RecruitingBlogscom

Follow Us:

 

virtual security

Results 26 - 50 of 304Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Due to a multiplicity of users, threats and data, security has become a huge endeavor. The logical approach to solving this problem is the creation of a virtual infrastructure that can accommodate the requirements of a robust network environment, but greatly reduce the need for hardware. This white paper from BlueCoat explains the components that together make a virtualized, consolidated security infrastructure practical.
Tags : 
security, data, users, infrastructure, bluecoat
    
Blue Coat Systems
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
    
CA Technologies
Published By: Juniper Networks     Published Date: Oct 20, 2015
With nearly every organization implementing some degree of cloud computing, virtualization security is as integral a component as traditional firewalls are in today’s networks.
Tags : 
juniper, network, virtualization, data center, virtual security, firewall, networking, security, knowledge management, data management, business technology
    
Juniper Networks
Published By: Intel Security     Published Date: May 15, 2015
Your physical and virtualized server instances will be vulnerable to any new security threats. Download this how-to guide and start preparing for Windows Server 2003 end of support.
Tags : 
windows server 2003 eos, vulnerability to security threats, windows end of support, security, business technology
    
Intel Security
Published By: Savvis UK Limited     Published Date: May 14, 2013
Savvis has been hosting eCommerce platforms for nearly two decades. Internet retailers including easyJet and Hallmark Digital trust us to power their online success. Savvis offers a comprehensive portfolio of infrastructure, network and application management across the eCommerce ecosystem. No matter what you sell or where you are along the eCommerce journey, we can support your commercial goals with the speed of implementation, accessibility, security and affordability of a retail-ready cloud environment, with our Virtual Private Data Centre. Combined with our global data centre footprint and network options ranging from Tier1 public IP access to private, low-latency connectivity, the VPDC offers a resilient, made-to-measure solution for any eCommerce application.
Tags : 
virtual, private, data centre, it foundation, ecommerce, platforms, internet retailers, online, virtual private data centre, security, affordability
    
Savvis UK Limited
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. Intel otwiera nowe mozliwosci. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. New Possibilities Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeonultrabook, celeron, celeron inside
    
Dell and VMWare
Published By: Dell and VMWare     Published Date: Dec 15, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
Dell and VMWare
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: Juniper Networks     Published Date: Oct 28, 2014
To understand why an open, scalable network architecture is essential for enhanced IT security in the cloud era, get our eBook. Read how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
cloud, data protection, security, security breaches, safe virtual environment, risk, network security
    
Juniper Networks
Published By: VMware     Published Date: Jul 01, 2016
Higher education is in the midst of fundamental changes that are reshaping the future of both the mission and the business. As technology helps campuses better reach beyond their traditional physical borders, decision-makers expect IT to offer the solutions and leadership needed to deliver better services to students, staff, and researchers while simplifying IT costs and responsibilities. This solution brief addresses how vCloud Air built on the popular vSphere virtualization platform, is helping higher education IT respond to today’s performance, manageability, and security challenges.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
    
VMware
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Gigamon     Published Date: Feb 20, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Hyperconverged Infrastructure eBook Guide for the Enterprise Abstract. Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Feb 01, 2019
Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. What if your IT teams can take workloads off the traditional IT infrastructure and migrate it to a purpose-built solution that integrates compute, memory, storage, and virtualization? This is what Hyperconverged Infrastructure is all about. HCI appliances deliver extreme reliability, dependable security, extensive and predictable scalability, simplified management, and faster time-to-value. Download this premium guide to understand how HCI can • Provide the resilience, scalability and performance to
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Gigamon     Published Date: Dec 13, 2018
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top