virtual security

Results 226 - 250 of 304Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention, malware, cyberattack
    
Kaspersky
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis
    
Cisco
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Oct 14, 2014
Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these potentially costly mistakes. Read the executive brief to learn how IBM can help protect your organization from cyber threats and strengthen your IT security.
Tags : 
it security breach, csirp, cyber threats
    
IBM
Published By: Trend Micro     Published Date: Oct 12, 2012
This special report, commissioned by Trend Micro, reinforces the security and operational cost savings of host-based virtual patching with the Deep Security and OfficeScan products
Tags : 
infomation security, software costs, trend micro
    
Trend Micro
Published By: Trend Micro     Published Date: Oct 12, 2012
The security software you choose for virtual environments will have a significant impact on your organization's return on investment.
Tags : 
information technology, security, software, trend micro
    
Trend Micro
Published By: Trend Micro     Published Date: Oct 12, 2012
Download this free white paper to learn exactly what you need to avoid any trouble without sacrificing innovation or impeding the progress of your business today and in the future.
Tags : 
cloud computing, information security, information technology, trend micro
    
Trend Micro
Published By: Hosting.com     Published Date: Jan 21, 2011
This white paper demonstrates how companies that have moved their SQL databases to the cloud have overcome past performance and security concerns to increase operational efficiency, improve availability and scalability, reduce costs, gain a faster-time to-market, and achieve a better return on investment.
Tags : 
hosting.com, sql database, cloud computing, virtualization, data-intensive application, performance, security
    
Hosting.com
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Nov 15, 2013
Learn how to calculate the TCO of your virtualization protection solution and find out whether a virtualization-specific solution is the right fit for your organization instead of a unified solution.
Tags : 
tco, parallel backup solution, virtual environemtns, security, protection, symatnec
    
Symantec
Published By: Symantec     Published Date: Jan 02, 2014
Learn 8 reasons why you should only use a single backup and recovery solution for all your servers and see how you can avoid high costs and negative consequences.
Tags : 
backup solution, virtual machines, innovation, security, best practices
    
Symantec
Published By: Citrix     Published Date: Apr 16, 2014
Learn how NetScaler has kept pace with industry changes and is winning the hearts and minds of IT leaders.
Tags : 
data center, adc, cloud computing, virtualization, netscaler, citrix, racks, blades, lan, security
    
Citrix
Published By: Citrix     Published Date: Oct 15, 2013
Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.
Tags : 
citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
    
Citrix
Published By: Symantec     Published Date: Jul 15, 2014
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, cloud computing and virtualization have arrived on the scene, bringing both significant benefits and new challenges. Find out more about this transition to get the most out of your virtual environment.
Tags : 
secure back up, servers, data, network infrastructure, cloud computing, virtualization
    
Symantec
Published By: Kaspersky     Published Date: May 11, 2016
This whitepaper describes the different virtualization security solution options—conventional agent-based; agentless; and Light Agent— as well as possible scenarios for aligning the right security approach to your organization’s virtual environment.
Tags : 
kaspersky, virtualization security, security management, light agent
    
Kaspersky
Published By: Kaspersky     Published Date: Jul 22, 2016
Learn how you can maximize the performance and security of your virtualized machines.
Tags : 
kaspersky, virtual security, virtual environment, data breach, data protection
    
Kaspersky
Published By: Riverbed     Published Date: Jul 15, 2014
Virtual desktop infrastructure (VDI) offers organizations the means to centrally manage and deliver desktops as a service to reduce costs, increase data security, and streamline desktop management while enabling anytime, anywhere access across a wide variety of devices. IT consumerization trends such as BYOD (bring your own device) and device diversity are accelerating VDI adoption, which is expected to double over the next year.
Tags : 
troubleshooting, virtual desktop, infrastructure, vdi, deployments, manage it, byod
    
Riverbed
Published By: Riverbed     Published Date: Aug 22, 2014
As organizations seek to continue leveraging the advantages of virtualization technologies, many are embracing virtualization of end user desktops via approaches such as Virtual Desktop Infrastructure (VDI). But while VDI solutions promise significant security and operational efficiency improvements, they also bring with them unique deployment challenges.
Tags : 
optimizing, vdi, network factor, virtualization technologies, virtual desktop infrastructure, security, operational efficiency, improvements
    
Riverbed
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management, security management, secure remote access, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Are you evaluating remote access solutions? Look at vendors with mature technology, a vision for the future of remote access, and a proven track record. Hear what Gartner, considered the leading analyst firm covering the SSL VPN industry, has to say about it.
Tags : 
ssl, vpn, analyst report, gartner group, gartner, virtual private network, remote access, ssl vpn, aventail, network security
    
Aventail
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca
    
Quocirca
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications
    
Cenzic
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.