ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virtualization Security Research

  • CW ASEAN - December 2016

    Sponsored by: SearchDataCenter.com

    In this month's CW ASEAN, read how Singapore is setting itself to be a leader in the digital age.

  • Fabric Solutions for Data Centers

    Sponsored by: Juniper Networks, Inc.

    This video discusses how a fabric solution allows you to customize your data center network to meet the specific needs of your traffic and applications. Learn how this fabric solution can facilitate the evolution from an old fashioned 3-tiered network to an integrated network designed for current and future applications and services.

  • Comprehensive Protections for Cloud Networks

    Sponsored by: Check Point Software Technologies Ltd.

    Uncover advanced threat prevention security for internal traffic inside a virtual infrastructure. Access now and explore scalability of security that adjusts to dynamic network changes, context-aware security policies that leverage security groups, and more.

  • RoundTower Technologies Protects its Customer's SDN: Video Case Study

    Sponsored by: Check Point Software Technologies Ltd.

    Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • Dynamic Orchestration of Advanced Threat Prevention for all Data Center Traffic

    Sponsored by: Check Point Software Technologies Ltd.

    Learn how automated, advanced security for the software-defined data center (SDDC) offers comprehensive threat prevention.

  • Open Source Virtualization Platform Data Sheet

    Sponsored by: Red Hat

    Delve into the essentials of open source virtualization that provides security, reliability, and scalability for virtualized resource-intensive, critical workloads. Take advantage of open source virtualization's workload portability in order to secure the hypervisor against attack vectors, and more.

  • Red Hat Virtualization: VMware Migration

    Sponsored by: Red Hat

    Discover the enterprise benefits of migrating your Linux and Windows VMs to an open source virtualization platform. Discover the software flexibility of this platform and the ease with which it integrates with sundry system components.

  • Sky News Delivers 24/7 News Service with Reliable Red Hat Enterprise Virtualization

    Sponsored by: Red Hat

    Discover a virtualization platform that afforded Sky News, a 24-hour, multimedia news channel, the flexibility needed to expand and develop their content services, accommodate fluctuations in traffic, improve resiliency for 24/7 operations, and more.

  • Why VDI is Perfect for Managing Remote Employees

    Sponsored by: Citrix

    Although it's become increasingly common for organizations to allow employees to work from home, this presents a number of challenges, challenges that VDI can solve effectively. Learn the benefits VDI can have for managing remote employees, including enhanced security, simplified license management, and more.

  • Transforming Technology Delivery in Healthcare with Virtualization

    Sponsored by: Citrix and Pure Storage

    Tune in to hear technology leaders from the nation's leading health systems discuss how technology is reshaping care delivery and security.

  • Resellers reach for the cloud

    Sponsored by: MicroScope

    This themed issue looks at the opportunities for the channel in helping customers make the transition to the cloud

  • Malware Analysis: How Some Strains 'Adapt' to Virtual Machines

    Sponsored by: Kaspersky Lab

    Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.

  • Get the Power of Network Virtualization Without the Pain of Rip and Replace

    Sponsored by: VMware

    It's rare that a giant leap forward in technology doesn't also require a significant degree of risk and disruption – but network virtualization is an exception. This tech brief details how you can move your network to a virtual environment to reap a myriad of benefits without the pain of rip and replace.

  • Modernize Your Data Center Security

    Sponsored by: VMware

    In a recent survey, 60% of respondents said they had adopted network virtualization to help address concerns with data security. Learn how building micro-segmentation on your virtualized network can help you verify and secure all resources, limit and strictly enforce access control, and more.

  • Keeping Pace with the Evolution of Networking

    Sponsored by: VMware

    Enterprise data centers have long been caught in a virtualization gap. Access this white paper to uncover why the time for network virtualization is now and the top three benefits made possible with this new approach.

  • Optimal Security for your Software-Defined Data Center

    Sponsored by: Kaspersky Lab

    Virtual and physical infrastructures face the same security threats - cybercriminals make no distinctions. This means you cannot afford to compromise on security for your virtual environment. Learn about a security tool designed for virtualization platform technologies that barely impacts performance.

  • IT Project ASEAN: Virtualisation

    Sponsored by: ComputerWeekly.com

    In this guide, you'll learn about the driving factors behind virtualisation growth in ASEAN such as the demand for business agility, as well as the barriers to adoption that organisations come up against.

  • 4 Features Your Security Strategy Needs in a Virtual Environment

    Sponsored by: Kaspersky Lab

    This report discusses four features that a virtual desktop infrastructure (VDI) security solution must include. Discover ways to maintain the benefits of virtualization while also meeting the unique needs of VDI.

  • DNS For Hybrid Cloud Success

    Sponsored by: Dyn

    This webcast addresses industry concerns about applications hosted in a hybrid cloud, as well as explores various strategies for implementing cloud services in your business. Learn some successful cloud adoption tactics like using traditional technologies to assist cloud migration and focusing on a 3-part migration life-cycle.

  • The Virtual Firewall Buyer's Guide

    Sponsored by: Juniper Networks, Inc.

    Today's organizations can benefit from additional layers of protection. Access this concise infographic and explore eight virtual firewall questions you should be asking.

  • VMworld Europe 2016: What to expect

    Sponsored by: ComputerWeekly.com

    VMworld Europe 2016 hits Barcelona in October, with VMware expected to announce new and refreshed products and services in support of its end-user computing and cloud strategy. In this e-guide, you'll find case studies featuring last year's winners, along with articles covering the technologies VMware looks set to champion at this year's event.

  • Blended IT and Security Operations: Where's the Balance?

    Sponsored by: ServiceNow

    Within this informative e-guide, you'll learn the benefits – and the risks – of integrating IT and security operations. Discover how you can leverage information collected from multiple data sources to get an accurate picture about the issues affecting both security and performance.

  • Validated Data Protection Solution for Virtualized Environments

    Sponsored by: Veeam Software

    In today's virtualized environment, how do you ensure data protection for your data center? This solution brief explains how to achieve data protection in your virtual infrastructure by employing a validated data protection solution for virtualized environments. Access now, to learn about this solution and its plethora of advanced features.

  • Inside the Linux Container Ecosystem: Building the Container Infrastructure

    Sponsored by: Juniper Networks, Inc.

    This report examines Linux container technology, how it evolved, and how it compares to other open platforms that build and run distributed apps. Access the results of the 2016 Container Survey to find out where and how containers are being deployed, who the top vendors are, how to address NFV with containers, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.