Data Center Security OperationalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Center Security Operational returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Virtualization
 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Enterprise Systems Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Calendar Data Center
 •   Cost Data Center
 •   Data Center Document
 •   Data Center Security Packages
 •   Data Center Security Planning
 •   Data Managing
 •   Example Data Center
 •   Impacts Of Data
 •   Manufacturer Data Center
 •   Requirements Data Center
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Optimizing Storage For VDI Deployments by FalconStor Software

October 22, 2010 - (Free Research)
Virtual Desktop Infrastructure is poised to provide a new management and deployment model for end-user computing by centralizing the physical desktops to virtualized desktop farms in the data center. The resulting environment offers increased manageability, enhanced security and data protection. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

A Breakthrough Approach for Efficient IT Service Delivery by IBM

June 2008 - (Free Research)
Organizations in every industry are exploiting advanced technologies to gain a competitive advantage. In this whitepaper learn about IBM's vision for the new enterprise data center which offers an evolutionary new model for efficient IT delivery. 
(WHITE PAPER)

How-to Build High Performance Security for the Software-Defined Data Center by Trend Micro

April 2014 - (Free Research)
This crucial webcast discusses how your organization can build a high-performance security strategy for the virtualized data center, outlining what kind of solutions to look for, what common challenges you might run into, and how to get the most from your virtualized environments. 
(WEBCAST) READ ABSTRACT |

Fortinet's Data Center Solution: Security From the Edge to the Core by Fortinet, Inc.

December 2013 - (Free Research)
This white paper highlights the features and benefits of a security platform that defends the network core and edge to better protect data centers from today's latest risk factors. 
(WHITE PAPER) READ ABSTRACT |

Maximizing Business Agility with the Dynamic Data Center by Egenera

October 2008 - (Free Research)
The first phase of virtualization - server consolidation- delivers lower costs, less crowded floor space, and a smaller carbon footprint. Leveraging virtualization. 
(WHITE PAPER) READ ABSTRACT |

Extending Private Infrastructure with Hybrid Cloud Computing by Skytap, Inc.

February 2012 - (Free Research)
The hybrid cloud computing model has particular appeal for businesses interested in moving between public and private cloud freely and securely. Join this informative 45 minute webcast sponsored by Skytap to learn how enterprise IT can quickly gain operational benefits from hybrid cloud computing. 
(WEBCAST) READ ABSTRACT |

Protecting the Dynamic Datacenter by Trend Micro

August 2009 - (Free Research)
Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

Cisco Training: June – December 2010 by Global Knowledge

July 2010 - (Free Research)
In this training guide you’ll learn: Routing and Switching, Unified Communications and Contact Center, Security, Data Center and Storage, Unified Wireless, Optical Networking, Service Providers and so much more. 
(TRAINING GUIDE) READ ABSTRACT |

Security - Three Necessary Security Measures to Empower Data Center Transformation by Cisco Systems, Inc.

July 2013 - (Free Research)
Access this informative white paper that presents three must-have security measures to empower data center transformation to virtualization and the cloud. 
(WHITE PAPER) READ ABSTRACT |

Introduction to Virtualization E-book, Chapter 6: How Virtual Infrastructures Change Security by SearchServerVirtualization

October 2009 - (Free Research)
Protecting the virtual data center doesn't need to be any more difficult than protecting a physical network. The key is to remain vigilant. In this chapter, you'll learn how to mitigate potential security risks to your resource pool and virtual machines without over-allocating administration. 
(EBOOK) READ ABSTRACT |

Welcome to Iron Mountain’s National Data Center by Iron Mountain

January 2014 - (Free Research)
This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy. 
(WEBCAST) READ ABSTRACT |

Mapping Security for your Virtual Environment by Hewlett-Packard Company

May 2012 - (Free Research)
Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management. 
(WHITE PAPER) READ ABSTRACT |

Unclutter Your Data Center With Consolidated Log Management by VMware, Inc.

June 2013 - (Free Research)
In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center. 
(WHITE PAPER) READ ABSTRACT |

Security Considerations for Cloud-Ready Data Centers by Juniper Networks, Inc.

September 2011 - (Free Research)
A network-centric approach to providing security in the data center delivers benefits such as scalability, unified security policy definition and enforcement, visibility into application traffic, and reduced operations overhead. 
(WHITE PAPER) READ ABSTRACT |

Three Must-Have Security Measures to Empower Data Centre Transformation by Cisco (E-mail this company)

July 2013 - (Free Research)
As more data centres take advantage of virtualisation and the cloud, the time is now for innovative security planning. 
(WHITE PAPER)

Palo Alto Networks in the Data Center: Eliminating Compromise by Palo Alto Networks

April 2012 - (Free Research)
<p>This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.</p> 
(WHITE PAPER) READ ABSTRACT |

TechTarget ANZ Securing Virtualised Data Centres E-Book by Trend Micro

August 2010 - (Free Research)
Virtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them. 
(EBOOK) READ ABSTRACT |

Protecting your Network and Data Center with Next-Gen Firewalls by Palo Alto Networks

April 2012 - (Free Research)
Learn how your organization can take advantage of next-generation firewalls. This resource provides clarity on this popular security solution so you can determine which features are right for your needs. 
(EGUIDE) READ ABSTRACT |

Software Defined Networking Goes Well Beyond the Data Center by Ixia

June 2013 - (Free Research)
Software-defined networking (SDN) applications are quickly moving beyond the data center network. In this expert e-guide from SearchSDN.com, learn what SDN applications mean for network administration, how they're impacting network security, and more. 
(EGUIDE) READ ABSTRACT |

Monitoring Physical Threats in the Modern Data Center by APC by Schneider Electric

April 2012 - (Free Research)
Learn how your organization can protect against data center physical threats that can elude traditional monitoring methods. This paper outlines these threats and suggests approaches to deploying monitoring devices and reducing downtime. 
(WHITE PAPER) READ ABSTRACT |

KineticD Security by KineticD

August 2010 - (Free Research)
The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering. 
(WHITE PAPER) READ ABSTRACT |

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

HyTrust, VMware, Intel® Cloud Builders Enhanced Cloud Security Guide by Intel

August 2011 - (Free Research)
This white paper describes the current threat landscape and recommends a reference architecture designed to minimise the risks of cloud computing. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Developing A Successful Proof-of-Concept for a Virtual Desktop Pilot by Forsythe

December 2009 - (Free Research)
Virtual desktops provide many consolidation opportunities, as well as some unique security and business continuity advantages. This transcript will give you an overview of desktop virtualization, highlight several virtual desktop solutions, and analyze the operational efficiency gains possible with desktop virtualization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Enhancing Security with Intel® Trusted Execution Technology by Dell, Inc. and Intel®

August 2013 - (Free Research)
This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more! 
(VIDEO) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts