ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virtualization Security Research

  • VM Data Protection for Dummies

    Sponsored by: Veeam and Quantum

    Discover innovative, modern data protection solutions for data in virtualized environments and explore best practices for choosing the VM protection solution that's right for your enterprise. With the right solution, your enterprise can cost-efficiently secure your virtual environments and backup your data.

  • Case Study: Virtualization Strengthening Security

    Sponsored by: emc first distribution

    Learn how a government agency with very particular needs boosted performance for its systems that were struggling to secure a growing volume of important data on physical workstations.

  • Strengthen Desktop Virtualization Security by Minimizing Endpoint Attack Surfaces

    Sponsored by: Dell, Inc.

    Access this white paper to explore why IT professionals are increasingly adopting desktop virtualization paired with thin client solutions to significantly reduce risks and improve protection at endpoints. Examine thin client solutions to help you select one that can best support enhanced endpoint security for your organization.

  • Making Desktop Virtualization More Viable Through Endpoint Innovation

    Sponsored by: Dell, Inc.

    Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.

  • Is There a Hole in Your Castle Wall? Why Your Desktop May be Your Greatest Security Vulnerability

    Sponsored by: Aventura

    Explore a brief technology blueprint for securing sensitive healthcare information from hackers and security threats. Discover how to implement a healthcare organization security plan that protects your virtual desktops.

  • Securing virtual desktop infrastructure with NetScaler

    Sponsored by: Citrix

    Migrating to virtual desktop technologies is a key initiative for many enterprises due to the benefits the technology has to offer. However, in order to realize the desktop and data security benefits of virtual apps and desktops, it's critical to make sure that the VDI is secure. Read on to learn about taking advantage of the benefits VDI offers.

  • Why Businesses Are Adopting Network Virtualization

    Sponsored by: VMware

    It only takes one objective to make the move to network virtualization worth your while. But what's it mean for IT organizations? Explore the advantages and benefits that make network virtualization attractive to IT organizations and identify how it might suit your business scenario.

  • Solve Real-World Challenges With App Virtualization and VDI

    Sponsored by: Citrix

    This infographic reveals how app virtualization and VDI can solve real-world challenges in today's mobile enterprises. Uncover the top 4 use cases for app and desktop virtualization.

  • Secure App and Data Delivery – Across Devices, Networks, and Locations

    Sponsored by: Citrix

    Discover a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.

  • Evaluating Recovery-in-Place Strategies for Data Protection

    Sponsored by: Veritas

    Inside this exclusive data protection guide, explore a detailed breakdown of recovery-in-place technology, its top use cases and three key considerations to keep in mind when evaluating data protection techniques.

  • Agile Security at the Speed of Modern Business

    Sponsored by: CloudPassage

    An agile security solution implements orchestration and automation to keep up with diverse, fluid and fast-moving infrastructures. Learn how agile security can empower your CISO and their teams to move at the speed of modern business and become enablers of innovation and growth.

  • Bridge the Manageability Gap with Intelligent Power Management

    Sponsored by: Eaton

    In this white paper, learn how intelligent power management can overcome the power manageability gap in data centers adopting converged and hyperconverged infrastructures. Access now to minimize the effect of power disruption in the data center and bolster business continuity with 5 tactics.

  • Veeam withCisco UCS C240Configuration Guide

    Sponsored by: Veeam Software

    Discover a backup and replication solution that can increase the value of your backup and reinvent data protection in your virtual environments. This technology can enable your enterprise to benefit from features such as source-side deduplication and compression, parallel processing, and 24/7 application availability.

  • Case Study: VMware empowers King Abdulaziz City for Science and Technology to Provide Reliable Cloud

    Sponsored by: VMware

    By providing internet and IT services to academic institutions, governments are faced with the challenge of meeting customer demands. Many use cloud services but finding one that has rich user features but remain easy to manage is tough. Read on to learn about an organization that was able to overcome these challenges and stay ahead of competitors.

  • IDC Server Security: Virtualization and Cloud Changes Everything

    Sponsored by: TrendMicro

    Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.

  • Virtualization Security: Know Your Options

    Sponsored by: Kaspersky Lab

    Discover the top three options for delivering security to your virtual servers. Go in-depth on agent-based security, agentless security and light agent security to see which option fits your unique IT architecture.

  • Data Protection Considerations for Converged Infrastructure

    Sponsored by: Veritas

    Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. Discover in this analyst report the top 10 challenges in protecting virtual environments, and learn a modern approach to protecting and recovering your converged infrastructure and hyperconverged environments.

  • Ten essential network virtualization definitions

    Sponsored by: VMware

    There is some confusion surrounding network virtualization as there is no one definition. In this exclusive guide, you'll find ten definitions to help you better understand the basics and build the best software-defined network possible.

  • IBM Data Protection for Virtual Environments

    Sponsored by: IBM

    Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.

  • Building a hybrid network with SDN, network virtualization

    Sponsored by: VMware

    Considering the benefits they offer, it is critical to understand SDN and network virtualization technologies. This exclusive guide will dispel any lingering confusion about SDN and network virtualization and help you determine exactly what to look for when considering vendors.

  • Peeking At the Future with Giant Monster Virtual Machines

    Sponsored by: IBM

    Compute power is increasing at an astonishing rate, but what are the upper limits of current technology? One project brought three industry leaders to find out. Learn about the findings and what this means for the future of virtual machines.

  • Application Awareness: The Critical Enabler in Virtualized Networks

    Sponsored by: Ipoque

    Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.

  • Nemertes Research: Re-Architecting the Enterprise Network For WLAN, Cloud, Mobility, Bandwidth, and Cybercrimes

    Sponsored by: Juniper Networks, Inc.

    IT professionals continue to embrace new technologies but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.

  • Future of IT Infrastructure

    Sponsored by: Verizon

    Digital is changing the way that most aspects of business are being handled. Instead of worrying about protocols and lead times, your IT function should be focusing on creating the right business rules. Learn more about the latest intelligent networking solutions offering greater visibility and control.

  • Software-Defined Security for the Software-Defined Infrastructure

    Sponsored by: Intel Security

    Learn how a software-defined security approach can help you to improve the security for software-defined infrastructures (SDI) and simplify security management when you're ready for virtualization. Watch now to find out how this approach works and how you can provision security when and where it's needed.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.