Virtualization Security Research
-
Alternatives for Securing Virtual Environments: A Different Network Requires a Different Approach -- Extending Security to the Virtual World
Sponsored by: Juniper Networks, Inc.Virtual networks create a number of new security issues that physical defense strategies do not properly address. This white paper discusses the limitations of physical firewalls and highlights a security architecture designed with virtualization in mind.
-
Virtual Data Center E-Zine: Volume 39: Managing Virtualization Patches
Sponsored by: TechTarget Data CenterKeeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming.
-
Integrating private, public, and hybrid clouds with one platform
Sponsored by: HPE and Intel®When it comes to the use of cloud services, business today is actually outpacing IT. However, with users clamoring for greater cloud access IT operations managers can no longer avoid addressing private cloud issues and developing a strategic course of action.
-
Windows Application and Server Backup 2.0: Chapter 8- Other Backup Concerns and Capabilities
Sponsored by: Dell AppAssure Backup, Replication and Recovery SoftwareLearn about disaster recovery, data retention for compliance and integrating your existing backups with virtualized server backups in the eighth chapter of this e-book.
-
Combining Virtual Server Backup Methods for a Complete Strategy
Sponsored by: TechTarget StorageDiscover the benefits of virtual server backup vs. traditional data backup methods and learn how you can combine the two approaches for a complete (and free) VM backup strategy.
-
May Technical Guide on PCI DSS Guidance
Sponsored by: TechTarget SecurityThis technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
-
Five Best Practices to Protect Your Virtual Environment
Sponsored by: Juniper Networks, Inc.Discover how you can realize the benefits of virtualization without sacrificing security in this whitepaper that outlines five best practices to utilize to protect your virtual environment.
-
Cloud Management: Overcoming today’s Top Risks
Sponsored by: TechTarget SecurityUnder a cloud paradigm, as services become more concentrated, risks follow suit, so it is important to understand and account for these changes and adjust security programs accordingly. View this e-guide to explore the top security risks in cloud computing today and how to overcome them.
-
Three Steps to PCI Compliance in the Cloud
Sponsored by: TechTarget SecurityPCI virtualization compliance is extremely challenging, requiring organizations to not only revalidate service providers, but face ongoing operational problems that that can arise during compliance audits. In this e-guide uncover three steps you can implement to ensure the environment stays compliant over a long-term deployment.
-
Backup & Recovery for VMware Environments with Avamar 6.0
Sponsored by: EMC CorporationThis white paper highlights several new features within EMC® Avamar® 6.0 that specifically target and greatly advance the capabilities and performance of VMware® data protection.
-
Overcoming virtualization security risks: Best practices
Sponsored by: KasperskyRead this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
-
Top 5 VM Backup Mistakes
Sponsored by: DLT SolutionsThis tip guide is your key to overcoming today's top VM backup mistakes. Read on to learn more.
-
Tackling File Server Sprawl: File Virt Software vs. Scalable NAS
Sponsored by: Sanbolic Inc.Check out this E-Guide today to learn how you can overcome file server sprawl in today's data-driven IT.
-
A Pragmatic Approach to Network Security for Virtualized Computing Environments
Sponsored by: Palo Alto NetworksOrganizations often struggle when it comes to virtualization technologies, especially in providing adequate network security for modern computing environments. In this paper, explore the common challenges organizations face today and uncover a framework and best practices that organizations can use to address them.
-
Backup and Recovery for Enterprise Applications in VMWare Environments
Sponsored by: EMC CorporationThis ESG white paper is your key to improving backup operations in your virtual environment. Read on to learn more.
-
Virtual Server Backup Essential Guide
Sponsored by: TechTarget StorageCheck out this expert E-Guide to discover what you can do to start improving VM backup and restore operations today.
-
EMC Backup and Recovery for VMWare
Sponsored by: EMC CorporationCheck out this white paper to make sure you're getting the most bang for your buck when it comes to VM backup, data protection and DR for virtual environments.
-
Eguide: Healthcare Center Improves the well-being of their Data Protection
Sponsored by: SyncsortCheck out this brief case study to learn how one community health center was able to greatly improve backup, DR and storage operations.
-
Computer Weekly - 3 April 2012: Data security best practice
Sponsored by: TechTarget ComputerWeekly.comThis week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.
-
NexGen n5 Storage System
Sponsored by: NexGen StorageCheck out this ESG Report for a hands-on introduction to a hybrid solid-state storage solution designed to deliver fast performance for mixed-application workloads in both consolidated and virtual server environments. Read on to learn about the features of this technology, and to discover how it stacked up against ESG's lab testing.
-
vSphere 5: Friend or Foe of Storage?
Sponsored by: TechTarget StorageCheck out this E-Guide to discover the features associated with vSphere 5, and specifically discover two functions designed to help you get a better handle on resource utilization in the face of today's data massive growth. Read on to learn more.
-
Virtual storage appliances: On the verge of something big?
Sponsored by: TechTarget StorageIn this E-Guide you'll receive an introduction to software-only storage, a VM-based shared storage solution that can help you significantly cut down on costs and management headaches. Learn how this technology functions, discover the impact that software-only storage has on other data center processes and more.
-
Backing up VMs: Traditional apps vs Virtual Machine backup software
Sponsored by: Quantum CorporationCheck out this SearchVirtualStorage.com E-Guide for best practices regarding VM backup. Learn about different backup and data protection solutions designed to handle today's demanding workloads, and discover how you can start getting more out of your virtual environment. Read on to learn more.
-
Webcast Transcript: 7 Questions You Must Ask Before Buying a VM Protection Product
Sponsored by: Quantum CorporationCheck out this presentation transcript for 7 key questions to ask yourself before buying a VM protection product. These questions will not only help you ensure you’re buying a product that works, but buying a product that will optimise your virtual data protection without requiring you to redesign your data centre.
-
E-Guide: How SMBs can reap the benefits of virtualization
Sponsored by: NComputingAccess this E-Guide for an in-depth look at factors that influence the successful outcome of any virtualization project, including considerations for security measures and pilot programs.