RecruitingBlogscom

Follow Us:

 

virtual security

Results 151 - 175 of 306Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications, virtualization, vulnerabilities, it spending, security spending, malware writers, cybercriminals, anti-malware, it environment, virus detection, software protection, security, it management
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Download the Kaspersky Lab security experts' Guide to the Threat Landscape to have access to a wealth of IT security intelligence.
Tags : 
kaspersky, kaspersky lab, malware, anti-virus industry, organizational security, mobility, byod, the cloud, virtualization, it administrators, it security, monitoring intrusions, phishing, cybercriminals, system malware, infrastructure, data management, mobile malware, social networks, unpatched application
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Download Kaspersky Lab’s Security for Virtualization: Getting the Balance Right to answer your most pressing questions.
Tags : 
kaspersky, virtualization, security, virtual environment, business protection, business transformations
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization? A new whitepaper from Kaspersky Lab, "Virtualization Security Options: Choose Wisely" will tell you.
Tags : 
kaspersky, virtualization, security, virtual environment, business protection, business transformations
    
Kaspersky Lab
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This webcast will cover the best practices & benefits of virtualization & consolidation strategies.
Tags : 
virtualization and consolidation, mainline information systems, server, storage virtualization, tco, roi, security
    
Mainline Information Systems
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives. Contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Red Hat     Published Date: Dec 15, 2017
Virtualization can vastly improve efficiency, free up resources, and cut costs-without sacrificing performance, security, and existing investments. This testimonials document lists 15 enterprise customers who are using Red Hat Virtualization and 4 of them share how it's helping their business and why they chose Red Hat.
Tags : 
    
Red Hat
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management, datacenter management, axeda, high availability, spend management, security
    
Axeda Corporation
Published By: GoToMeeting     Published Date: Jul 29, 2011
Watch this on-demand Webinar to hear Terrence Gargiulo, president of MakingStories.net, share stories of how companies use virtual collaboration technology to address these challenges and effectively manage projects.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This Wainhouse Research brief explores how web conferencing is transforming the way teams get work done.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: GoToMeeting     Published Date: Aug 02, 2011
This new SandHill Group white paper explores recent study findings to better understand the powerful advantages of SaaS technologies in addressing the training challenges of a global market, virtual teams and an ever-changing business climate.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
    
GoToMeeting
Published By: Savvis     Published Date: Jul 07, 2010
Savvis Symphony VPDC introduces one of the industry's first enterprise-grade Virtual Private Data Center (VPDC) solutions with multi-tiered security and service profiles.
Tags : 
savvis symphony, virtual private data center, vpdc, security, it infrastructure, outsourcing, cloud computing
    
Savvis
Published By: PC Mall     Published Date: Mar 27, 2012
This eGuide highlights how to harness the benefits of Virtual Desktop Infrastructure using a robust data center that is optimized for virtualization.
Tags : 
virtual, virtualization, infrastructure, foundation, backbone, data center, desktop infrastructure, cisco, eguide, vdi, applications, data, servers, data security, total cost of ownership, optimization, it management, knowledge management
    
PC Mall
Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security
    
Lumension
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
IT Managers: Reduce costs with enterprise ready environments. Take advantage of easy and flexible onboarding for business-ready virtual servers. Rapidly improve project set up and shorten development times. Find out how.
Tags : 
cloud computing, desktop virtualization, hardware, ibm corp., security
    
IBM Cloud Business
Published By: VMware     Published Date: Sep 13, 2011
Federal datacenters, which house an enormous wealth of legacy assets, are the primary targets for agencies evaluating different cloud computing approaches. When agencies begin their journey to the cloud with virtualization-an IT transformation starting point that preserves existing investments-they realize significant agility, cost and security benefits. Federal IT leaders are deploying VMware cloud infrastructure solutions to meet these new directives.
Tags : 
vsphere, vmware, storage, vsa, cluster service, technology, storage
    
VMware
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT processors fight sophisticated crimeware with built-in security technologies that work below and beyond the OS
Tags : 
it security, intel, monitoring, reporting, remediation, automatic monitoring, contagions, built-in-security, virtual realms, hardware-based security, intel ipt, software based convenience, anti-virus, security software, memory, network, display, disk, security, it management
    
Intel
Published By: SunGard     Published Date: Aug 13, 2012
A leader in performance management, marketing, and training, Frontline Focus required a new data solution to keep information flowing and secure. Any solution had to be resilient, highly available,completely scalable, and cost-effective.
Tags : 
cloud, scalable, cost-effective, sunguard, virtual, cloud, iaas, capital, expenditures, security, recoverability, storage, data management, business technology, data center
    
SunGard
Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management
    
CDW
Published By: Kaseya     Published Date: Apr 04, 2013
A complete and holistic solution can help organizations create system snapshots that can be restored quickly and efficiently, getting users back up and productive immediately.
Tags : 
disaster recovery, backup, business continuity, virtualization, security, rto, rpo, sla
    
Kaseya
Published By: SafeNet     Published Date: Jan 14, 2014
Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.
Tags : 
virtualization, cloud services, security, encryption, safenet
    
SafeNet
Published By: SafeNet     Published Date: Jan 14, 2014
Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure. What are the risks of this virtual security model and how can it go wrong? This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.
Tags : 
virtual private networks, virtual security, vpn, infrastructure, data, encryption, network, private network, virtual security, safenet, data protection
    
SafeNet
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top