Physical And SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Physical And Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Data Security
 •   Network Security
 •   Data Center Management
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Call Physical And Secure
 •   Faq Physical And
 •   Manuals Physical And Secure
 •   Network Physical
 •   Operations Physical
 •   Own Physical And Secure
 •   Physical And Secure Finds
 •   Physical And Secure Vendors
 •   Physical General
 •   Physical Improvements
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Securing the Physical, Virtual, Cloud Continuum by Juniper Networks, Inc and Plan B Technologies, Inc

July 26, 2010 - (Free Research)
Information security best practices remain largely the same as 15 years ago, based on a strong perimeter defense. However, virtualization and cloud computing are radically changing data center operations. Security and compliance controls need to extend across the physical, virtual, cloud continuum in order to adapt to this new infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Alternatives for Securing Virtual Networks by Juniper Networks, Inc.

March 28, 2011 - (Free Research)
In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks. 
(WHITE PAPER) READ ABSTRACT |

Securing Physical and Virtual IT Assets without Hardware, Firewalls or VLANs by Apani

November 2008 - (Free Research)
This white paper will examine the challenges of traditional security approaches and reveal the many advantages of software-based access management. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Securing Access to Resources in the Cloud:  What's Really Possible Today by FoxT

May 2010 - (Free Research)
This presentation transcript explores the cloud from both a business and technical perspective to show how organizations can benefit from cloud services while maintaining the control and auditing capabilities to remain secure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Monitoring Physical Threats in the Modern Data Center by APC by Schneider Electric

April 2012 - (Free Research)
Learn how your organization can protect against data center physical threats that can elude traditional monitoring methods. This paper outlines these threats and suggests approaches to deploying monitoring devices and reducing downtime. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Physical Security Awareness and Smartphone Security Policy by SearchSecurity.com

February 2012 - (Free Research)
In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee. 
(EGUIDE) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Effectively Securing Virtualized Data Centers by Apani

November 2008 - (Free Research)
This white paper will examine trends in server virtualization security and reveal the many compelling advantages of cross-platform VM isolation solutions. 
(WHITE PAPER) READ ABSTRACT |

From Secure Virtualization to Secure Private Cloud by VMware, Inc.

February 2012 - (Free Research)
The way in which enterprises provision and deliver security services must evolve in order to secure private cloud computing.  This paper explores the subject of security as enterprises move beyond virtualizing their data centers to build private cloud-computing infrastructures and outlines the foundational capabilities that are required. 
(WHITE PAPER) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

Security Virtual Jam Session: The Secured Enterprise by IBM

February 2008 - (Free Research)
Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders. 
(WEBCAST)

Designing Secure Multi-Tenancy into Virtualized Data Centers by Continental Resources

April 2010 - (Free Research)
Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture. 
(WHITE PAPER) READ ABSTRACT |

Structured Approach to Migrating Oracle Apps from a Physical to Virtual Environment by VCE (E-mail this company)

December 2013 - (Free Research)
This paper presents a structured approach to migrating Oracle apps from a physical to a virtual environment. Inside, discover why this approach meets many of the challenges presented by the virtualization of Oracle databases and applications, and learn how you can get started. 
(WHITE PAPER) READ ABSTRACT |

Alternatives for Securing Virtual Environments: A Different Network Requires a Different Approach -- Extending Security to the Virtual World by Juniper Networks, Inc.

March 2012 - (Free Research)
<p>Virtual networks create a number of new security issues that physical defense strategies do not properly address. This white paper discusses the limitations of physical firewalls and highlights a security architecture designed with virtualization in mind.</p> 
(WHITE PAPER) READ ABSTRACT |

Securing Virtualized Data Centers by Trend Micro, Inc.

December 2009 - (Free Research)
On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers. 
(EBOOK) READ ABSTRACT |

Enhancing Workplace Mobility and BYOD with the VMware Horizon Mobile Secure Workplace by VMware, Inc.

September 2013 - (Free Research)
This informative webcast examines how desktop virtualization is emerging as the go-to solution for these BYOD issues, and takes a look at a tool that can secure your mobile environment while streamlining management. 
(WEBCAST) READ ABSTRACT |

Laptop Locks: A Simple and Cost-Effective Approach to Data Loss Prevention by Kensington

October 2010 - (Free Research)
This paper will educate IT decision makers on the need for physical security, how it can protect sensitive data, and how Kensington laptop locks can help. 
(WHITE PAPER) READ ABSTRACT |

Desktop Management Made Easy with VMware Horizon View and Mirage by VMware, Inc.

February 2014 - (Free Research)
This webcast examines a tool that ensures mobile users can work productively from home or on the go, while also ensuring the corporate environment remains manageable and secure. 
(VIDEO) READ ABSTRACT |

MDS 9000 SAN-OS Software: The Virtual Machine Aware SAN by Cisco Systems, Inc.

October 2008 - (Free Research)
This document describes the innovative approach introduced by the Cisco MDS 9000 Family to support an end-to-end virtualized SAN environment that is flexible, secure, scalable, and mobile. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

eBook: Strategies for Securing Virtual Machines by Information Security Magazine

December 2008 - (Free Research)
Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines. 
(EBOOK) READ ABSTRACT |

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite by Centrify Corporation

March 2009 - (Free Research)
This paper gives an overview of the features and benefits of using the Centrify Suite to centralize and automate the management of ESX Server systems to strengthen security and streamline IT operations and management. It provides an overview of VMware administration and then addresses Centrify’s approach to securing administrators. 
(WHITE PAPER) READ ABSTRACT |

Securing the Virtual World by WatchGuard Technologies, Inc.

September 2012 - (Free Research)
With the growing need to reduce costs and improve efficiencies and availability of IT resources, organizations have increasingly turned to virtualization. But there are questions around the security within these environments. This paper explores the new security challenges of virtualization and how to overcome them with a layered security approach. 
(WHITE PAPER) READ ABSTRACT |

Enterprise level security, the Huddle way. by Huddle

December 2011 - (Free Research)
This paper will give you an overview of Huddle's secure infrastructure and policies. 
(WHITE PAPER) READ ABSTRACT |

Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection: An ROI Analysis of FalconStor Storage Management Solutions by FalconStor Software

October 2010 - (Free Research)
Data protection and disaster recovery continue to be overarching challenges for most firms. To remedy a myriad of problems with data protection as well as operational and disaster recovery, companies are replacing legacy backup methods with new approaches. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts