RecruitingBlogscom

Follow Us:

 

virtual security

Results 276 - 300 of 306Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Oct 28, 2013
Eliminate high costs associated with MPLS and BGP with a new approach. This short video will show how secure and resilient connectivity between global sites is possible while increasing network bandwidth and quality of service.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2013
View this demonstration to see how masses of security devices in complex and geographically diverse organizations can be operated from one single point of operations in a way that is cheaper, easier, faster, and safer.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: Intel     Published Date: Aug 10, 2012
Intelligent Desktop Virtualization (IDV) combines the best end point security with no compromises in user experience, productivity, cost, or flexibility.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Because of the outstanding economy, flexibility, and service levels it offers, virtualization is transforming data centers at breakneck speed: by 2016, an estimated 80 percent of the world's x86 servers will be Virtual Machines (VMs). But the speed of this transformation, along with the high resource utilization, ease of cloning, moving workloads, and other ways virtualization works its magic, raise challenges for “traditional” IT services and the teams that deliver them.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Sponsored by HP and Intel®     Published Date: Nov 14, 2012
In the race to become top dog in the IT industry, IT pros remain unsure of what cloud computing s and the benefits it can bring to their organization.
Tags : 
cloud computing, cloud strategy, it infrastructure, virtualization, public cloud, cloud security, storage, business technology
    
Sponsored by HP and Intel®
Published By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : 
authentication, byod, mobile workforce, it security, key management
    
SafeNet
Published By: HP and Intel ®     Published Date: May 06, 2013
With the gaining popularity of virtualization in today’s enterprise data centers, you need a virtual security solution that allows you to confidently adopt virtualization throughout your data center without compromising on your existing security postures.
Tags : 
virtualization, security, enterprise, data center, virtual security
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
The workplace is changing rapidly to accommodate mobile and flexible work styles, as employees expect the same computing experience when working remotely as they get in the office. And those expectations are rising rapidly among all employees — not just in the executive hallways or engineering labs. To discover more about mobile work styles and client virtualization trends in today’s enterprises, Citrix Systems and HP commissioned Forrester Consulting to survey IT decision-makers in North America, Europe, and Asia for this Technology Adoption Profile (TAP). Coupled with Forrester’s existing Forrsights data, we found that IT is turning to client virtualization to manage the growing complexity that BYOD programs and mobility initiatives have created and is embracing end-to-end solutions to overcome the toughest client virtualization challenges concerning cost, performance, scalability, and security.
Tags : 
mobile, virtualization, mobile workforce, remote employees, business technology
    
HP and Intel ®
Published By: Cisco     Published Date: May 14, 2013
Not long ago, if you asked an IT executive about transformation, there was a good chance you’d get a technology-centric response. You’d hear about consolidation and virtualization, power and cooling, security and availability. Today, the responses are different. This edition of Unleashing IT is all about transformation. Not technology change, but business change through the use of technology.
Tags : 
innovation, change management, cost reduction, cloud, virtualization
    
Cisco
Published By: IBM     Published Date: Jan 09, 2014
IBM’s SmartCloud VDI solution leverages the IBM PureFlex and Flex System portfolio, Cloud and Smarter Infrastructure products and the company’s design/deploy services to deliver reliable, powerful and secure managed desktop infrastructures.
Tags : 
smartcloud vdi, ibm smartcloud, vdi solution, v7000 storage, desktop infrastructures, virtual desktop, storwize v7000, vmware view
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware
    
Cisco
Published By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
aberddeen, data center, datacenter, cloud, server security, networking, data management
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : 
server security, virtual server security, cloud server security, data center server security, security, data management
    
Intel Security
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Procesador Intel® Xeon® Intel Inside®. Produtividade poderosa no exterior. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Dell EMC PowerEdge servers with Intel® Xeon® Intel® Platinum processors deliver faster, more reliable performance for virtualization, converged IT, hybrid cloud and big data. Get enhanced automation, scalability and security by upgrading to the new generation of PowerEdge servers. Flexible financing options available through Dell Financial Services. Intel Inside®. New Possibilities Outside Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: IBM     Published Date: Mar 30, 2017
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as extract, transfer and load (ETL), data replication or data virtualization.
Tags : 
data integration, data security, data optimization, data virtualization, database security
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: Juniper Networks     Published Date: Aug 10, 2017
A Scalable Data Center Network for the Data Tsunami Digital Transformation and other changes drive vast and innumerable new data flows through the business, and increase pressure on IT to continually, quickly, and efficiently address a broad array of new demands. IT needs a network that empowers the business but is too often hampered by it instead. Network management as most practice it now is too complex and inefficient. The solution is automation.
Tags : 
digital transformation, virtual infrastructure, network, data, automation, security, nemertes
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top