virtual security

Results 151 - 175 of 311Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2014
IBMs SmartCloud VDI solution leverages the IBM PureFlex and Flex System portfolio, Cloud and Smarter Infrastructure products and the companys design/deploy services to deliver reliable, powerful and secure managed desktop infrastructures.
Tags : 
smartcloud vdi, ibm smartcloud, vdi solution, v7000 storage, desktop infrastructures, virtual desktop, storwize v7000, vmware view, pureflex system, platform infrastructure, system security, ibm pureflex, storage, data management, network architecture, network performance, network performance management
    
IBM
Published By: Red Hat     Published Date: Jan 08, 2014
This executive brief provides results of a CIO Magazine Quick Pulse poll sponsored by Red Hat which highlights the industry move to private cloud technology and hybrid cloud environments through dual-source virtualization wherein companies value security, performance and support in a quest to build the new IT paradigm.
Tags : 
red hat, virtualization, storage, cloud, cloud data, hybrid cloud, cloud management, platform as a service, paas, cloud data access storage, cloud applications, scalability, deployment, cloud technologies, it management, platforms, servers, cloud computing, infrastructure
    
Red Hat
Published By: Red Hat     Published Date: Jan 08, 2014
This overview includes key benefits and a summary of Red Hat Enterprise Linux and Red Hat Enterprise Virtualization, with a limited time promotional offering that will save you up to 26% while enabling increased performance, scalability and security.
Tags : 
red hat, rhel, rhev, enterprise linux, enterprise virtualization, virtualization, servers, scalability, security, cloud, virtulization platform, it management, platforms, cloud computing, infrastructure
    
Red Hat
Published By: Symantec     Published Date: Jan 02, 2014
Learn 8 reasons why you should only use a single backup and recovery solution for all your servers and see how you can avoid high costs and negative consequences.
Tags : 
backup solution, virtual machines, innovation, security, best practices, vulnerability management
    
Symantec
Published By: VMware, Inc     Published Date: Dec 05, 2013
Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware Horizon View (formerly VMware View), IT professionals can implement a VDI infrastructure to help drive down operational costs, enhance security, and support a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, virtual desktops, vdi, datacenter, networking, it management, knowledge management, enterprise applications, storage, data management, data center
    
VMware, Inc
Published By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon thats grown so popular it now has its own acronymBring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware Horizon View (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device, vdi, networking, security, it management, knowledge management, enterprise applications, storage, data management, mobile computing, mobile data systems, mobile workers, smart phones
    
VMware, Inc
Published By: Symantec     Published Date: Nov 15, 2013
Learn how to calculate the TCO of your virtualization protection solution and find out whether a virtualization-specific solution is the right fit for your organization instead of a unified solution.
Tags : 
tco, parallel backup solution, virtual environemtns, security, protection, symatnec
    
Symantec
Published By: McAfee     Published Date: Oct 28, 2013
Watch this 3 minute video for a unique way of accessing public and private cloud services without losing governance and situational awareness.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, cloud computing
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2013
Eliminate high costs associated with MPLS and BGP with a new approach. This short video will show how secure and resilient connectivity between global sites is possible while increasing network bandwidth and quality of service.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, networking
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2013
View this demonstration to see how masses of security devices in complex and geographically diverse organizations can be operated from one single point of operations in a way that is cheaper, easier, faster, and safer.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, networking, security
    
McAfee
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity giving people anywhere, anytime access to information via devices theyre comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: Dell Software     Published Date: Aug 30, 2013
In this new technical brief, discover the top 10 ways Foglight for Virtualization, Free Edition, can help you with troubleshooting virtualization challenges. Read this technical brief today.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology, it management, enterprise applications, data management
    
Dell Software
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Webroot UK     Published Date: Aug 07, 2013
Whether you are using virtual desktops or virtual servers it's essential that you consider protecting them from malware. Unfortunately, until now, that protection has often meant making some serious compromises.
Tags : 
virtualization, security, virtual desktop, virtual servers, protection
    
Webroot UK
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting ones virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, networking, security, storage
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few must have features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management, storage, data management
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Because of the outstanding economy, flexibility, and service levels it offers, virtualization is transforming data centers at breakneck speed: by 2016, an estimated 80 percent of the world's x86 servers will be Virtual Machines (VMs). But the speed of this transformation, along with the high resource utilization, ease of cloning, moving workloads, and other ways virtualization works its magic, raise challenges for traditional IT services and the teams that deliver them.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management, storage, data management
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management, knowledge management
    
Symantec
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
security, data, users, infrastructure, bluecoat, application security, virtualization, cloud computing
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
virtualization, security, consolidation, data, infrastructure, network, technology, networking, enterprise applications, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, its not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management, data center
    
Blue Coat Systems
Published By: Savvis UK Limited     Published Date: May 14, 2013
Savvis has been hosting eCommerce platforms for nearly two decades. Internet retailers including easyJet and Hallmark Digital trust us to power their online success. Savvis offers a comprehensive portfolio of infrastructure, network and application management across the eCommerce ecosystem. No matter what you sell or where you are along the eCommerce journey, we can support your commercial goals with the speed of implementation, accessibility, security and affordability of a retail-ready cloud environment, with our Virtual Private Data Centre. Combined with our global data centre footprint and network options ranging from Tier1 public IP access to private, low-latency connectivity, the VPDC offers a resilient, made-to-measure solution for any eCommerce application.
Tags : 
virtual, private, data centre, it foundation, ecommerce, platforms, internet retailers, online, virtual private data centre, security, affordability
    
Savvis UK Limited
Published By: Cisco     Published Date: May 14, 2013
Not long ago, if you asked an IT executive about transformation, there was a good chance youd get a technology-centric response. Youd hear about consolidation and virtualization, power and cooling, security and availability. Today, the responses are different. This edition of Unleashing IT is all about transformation. Not technology change, but business change through the use of technology.
Tags : 
innovation, change management, cost reduction, cloud, virtualization, bandwidth management, application integration, application performance management, best practices, business integration, business intelligence, business management, enterprise resource planning, enterprise software, groupware workflow, return on investment, server virtualization, cloud computing, infrastructure
    
Cisco
Published By: Sponsored by HP and Intel     Published Date: May 09, 2013
Uncover the impact modern business demands are having on corporate networks today and learn what you must do to ensure your network performs the way you need it to for business success.
Tags : 
virtualization, agile, security, network, network performance, distributed computing, infrastructure, load balancing, migration, monitoring, network architecture, network management, network performance management, traffic management, storage virtualization, network security appliance
    
Sponsored by HP and Intel
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.