virtual

Results 251 - 275 of 3034Sort Results By: Published Date | Title | Company Name
By: PHD Virtual     Published Date: Jul 09, 2013
Citrix XenServer Backup & Replication
Tags : phd virtual, citrix xenserver, phd virtual, virtualized footprint, virtual backup appliance, security
     PHD Virtual
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
     CA Technologies
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
     Oracle APAC
By: Oracle APAC     Published Date: May 24, 2018
By optimizing their on-premises IT environments and moving processes and workloads to the cloud, businesses can reduce time-to-market, increase agility, and minimize total cost of ownership. Oracle’s Linux and Virtualization offerings are designed to help you easily optimize your current on-premises environment, and offer a clear path to cloud—so you can migrate your workloads when the time is right.
Tags : 
     Oracle APAC
By: Oracle APAC     Published Date: May 24, 2018
Enterprises are rapidly embracing cloud services to speed innovation and drive cost savings. The most innovative IT organizations in these enterprises are shifting to software-defined “virtual data centers” that connect, aggregate, and configure public and private computing resources in unprecedented ways. These IT organizations use open private cloud infrastructure within a corporate data center or at a hosting site (managed cloud services) in conjunction with public cloud services to meet all their business requirements.
Tags : 
     Oracle APAC
By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : cloud security, cloud management, it protection, api integration, credential verification, security efficiency
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
     CA Technologies
By: Arkadin     Published Date: Nov 20, 2018
Are you considering cloud-based video conferencing? Organizations today are seeking simple HD video conferencing solutions with a seamless and consistent user experience across devices. Preparation is key in realizing the benefits of cloud-based video conferencing, so we've put together a list of the most important items to consider to help get you started.
Tags : virtual, cloud, cloud-based, video, hd video, conferencing, preparation, solutions
     Arkadin
By: Silver Peak     Published Date: Apr 12, 2016
This white paper illustrates how the integration of zero touch provisioning with EdgeConnect profiles, and the further integration of local profiles into the global business intent of Silver Peak’s virtual overlays, fulfills the promise of SD-WAN with virtualised wide area networking.
Tags : security, integration, wan, software defined wan, edgeconnect, virtualisation, networking, network architecture, network management, network performance, application integration
     Silver Peak
By: Juniper Networks     Published Date: Oct 25, 2017
eBay Classifieds supports multiple internal clients and all of their requirements in more than 1,000 cities around the world. The company adopts cloud and virtualization services to get to market faster with new features, services, and campaigns using Juniper Networks Contrail Networking, Contrail Cloud Platform and QFX5100 Switch.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper Networks
By: IBM APAC     Published Date: Apr 26, 2017
Find out how you can take advantage of hybrid cloud by extending or migrating workloads using secure and seamless networking capabilities offered by VMware. All of this is available on secure, single-tenant IBM Bluemix bare metal servers on IBM Cloud, giving you the utmost control.
Tags : virtualisation, cloud, vmware, ibm, ibm cloud, hybrid cloud, secure environment
     IBM APAC
By: Red Hat     Published Date: Jun 18, 2012
Join Red Hat's CIO Lee Congdon for a c-level discussion of the key considerations and benefits of building an Open Cloud Architecture.
Tags : red hat, on-demand webinar, private cloud, virtualized server, cloud computing, virtualization, networking
     Red Hat
By: Citrix Systems     Published Date: Feb 23, 2011
By using Citrix ReceiverT, organisations are able to deliver virtualized applications and desktops to their employees' mobile devices.
Tags : citrix systems australia, customer profile, apple ipad, citrix receiver, employee productivity, mobile devices, virtual desktop, mobile computing, mobile data systems, mobile workers, productivity, desktop management
     Citrix Systems
By: VMware     Published Date: May 20, 2011
Discover how visionary business leaders are using Windows 7 migration strategies to build a virtualized desktop architecture that will deliver long-term strategic business advantage.
Tags : vmware, windows 7, migration, windows xp, business dividends, windows, windows server
     VMware
By: VMware     Published Date: May 20, 2011
This paper sets out the issues and explores the options - while providing a clear business case for moving forward with a virtualized desktop environment.
Tags : vmware, windows 7, migration, windows xp, virtualized desktop environment, microsoft, operating system, virtualization, windows, windows server
     VMware
By: VMware     Published Date: May 20, 2011
The report highlights the key considerations associated with simplifying application deployments through application virtualization and automating desktop provisioning and management through desktop virtualization.
Tags : vmware, desktop virtualization, operating system, migration, forrester consulting, automation, business process automation
     VMware
By: VMware     Published Date: Aug 17, 2011
This video webcast provides an overview of virtualization solutions from VMware® and explains the technology and products that enable these solutions.
Tags : vmware, vm ware, virtualization, virtual machine, virtual server, virtual pc, virtualization, gyro, storage virtualization
     VMware
By: VMware     Published Date: Aug 17, 2011
View this webcast to learn more about the benefits of server virtualization extend far beyond infrastructure savings and server consolidation.
Tags : vmware, vm ware, virtualization, virtual machine, virtual server, virtual pc, virtualization, downtime, storage
     VMware
By: VMware     Published Date: Aug 25, 2011
Download this white paper to learn more about how virtualization can keep your business running through many types of planned and unplanned IT outages
Tags : vmware, vm ware, virtualization, virtual machine, virtual server, virtual pc, virtualization, gyro, storage virtualization
     VMware
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.