virtual security

Results 76 - 100 of 306Sort Results By: Published Date | Title | Company Name
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware or Linux KVM and OpenStack to help manage your virtualized environment.
Tags : 
palo alto, virtualization, cloud, firewall, security, digital
    
Palo Alto Networks
Published By: Symantec     Published Date: Dec 13, 2017
Todays workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the worlds largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Threat actors increasingly look toward illicit cryptomining as an easy source of income. Cryptomining is the production of virtual currency, also known as cryptocurrency, such as Bitcoin and Monero. It comes at the expense of system performance and power consumption. Moreover, threat actors are infiltrating networks to use their victims computer resources to do this work for them. In this white paper, you will learn how to defend your organization from illicit cryptomining with the Cisco security portfolio.
Tags : 
    
Cisco Umbrella EMEA
Published By: WatchGuard     Published Date: Oct 16, 2012
Businesses of all sizes have leveraged virtualization to improve utilization and reduce costs. Virtualization - Are You Secure? This white paper explores the advantages of virtualization and the potential security challenges that come with it.
Tags : 
watchguard, infrastructure, virtualization, cloud computing, security, it security, data security
    
WatchGuard
Published By: Symantec     Published Date: Nov 14, 2012
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. Trend Micro Deep Security (DS) 8. Read to learn how well Symantec did against others.
Tags : 
symantec, symantec endpoint protection 12.1, vmware, tolly report, security, enterprise applications
    
Symantec
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
The consumerization of IT is coming. It's a given that employees will bring their own devices to work or will want to work on devices away from the office. The adoption of smart devices has set expectations, causing the "I want my iPad" phenomena
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, it implementation, cloud computing
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, data management, data center
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Apr 29, 2013
Security and management are critical to enterprise mobilitybut theyre also complex. Dive deeper in this virtual roundtable with guests from Forrester Research, Inc., Good, and BoxTone. Learn more about mobile security trends, concerns, and myths.
Tags : 
mdm, mobile device management, emm, enterprise mobility, mobile application management, enterprise mobility, mobile security
    
Good Technology Corporation
Published By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : 
application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching, open source vulnerabilities, owasp, cloud security, gartner research report, threat forensics, advanced persistent threat, security
    
Waratek
Published By: Pure Storage     Published Date: Jan 12, 2016
This guides provides insight into the various benefits and challenges associated with VDI implementation and ultimately culminates in an overview of the many use cases for VDI in healthcare. VDI is not the solution for all practices, but for many it is enabling higher efficiency and faster innovation.
Tags : 
virtual desktop infrastructure, vdi, healthcare, pure storage, vdi implementation, data security, mobility, it management, enterprise applications
    
Pure Storage
Published By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Business evolution and technology advancements during the last decade have driven a sea change in the way data centers are funded, organized, and managed. Enterprises are now focusing on a profound digital transformation which is a continuous adjustment of technology management resources to deliver business results, guided by rapid review of desired outcomes related to end clients, resources, and budget constraints. These IT transitions are very much part of the competitive landscape, and executed correctly, they become competitive differentiators and enable bottom line growth. These outcomes are driving data centers to virtualization, service-oriented architectures, increased cybersecurity, big data, and cloud, to name a few of the key factors. This is completely rethinking and retooling the way enterprises handle the applications, data, security, and access that constitute their critical IT resources. In essence, cloud is the new IT.
Tags : 
    
Juniper Networks
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegys agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: Oracle     Published Date: Oct 20, 2017
Oracle is making significant engineering investments to ensure that Oracle systems coupled with Oracle software deliver the best possible business results. Integrated hardware, accelerated virtualization, and encryption ensure that cloud deployments benefit from the utmost agility and security without suffering performance losses. Its never been easier to upgrade your legacy systems and take advantage of Oracle's cutting-edge infrastructure systems. Advanced data security, extreme efficiency with Software in Silicon and dramatic gains in performance make Oracle systems the best choice for your Oracle software deployments.
Tags : 
    
Oracle
Published By: Webroot UK     Published Date: Feb 04, 2013
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot Secure Anywhere Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint, security, virtualization, environments, performance, protection, manageability
    
Webroot UK
Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This Guide will help companies to improve the effectiveness of their existing strategy or are looking to make their first move into the cloud.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions, make first move into the cloud, best practices cloud computing, security data, disaster recovery, security management, data protection, database security, virtualization, infrastructure
    
Macquarie Telecom
Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This white paper reveals a list of top 10 trends in cloud computing to help you take advantage of all the greatest new innovations in cloud technology.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud computing trends, cloud security, cloud performance, mobile cloud computing, disaster recovery, firewalls, mobile computing, data protection, virtualization
    
Macquarie Telecom
Published By: Symantec     Published Date: Jan 31, 2013
Tolly evaluated the antivirus effectiveness within VMware vSphere 5 virtual environments for both agentless and agent-based solutions. Download the report to find out which systems were most protected.
Tags : 
virtualization, vmware, test, antivirus, security, protection, anti spam, anti spyware, anti virus, application security, business continuity, vulnerability management
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Tolly benchmarked the performance of four top endpoint security vendors within VMware vSphere 5 virtual environments. Read the report to discover which solutions were the fastest.
Tags : 
virtualization, vmware, test, antivirus, security, protection, access control, anti spam, anti spyware, anti virus, application security, hacker detection, intrusion detection, intrusion prevention, security management, vulnerability management
    
Symantec
Published By: F5 Networks Inc     Published Date: Apr 17, 2012
Learn how to unburden your VDI infrastructure and gain added security, network performance improvements and optimizations, while improving the architecture for non-VDI application specific systems.
Tags : 
virtual desktop, virtual desktop infrastructure, vdi, vdi impact on the network, vdi performance, vdi security, vdi management, vmware view, citrix, microsoft vdi, application security, application integration, application performance management, data quality, service management, virtualization
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Apr 18, 2012
VDI deployments offer tremendous advantages but can also impact server and network resources significantly. A complete VDI solution should deliver a reliable, high-performing desktop user experience while taming complexity and supporting scalability within a secure, stable framework.
Tags : 
vdi, vmware view, citrix, xenapp, xen desktop, virtual desktop infrastructure, big-ip, application delivery controllers, adc, vdi performance, vdi scalability, vdi security, microsoft vdi, data quality, desktop management, virtualization, cloud computing
    
F5 Networks Inc
Published By: EMC Corporation     Published Date: May 27, 2014
Virtual Desktop Infrastructure (VDI) holds the promise not only of consolidating desktop computing into the data center for improved manageability, efficiency, and security, but also for supporting new services such as bring-your-own device and desktop mobility.
Tags : 
emc, vdi, flash strategy, storage solutions, data center, it management
    
EMC Corporation
Published By: Webroot     Published Date: Dec 06, 2011
Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.
Tags : 
saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring, best practices, virtualize, virtualization, challenges, it security, security, on-premise, access control, anti spam, anti spyware, anti virus, application security
    
Webroot
Published By: Incapsula     Published Date: Nov 06, 2017
Being aware of the risks and costs associated with DDoS attacks, most enterprises protect their websites and network infrastructure with some sort of mitigation solution. However, as the threat landscape continues to evolve, its getting harder to gauge your organizations DDoS readiness and identify the soft spots in your defenses. The calculator measures your DDoS resiliency score based on a short questionnaire about your network infrastructure, security products and procedures. The results are provided in a detailed report that includes: Your DRS score, its meaning and implications Technical evaluation of a virtual penetration test Comparative analysis of your DRS within your business vertical Suggestions for improving your security posture
Tags : 
    
Incapsula
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.