Published By: Trend Micro     Published Date: Oct 12, 2012
Download this free white paper to learn exactly what you need to avoid any trouble without sacrificing innovation or impeding the progress of your business today and in the future.
Tags : 
cloud computing, information security, information technology, trend micro, security, servers
    
Trend Micro
Published By: Hosting.com     Published Date: Jan 21, 2011
This white paper demonstrates how companies that have moved their SQL databases to the cloud have overcome past performance and security concerns to increase operational efficiency, improve availability and scalability, reduce costs, gain a faster-time to-market, and achieve a better return on investment.
Tags : 
hosting.com, sql database, cloud computing, virtualization, data-intensive application, performance, security
    
Hosting.com
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Citrix     Published Date: Apr 16, 2014
Learn how NetScaler has kept pace with industry changes and is winning the hearts and minds of IT leaders.
Tags : 
data center, adc, cloud computing, virtualization, netscaler, citrix, racks, blades
    
Citrix
Published By: Citrix     Published Date: Oct 15, 2013
Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.
Tags : 
citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
    
Citrix
Published By: Symantec     Published Date: Jul 15, 2014
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, cloud computing and virtualization have arrived on the scene, bringing both significant benefits and new challenges. Find out more about this transition to get the most out of your virtual environment.
Tags : 
secure back up, servers, data, network infrastructure, cloud computing, virtualization
    
Symantec
Published By: Kaspersky     Published Date: May 11, 2016
This whitepaper describes the different virtualization security solution options—conventional agent-based; agentless; and Light Agent— as well as possible scenarios for aligning the right security approach to your organization’s virtual environment.
Tags : 
kaspersky, virtualization security, security management, light agent
    
Kaspersky
Published By: Kaspersky     Published Date: Jul 22, 2016
Learn how you can maximize the performance and security of your virtualized machines.
Tags : 
kaspersky, virtual security, virtual environment, data breach, data protection, network security
    
Kaspersky
Published By: Riverbed     Published Date: Aug 22, 2014
As organizations seek to continue leveraging the advantages of virtualization technologies, many are embracing virtualization of end user desktops via approaches such as Virtual Desktop Infrastructure (VDI). But while VDI solutions promise significant security and operational efficiency improvements, they also bring with them unique deployment challenges.
Tags : 
optimizing, vdi, network factor, virtualization technologies, virtual desktop infrastructure, security, operational efficiency, improvements
    
Riverbed
Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization
    
Blue Lane
Published By: Blue Lane     Published Date: Apr 03, 2007
Andreas Antonopoulos, SVP & Founding Partner of Nemertes Research, discusses the challenges of securing the new virtual datacenter.
Tags : 
virtualization, datacenter, security, vulnerability, vmware, virtualshield, security, patching
    
Blue Lane
Published By: Blue Lane     Published Date: Aug 31, 2007
Needing to implement a patch management solution to comply with SAS 70, Davidson found the solutions on the market lacking. They either required significant resources to test all patches, or were expensive automated solutions. Then, Davidson learned about Blue Lane Technologies, a concept that Davidson loved.
Tags : 
server virtualization, server security, network security, patch management, sas70, sas 70, compliance, sox compliance
    
Blue Lane
Published By: Blue Lane     Published Date: Aug 31, 2007
Virtualization has become all the rage for companies interested in optimizing their servers and storage systems. This shift in data center architecture allows IT organizations to reduce operational costs and increase flexibility and responsiveness to changing business demands. But in this rush to virtualize, security can fall by the wayside.
Tags : 
virtualshield, virtual shield, virtualization, security, network security, vmware, vm ware, bluelane
    
Blue Lane
Published By: F5 Networks Inc     Published Date: Apr 17, 2012
Overcome Citrix VDI implementations challenges to deliver the highest end-user quality, most secure access to virtual desktop, while simplifying your IT infrastructure. Learn how global companies maximize their Citrix investment to increase availability, security, and performance.
Tags : 
citrix, xenapp, xen desktop, vdi, virtual desktop, application virtualization, desktop virtualization, vdi performance
    
F5 Networks Inc
Published By: Webroot UK     Published Date: Aug 07, 2013
Whether you are using virtual desktops or virtual servers it's essential that you consider protecting them from malware. Unfortunately, until now, that protection has often meant making some serious compromises.
Tags : 
virtualization, security, virtual desktop, virtual servers, protection
    
Webroot UK
Published By: GoToMeeting     Published Date: Jul 29, 2011
Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
    
GoToMeeting
Published By: SAS     Published Date: Apr 16, 2015
This white paper describes the architecture of SAS Marketing Operations Management and various aspects of its deployment and security. The following areas are covered: • High-level architecture overview • Architectural components • Ecosystem • Virtualization • Deployment options • Deployment best practices • Security This paper is intended for those involved in purchasing, selling and implementing SAS Marketing Operations Management, including system administrators and anyone seeking an understanding of the solution’s architecture and security.
Tags : 
    
SAS
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security, infrastructure
    
Red Hat
Published By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : 
access control, active directory, authentication, directory services, ldap, security policies, sso, systems management
    
Radiant Logic, Inc
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.