ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virtualization Security Research

  • VDI Hardware Evaluation Checklist

    Sponsored by: Pure Storage

    Organizations considering VDI must exercise caution when choosing the hardware on which to run their platform. From this e-guide, learn how to choose the right VDI hardware for your deployment. Read on to access a five-point checklist for selection, and more.

  • Storage Showdown: All-flash vs. Hybrid Arrays for Virtual Desktop Environments

    Sponsored by: Pure Storage

    Download this guide as Tom Fenton, Senior Validation Engineer at the Taneja Group, illustrates several critical factors to consider when deciding to use an all-flash or hybrid array in your virtual desktop environments. Here, you'll evaluate hybrid vs. all-flash on cost, ability access to cold data, compression and deduplication, and more.

  • Which Types of Flash Make the Most Sense for Virtualization?

    Sponsored by: Pure Storage

    Which types of flash make the most sense for a virtualized environment? In this expert guide, George Crump evaluates the durability of three types of flash—single-level, multi-level, and triple-level cell. Read on to also delve into three flash form factors to consider when implementing it on virtual workloads.

  • Ten Methods of Improving Virtual Server Storage

    Sponsored by: Pure Storage

    Performance monitoring for virtual storage is very difficult due to the hypervisor lacking the insight into what's happening with that storage. This expert guide illustrates how to improve the performance of your virtual server storage with 10 proven methods.

  • How to pick between VDI vs. DaaS for desktop virtualization

    Sponsored by: VMware

    VDI and desktop as service (DaaS) each have their own place when it comes to desktop virtualization - depending on the use case. Compare both methods in terms of five central categories: management, control, security, performance and cost.

  • Virtual Server Bottlenecks Among Most Troubling Data Storage Problems

    Sponsored by: Lenovo

    Whether physical servers or VMs, there are any number of places where data can be held up. Download this e-guide to learn how to troubleshoot server bottlenecks created by running multiple VMs, and solve NAS and software-defined storage performance problems.

  • Compare virtual apps vs. virtual desktop deployment

    Sponsored by: VMware

    Virtualization: what's the best way to get it done? For some, the answer is virtual apps, for others it's desktop virtualization, and for others still it's a hybrid of the two. Continue reading this eGuide to learn what your best option might be for you.

  • Compare desktop virtualization options: VDI vs. DaaS

    Sponsored by: VMware

    The workforce today is tired of being chained to their desk, and is ready to move out into the world with mobile access. Continue reading this article for information on both VDI and Desktop-as-a-Service (DaaS) to learn which option may be the best for your organization based on security, control, cloud usage, and more.

  • Abandoning the Narrative of Containers vs. Hypervisors and VMs

    Sponsored by: Red Hat

    IT pros often pit hypervisors against containers—but is the debate really that simple? In this expert-guide learn about the current state of these technologies, and why the 2 systems are far more productive when synchronized. Read on to see why containers currently out-perform hypervisors, how VMs are quickly closing that gap, and much more.

  • A Hybrid IT Approach to Virtualization & DevOps Management

    Sponsored by: Red Hat

    Here, experts illustrate the evolution of multi-use virtualization tools, and you'll discover how to benefit from a hybrid approach that combines physical, virtual, and application visibility with automation and deep infrastructure analysis. Read on to also learn how DevOps is reshaping IT vendors' offerings.

  • Cloud Data Protection for VMware Environments

    Sponsored by: Druva

    Learn how you can achieve one-click simplicity for your VMware environment with seamless backup, archival, & DR using the cloud.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • Why VDI is Perfect for Managing Remote Employees

    Sponsored by: Citrix

    Although it's become increasingly common for organizations to allow employees to work from home, this presents a number of challenges, challenges that VDI can solve effectively. Learn the benefits VDI can have for managing remote employees, including enhanced security, simplified license management, and more.

  • Malware Analysis: How Some Strains 'Adapt' to Virtual Machines

    Sponsored by: Kaspersky

    Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.

  • Blended IT and Security Operations: Where's the Balance?

    Sponsored by: ServiceNow

    Within this informative e-guide, you'll learn the benefits – and the risks – of integrating IT and security operations. Discover how you can leverage information collected from multiple data sources to get an accurate picture about the issues affecting both security and performance.

  • Cloud Access Security Brokers Fill Critical Enterprise Void

    Sponsored by: Palerra Inc.

    In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.

  • Microsegmentation Strategies for Smarter Security

    Sponsored by: VMware

    In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.

  • What to Know: Licensing in a Virtualized World

    Sponsored by: TechTarget IT Operations

    With more businesses shifting to a virtualized environment, understanding VM licensing, Oracle virtualization licensing and VMware licensing cost is a must for admins.

  • Tips to Secure your Virtualized Data Center

    Sponsored by: TechData - Kaspersky

    This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.

  • Layered Security Doesn't Stop Cybercriminals – but VDI Might

    Sponsored by: Dell, Microsoft and Citrix

    This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.

  • ComputerWeekly: Why a Private Cloud Was Chosen for the Thames Tunnel Project

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of ComputerWeekly, we examine why one of the UK's largest construction projects—the Thames Tideway Tunnel—decided to use a private cloud setup. Our latest buyer's guide looks at containers and microservices, and we report on what U.S. court documents tell us about Oracle's controversial licensing polices.

  • Secure Your Internal Corporate Networks With ABAC

    Sponsored by: Cryptzone

    In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.

  • Computer Weekly – 20 October 2015: IT Giants Dell and EMC Unite

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now.

  • Storage Redefined

    Sponsored by: TechTarget IT Operations

    Software-defined storage joins the virtualization discussion, and it could play a key role in future-proofing an infrastructure.

  • Computer Weekly – 14 April 2015: Taking stock of e-commerce systems

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.