virtual

Results 2726 - 2750 of 3004Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download this brief to learn how to increase performance and cost savings with platform-aware security.
Tags : 
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download the ESG white paper to help you identify: -Why virtualization should scare you -Security you didn't know existed -How to be confident in the cloud
Tags : 
trend micro, information security, virtualization, cloud, internet content security, smart protection network, trend micro internet security, enterprise business security
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : 
trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security
    
Trend Micro Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Nov 12, 2009
Securing the Physical, Virtual, Cloud Continuum Virtualization and cloud computing are radically altering data center operations. In this webinar, Ted Ritter, Senior Research Analyst at Nemertes Research, and Harish Agastya, Director of Product Marketing at Trend Micro, discuss the rise of virtualization and cloud computing and the impact this is having on security best practices and next-generation security technologies.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
Trend Micro, Inc.
Published By: TrendMicro     Published Date: May 09, 2011
Download this paper to learn how the right endpoint security for virtual desktops will help your enterprise achieve cost and efficiency advantages from virtual desktops.
Tags : 
trendmicro, endpoint security, virtual desktop infrastructure, vdi
    
TrendMicro
Published By: TrendMicro     Published Date: May 09, 2011
This paper details the results of a benchmark test conducted between Trend Micro Deep Security, McAfee Total Protection for Endpoint and Symantec Endpoint Protection 11.0 in virtual environments.
Tags : 
trendmicro, anti-virus performance, vmware esx, virtual environments, mcafee total protection, symantec endpoint protection
    
TrendMicro
Published By: Tripwire     Published Date: Feb 25, 2008
Find out how to maintain the same level of stability and security across both virtual and physical environments, using the same software and approach.
Tags : 
virtual machine, virtual, virtualize, virtualized, virtualization, virtual server, configuration, configuration management
    
Tripwire
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: Tripwire     Published Date: Jul 25, 2008
Tripwire surveyed IT professionals to learn how virtualization is expanding and if security, change controls and compliance requirements are keeping pace. Read this white paper to learn more about the state of virtualization today and why most of the respondents agree that a dedicated configuration tool is needed and are in the process of evaluating or planning to acquire such a tool.
Tags : 
virtual, virtualization, tripwire, configuration, change managemement
    
Tripwire
Published By: Tripwire     Published Date: Dec 16, 2009
Read this white paper to find out the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.
Tags : 
tripwire, file integrity monitor, compliance, security, configuration assessment, configuration control, virtual and physical infrastructure
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing
    
Tripwire
Published By: Tripwire     Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics.
Tags : 
security, configuration, basics, security flaw, it assets, it infrastructure, security infrastructure, tripwire
    
Tripwire
Published By: ttec     Published Date: Jul 24, 2019
Artificial Intelligence (AI) has officially entered the (contact center) building. However, it’s not in the way most media reports predicted. Instead of replacing human associates, virtual associates are collaborating with them to work faster and more efficiently, and the hybrid duos are wowing customers worldwide.
Tags : 
    
ttec
Published By: Turbonomic     Published Date: Nov 27, 2018
Want to learn how to design and deploy infrastructure-as-a-service (IaaS) solutions in the cloud using Amazon Web Services? This ebook will take you through practical examples, design patterns, and tips to help you confidently build a working IaaS solution. Download to find out: The key components of the AWS public cloud platform How to launch your compute and storage resources on the AWS Virtual Private Cloud (VPC) platform How to add compute resources to your VPC with AWS Elastic Compute Cloud (EC2) The types of storage in AWS Elastic Block Storage (EBS) with cost, performance impact, and examples of operational tasks By the end of this ebook, you’ll master AWS core components and how to design for resiliency. You’ll even be able to launch and manage your cloud solution using either the AWS command-line interface or the AWS web console.
Tags : 
    
Turbonomic
Published By: Unitrends     Published Date: Dec 07, 2009
Backup, despite the breathless hyperbole of many in the industry, is simply a form of insurance. What's important about your backup strategy is getting your systems and data protected in the most effective and affordable manner possible. Speaking plainly - you must be careful that you are in control of your backup strategy rather than your backup strategy (and vendor) being in control of you.
Tags : 
unitrends, backup, data protection, data quality, server, replication, strategy, virtualization
    
Unitrends
Published By: Unitrends     Published Date: Mar 30, 2010
Clouds are all the rage right now. And the truth is that cloud-based computing can be a tremendous value. Cloud-based computing is not just an opportunity for a bunch of venture capitalists hanging out at Sand Hill Road, it's a wonderful chance for small and medium businesses to take a step toward aligning their information technology spend to increase their focus on revenue-generating opportunities.
Tags : 
unitrends, backup, data protection, data quality, server, replication, strategy, virtualization
    
Unitrends
Published By: Unitrends     Published Date: Dec 16, 2011
In this paper, we'll compare and contrast the advantages and disadvantages of various deduplication techniques.
Tags : 
deduplication, techniques, incremental, data, duplicate data, file-level, block-level, byte-level
    
Unitrends
Published By: Unitrends     Published Date: Aug 18, 2015
When it comes to data protection, what matters most? You want the freedom to choose the types of data, applications, and computing platforms you protect. You want to seal off that data from security threats. You need space to house that data—the right space now with room to grow. You want to support older solutions as you evolve your technology environment to modern strategies, at a pace that suits your business. And you need the ability to reach out for that data at a moment’s notice without overstressing your network. In short, you need it all.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server
    
Unitrends
Published By: Unitrends     Published Date: Aug 18, 2015
There are always a few "secrets" in any industry—and the backup and restore business has its share. Our secrets are widely known within the industry but are less well-known outside of it—for the obvious reason that none of these secrets helps the majority of the vendors in this space. In this white paper, we will reveal these secrets to you.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server
    
Unitrends
Published By: Unitrends     Published Date: Aug 18, 2015
The purpose of deduplication is to provide more storage, particularly backup storage, for less money, right? Then wouldn't it be ridiculous if deduplication vendors were demanding that their customers pay more per terabyte of storage? Or, if they were simply pushing the task of integrating, monitoring, and managing deduplication back onto their users? This white paper is to help you understand the various approaches to deduplication, the strengths and weaknesses of each, and to introduce a different approach to deduplication, Adaptive Deduplication.
Tags : 
unitrends, backups, backup software consolidated backup, backup software enterprise, program backup software, network appliance backup, continuous backup software, backup software server
    
Unitrends
Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. This Buyer’s Guide highlights the most robust and feature rich integrated backup appliances available on the market today. These backup appliances have many if not all of the features needed to protect both physical and virtual environments and will give you visibility into the new set of features that will define the next generation of integrated backup appliances.
Tags : 
unitrends, integrated backup appliance, backup, recovery, it management, business technology
    
Unitrends
Start   Previous    103 104 105 106 107 108 109 110 111 112 113 114 115 116 117    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.