Virtualization Security Research
-
VDI Hardware Evaluation Checklist
Sponsored by: Pure StorageOrganizations considering VDI must exercise caution when choosing the hardware on which to run their platform. From this e-guide, learn how to choose the right VDI hardware for your deployment. Read on to access a five-point checklist for selection, and more.
-
Storage Showdown: All-flash vs. Hybrid Arrays for Virtual Desktop Environments
Sponsored by: Pure StorageDownload this guide as Tom Fenton, Senior Validation Engineer at the Taneja Group, illustrates several critical factors to consider when deciding to use an all-flash or hybrid array in your virtual desktop environments. Here, you'll evaluate hybrid vs. all-flash on cost, ability access to cold data, compression and deduplication, and more.
-
Which Types of Flash Make the Most Sense for Virtualization?
Sponsored by: Pure StorageWhich types of flash make the most sense for a virtualized environment? In this expert guide, George Crump evaluates the durability of three types of flash—single-level, multi-level, and triple-level cell. Read on to also delve into three flash form factors to consider when implementing it on virtual workloads.
-
Ten Methods of Improving Virtual Server Storage
Sponsored by: Pure StoragePerformance monitoring for virtual storage is very difficult due to the hypervisor lacking the insight into what's happening with that storage. This expert guide illustrates how to improve the performance of your virtual server storage with 10 proven methods.
-
How to pick between VDI vs. DaaS for desktop virtualization
Sponsored by: VMwareVDI and desktop as service (DaaS) each have their own place when it comes to desktop virtualization - depending on the use case. Compare both methods in terms of five central categories: management, control, security, performance and cost.
-
Virtual Server Bottlenecks Among Most Troubling Data Storage Problems
Sponsored by: LenovoWhether physical servers or VMs, there are any number of places where data can be held up. Download this e-guide to learn how to troubleshoot server bottlenecks created by running multiple VMs, and solve NAS and software-defined storage performance problems.
-
Compare virtual apps vs. virtual desktop deployment
Sponsored by: VMwareVirtualization: what's the best way to get it done? For some, the answer is virtual apps, for others it's desktop virtualization, and for others still it's a hybrid of the two. Continue reading this eGuide to learn what your best option might be for you.
-
Compare desktop virtualization options: VDI vs. DaaS
Sponsored by: VMwareThe workforce today is tired of being chained to their desk, and is ready to move out into the world with mobile access. Continue reading this article for information on both VDI and Desktop-as-a-Service (DaaS) to learn which option may be the best for your organization based on security, control, cloud usage, and more.
-
Abandoning the Narrative of Containers vs. Hypervisors and VMs
Sponsored by: Red HatIT pros often pit hypervisors against containers—but is the debate really that simple? In this expert-guide learn about the current state of these technologies, and why the 2 systems are far more productive when synchronized. Read on to see why containers currently out-perform hypervisors, how VMs are quickly closing that gap, and much more.
-
A Hybrid IT Approach to Virtualization & DevOps Management
Sponsored by: Red HatHere, experts illustrate the evolution of multi-use virtualization tools, and you'll discover how to benefit from a hybrid approach that combines physical, virtual, and application visibility with automation and deep infrastructure analysis. Read on to also learn how DevOps is reshaping IT vendors' offerings.
-
Cloud Data Protection for VMware Environments
Sponsored by: DruvaLearn how you can achieve one-click simplicity for your VMware environment with seamless backup, archival, & DR using the cloud.
-
The SDN Charge and the New Role in Mobile Security
Sponsored by: Juniper Networks, Inc.Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.
-
Why VDI is Perfect for Managing Remote Employees
Sponsored by: CitrixAlthough it's become increasingly common for organizations to allow employees to work from home, this presents a number of challenges, challenges that VDI can solve effectively. Learn the benefits VDI can have for managing remote employees, including enhanced security, simplified license management, and more.
-
Malware Analysis: How Some Strains 'Adapt' to Virtual Machines
Sponsored by: KasperskyServer-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward.
-
Blended IT and Security Operations: Where's the Balance?
Sponsored by: ServiceNowWithin this informative e-guide, you'll learn the benefits – and the risks – of integrating IT and security operations. Discover how you can leverage information collected from multiple data sources to get an accurate picture about the issues affecting both security and performance.
-
Cloud Access Security Brokers Fill Critical Enterprise Void
Sponsored by: Palerra Inc.In this e-guide, expert Paul Korzeniowski explores the pros and cons of cloud access security brokers, their standing in the security field, and the challenges they face.
-
Microsegmentation Strategies for Smarter Security
Sponsored by: VMwareIn this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
-
What to Know: Licensing in a Virtualized World
Sponsored by: TechTarget IT OperationsWith more businesses shifting to a virtualized environment, understanding VM licensing, Oracle virtualization licensing and VMware licensing cost is a must for admins.
-
Tips to Secure your Virtualized Data Center
Sponsored by: TechData - KasperskyThis e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
-
Layered Security Doesn't Stop Cybercriminals – but VDI Might
Sponsored by: Dell, Microsoft and CitrixThis exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
-
ComputerWeekly: Why a Private Cloud Was Chosen for the Thames Tunnel Project
Sponsored by: TechTarget ComputerWeekly.comIn this issue of ComputerWeekly, we examine why one of the UK's largest construction projects—the Thames Tideway Tunnel—decided to use a private cloud setup. Our latest buyer's guide looks at containers and microservices, and we report on what U.S. court documents tell us about Oracle's controversial licensing polices.
-
Secure Your Internal Corporate Networks With ABAC
Sponsored by: CryptzoneIn this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
-
Computer Weekly – 20 October 2015: IT Giants Dell and EMC Unite
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now.
-
Storage Redefined
Sponsored by: TechTarget IT OperationsSoftware-defined storage joins the virtualization discussion, and it could play a key role in future-proofing an infrastructure.
-
Computer Weekly – 14 April 2015: Taking stock of e-commerce systems
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the first of our three-part buyer's guide to next generation e-commerce looks at managing inventory in multi-channel retailers. We highlight the six technology companies that are threats to the dominance of high-street banks. And we examine the top five issues in virtual machine backup. Read the issue now.