virtual security

Results 201 - 225 of 311Sort Results By: Published Date | Title | Company Name
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Increase of BYOD programs in the enterprise has introduced questions to those in charge of enterprise mobility. Fierce MobileIT's ebook, "Securing the Mobile Workforce,"covers many of the trends and challenges of securing corporate data on a device.
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, data management, data center
    
Good Technology Corporation
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
The consumerization of IT is coming. It's a given that employees will bring their own devices to work or will want to work on devices away from the office. The adoption of smart devices has set expectations, causing the "I want my iPad" phenomena
Tags : 
byod, virtualization, enterprise applications, mobile, security, implementation, it implementation, cloud computing
    
Good Technology Corporation
Published By: WatchGuard     Published Date: Oct 16, 2012
Businesses of all sizes have leveraged virtualization to improve utilization and reduce costs. Virtualization - Are You Secure? This white paper explores the advantages of virtualization and the potential security challenges that come with it.
Tags : 
watchguard, infrastructure, virtualization, cloud computing, security, it security, data security
    
WatchGuard
Published By: Rapid7     Published Date: Oct 15, 2012
The need for real-time vulnerability management and risk assessment
Tags : 
rapid7, data security, vulnerability management, risk assessment, virtual machine, virtualization, it infrastructure, data management
    
Rapid7
Published By: Trend Micro     Published Date: Oct 12, 2012
Download this free white paper to learn exactly what you need to avoid any trouble without sacrificing innovation or impeding the progress of your business today and in the future.
Tags : 
cloud computing, information security, information technology, trend micro, security, servers, virtualization
    
Trend Micro
Published By: Trend Micro     Published Date: Oct 12, 2012
The security software you choose for virtual environments will have a significant impact on your organization's return on investment.
Tags : 
information technology, security, software, trend micro, internet security, virtualization, cloud computing
    
Trend Micro
Published By: Trend Micro     Published Date: Oct 12, 2012
This special report, commissioned by Trend Micro, reinforces the security and operational cost savings of host-based virtual patching with the Deep Security and OfficeScan products
Tags : 
infomation security, software costs, trend micro, security, application security, internet security, security management, return on investment
    
Trend Micro
Published By: HP & Intel     Published Date: Sep 18, 2012
Many organizations are considering Virtual Desktop Infrastructure (VDI), which centralizes the execution of users' desktops in the data center, to address growing data loss and endpoint security concerns.
Tags : 
data protection, desktop virtualization, idv, intelligent desktop virtualization, vdi, virtual desktop infrastructure, backup and recovery, security
    
HP & Intel
Published By: SunGard     Published Date: Aug 13, 2012
A leader in performance management, marketing, and training, Frontline Focus required a new data solution to keep information flowing and secure. Any solution had to be resilient, highly available,completely scalable, and cost-effective.
Tags : 
cloud, scalable, cost-effective, sunguard, virtual, cloud, iaas, capital
    
SunGard
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel CoreT vProT processors fight sophisticated crimeware with built-in security technologies that work below and beyond the OS
Tags : 
it security, intel, monitoring, reporting, remediation, automatic monitoring, contagions, built-in-security
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Intelligent Desktop Virtualization (IDV) combines the best end point security with no compromises in user experience, productivity, cost, or flexibility.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel
Published By: VMware     Published Date: Aug 09, 2012
Learn how small and midsized businesses are increasingly adopting virtualisation to deliver consolidation, improve data back up and disaster recovery and increase security with an in-depth new paper from the Enterprise Strategy Group (ESG).
Tags : 
vsa, vsphere storage appliance, storage, data, clustering, virtualization, backup and recovery, storage management
    
VMware
Published By: VMware     Published Date: Aug 09, 2012
Small and midsize firms virtualize IT infrastructure to meet real-world challenges: simplifying operations to focus on business issues, speeding up application rollouts to get more done, safeguarding data and operations to stay open and productive,
Tags : 
vmware, virtualization, infrastructure, data protection, data security, storage management, storage virtualization
    
VMware
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority -part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security
    
Dell Software
Published By: Blackberry     Published Date: Jul 03, 2012
For virtually every enterprise today, mobile device management (MDM) is top of mind. And while security is a chief concern, smart organizations are also discovering new opportunities for productivity. Getting the most from the BYOD phenomenon requires strategic thinking. Find out what key elements to consider in your Enterprise Mobility Strategy. And learn how BlackBerry Mobile Fusion can improve mobile security, reduce TCO and improve productivity.
Tags : 
blackberry, cio, mobile, mdm, smartphones, tablet
    
Blackberry
Published By: Intel Corp.     Published Date: Apr 26, 2012
Download this report to read critical feedback from 200 IT managers in both SMB and enterprise organizations - find out how they are addressing challenges of cloud computing, especially cloud computing security issues.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 26, 2012
Dealing with compliance, privacy, data and application security in the cloud
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 26, 2012
Learn about the business case for developing a private cloud and the basics of building a cloud for the organization.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: McAfee     Published Date: Apr 25, 2012
The best protection against today's network threats are solutions that are adaptable, dynamic, easily managed, contextually-aware and affordable. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: Intel Corp.     Published Date: Apr 25, 2012
Download this guide, which is designed to help you better evaluate different cloud technology vendors and service providers based on a series of questions posed by three cloud infrastructure providers.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: Intel Corp.     Published Date: Apr 25, 2012
Read the paper now and learn how to implement secure virtualization and discover the benefits that could be achieved.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition
    
Intel Corp.
Published By: IBM     Published Date: Apr 18, 2012
IBM IT service management solutions help control costs, enhance performance and increase security in the virtual environment, with software for IT provisioning, IT monitoring, virtual storage, IT security, usage and accounting, software license management and more.
Tags : 
ibm, technology, powervm, vmware, virtualization, intel platform, service management, technology platform
    
IBM
Published By: F5 Networks Inc     Published Date: Apr 18, 2012
VDI deployments offer tremendous advantages but can also impact server and network resources significantly. A complete VDI solution should deliver a reliable, high-performing desktop user experience while taming complexity and supporting scalability within a secure, stable framework.
Tags : 
vdi, vmware view, citrix, xenapp, xen desktop, virtual desktop infrastructure, big-ip, application delivery controllers
    
F5 Networks Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.