virtual security

Results 201 - 225 of 311Sort Results By: Published Date | Title | Company Name
Published By: Intel Corp.     Published Date: Apr 25, 2012
Read the paper now and learn how to implement secure virtualization and discover the benefits that could be achieved.
Tags : 
virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition, cloud, private cloud, challenges, virtualization
    
Intel Corp.
Published By: Gigamon     Published Date: Dec 13, 2018
Read Security at the Speed of Your Network to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read Security at the Speed of Your Network to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read Security at the Speed of Your Network to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Feb 20, 2019
Read Security at the Speed of Your Network to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Download Kaspersky Labs Security for Virtualization: Getting the Balance Right to answer your most pressing questions.
Tags : 
kaspersky, virtualization, security, virtual environment, business protection, business transformations, business intelligence
    
Kaspersky Lab
Published By: Kaspersky     Published Date: Apr 24, 2014
This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.
Tags : 
security, virtualization, security approaches, kaspersky, anti spam, anti spyware, anti virus, application security, network security appliance
    
Kaspersky
Published By: Kaspersky     Published Date: Feb 05, 2015
This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.
Tags : 
security, virtualization, security approaches, kaspersky, anti spam, anti spyware, anti virus, application security, network security appliance
    
Kaspersky
Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization, patch management, servers
    
Blue Lane
Published By: Delphix     Published Date: May 28, 2015
A new generation of tools is bringing agility to components of IT operations . Learn how recent advancements in agile data management, data virtualization, and data masking are combining to help companies achieve previously unachievable breakthroughs in IT security and risk management. Starting with a technical dive into data masking and the key concepts surrounding virtual data, this eBook also leverages exhaustive industry research and company surveys to translate the business value associated with these solutions.
Tags : 
    
Delphix
Published By: IBM     Published Date: Mar 30, 2017
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever beforefocusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as extract, transfer and load (ETL), data replication or data virtualization.
Tags : 
data integration, data security, data optimization, data virtualization, database security
    
IBM
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBMs deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBMs AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: Red Hat     Published Date: Dec 15, 2017
Virtualization can vastly improve efficiency, free up resources, and cut costs-without sacrificing performance, security, and existing investments. This testimonials document lists 15 enterprise customers who are using Red Hat Virtualization and 4 of them share how it's helping their business and why they chose Red Hat.
Tags : 
    
Red Hat
Published By: Citrix     Published Date: Apr 16, 2014
Learn how NetScaler has kept pace with industry changes and is winning the hearts and minds of IT leaders.
Tags : 
data center, adc, cloud computing, virtualization, netscaler, citrix, racks, blades, lan, security, servers, clustering, storage virtualization, data center design and management
    
Citrix
Published By: Hosting.com     Published Date: Jan 21, 2011
This white paper demonstrates how companies that have moved their SQL databases to the cloud have overcome past performance and security concerns to increase operational efficiency, improve availability and scalability, reduce costs, gain a faster-time to-market, and achieve a better return on investment.
Tags : 
hosting.com, sql database, cloud computing, virtualization, data-intensive application, performance, security, storage virtualization, security management, application performance management, server virtualization, database development, database security
    
Hosting.com
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management, security management, secure remote access, aventail, security, access control, internet security, network security appliance
    
Aventail
Published By: HP and Intel Xeon processors     Published Date: Feb 12, 2013
Control costs while improving patient care, as well as meet expanding regulatory requirements. This whitepaper discusses virtualized storage solutions for the current generation of Healthcare professionals
Tags : 
virtualization, healthcare, storage, network, pacs, compliance, regulations, security
    
HP and Intel Xeon processors
Published By: Symantec     Published Date: Jul 15, 2014
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, cloud computing and virtualization have arrived on the scene, bringing both significant benefits and new challenges. Find out more about this transition to get the most out of your virtual environment.
Tags : 
secure back up, servers, data, network infrastructure, cloud computing, virtualization
    
Symantec
Published By: VMware, Inc     Published Date: Dec 05, 2013
Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware Horizon View (formerly VMware View), IT professionals can implement a VDI infrastructure to help drive down operational costs, enhance security, and support a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, virtual desktops, vdi, datacenter, networking, it management, knowledge management, enterprise applications, storage, data management, data center
    
VMware, Inc
Published By: VMware, Inc     Published Date: Dec 05, 2013
The workforce is going mobile. According to Forrester, more than half of employees carry at least three devices for work. And many are bringing their own smartphones, tablets, and other devices to work, a phenomenon thats grown so popular it now has its own acronymBring Your Own Device (BYOD). So it comes as no surprise that, according a survey by SpiceWorks, 60% of small and medium businesses are considering using a virtual desktop infrastructure (VDI) as part of their BYOD strategy. Many of these organizations are relying on VMware Horizon View (formerly VMware View), because it enables organizations to implement a VDI infrastructure that reduces operational costs, enhances security and supports a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, mobile, byod, spiceworks, virtual desktop infrastructure, bring your own device, vdi, networking, security, it management, knowledge management, enterprise applications, storage, data management, mobile computing, mobile data systems, mobile workers, smart phones
    
VMware, Inc
Published By: VMware     Published Date: Dec 18, 2012
This presentation will be available to audience members until June 21, 2014 at 09:00 AM Pacific Daylight Time.
Tags : 
virtualization, cloud, vmware, security, compliance, cloud computing, infrastructure
    
VMware
Published By: VM Ware     Published Date: Nov 03, 2009
In addition to traditional cost-cutting strategies, this list contains cost savings opportunities you may not have explored, including virtualization from VMware, the leader in the industry.
Tags : 
vmware, virtualization, smb, server consolidation, infrastructure utilization, security, disaster recovery, business continuity
    
VM Ware
Published By: Intel Security     Published Date: May 15, 2015
Your physical and virtualized server instances will be vulnerable to any new security threats. Download this how-to guide and start preparing for Windows Server 2003 end of support.
Tags : 
windows server 2003 eos, vulnerability to security threats, windows end of support, security
    
Intel Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.