Virtualization White Papers

Results 1 - 25 of 760Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: Jan 07, 2015

Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: HP     Published Date: Nov 05, 2014

The old model of IT involved deploying more of everything just to keep up with demands. However, IT departments that are able to deliver solutions for business needs and support business goals have moved beyond managing siloed systems. Adopting a more efficient model of IT service and systems is the key to freeing IT to improve business operations. Reaching that level of efficiency through “do-it-yourself” efforts requires an immense amount of time and expense up front. What if someone has already pre-engineered, pre-tested, and optimized a perfect solution for your IT needs? See the difference a converged system can make. Download this whitepaper now.

Tags : frost and sullivan, business value, it optimization, converged systems, it organization, virtualization, application availability, data center
    
By: HP     Published Date: Nov 05, 2014

One thing is clear: the old way of running IT just won’t work in the new business environment.Truth is, preparing your IT department (and your company) to be agile, cost-efficient, metrics-driven, and flexible will require a change in how you operate. To support new business processes, you would do well to turn to a converged system, like HP ConvergedSystem for Virtualization. In this paper, we look at the greatest challenges faced by IT departments, and how traditional configurations, processes, and organizations are poorly-equipped to handle today’s workplace. We discuss the benefits of converged systems that are engineered to handle virtualized workloads. Finally, we look at HP ConvergedSystem for Virtualization as a simple and effective way for businesses to optimize their data center infrastructure and processes to better meet business needs.

Tags : frost and sullivan, business value, it optimization, converged systems, it organization, virtualization, application availability, data center
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Avaya     Published Date: Jan 28, 2015

The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.

Tags : software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions, business management, data center design and management
    
By: Avaya     Published Date: Jan 23, 2015

This White Paper provides information on how mobile, cloud and UC make perfect business sense. When everyone works together, things get done. Decisions are made faster, actions are taken effectively, and results improve. That’s why tomorrow’s market leaders are acting now to harness the power of Unified Communications and Collaboration tools and unleash the potential of their business.

Tags : unified communications, managing uc, uc becoming more powerful and useful, mobile computing, mobile data systems, application integration, business integration, business intelligence
    
By: Avaya     Published Date: Jan 20, 2015

The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.

Tags : software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions, data management, business management
    
By: Samsung     Published Date: Dec 11, 2014

This White Paper explores how the proliferation of smartphones and tablets (the global installed base of smartphones alone is set to hit 3 billion devices by 2017) has led consumers to adopt new behaviours, and develop expectations around what experiences mobile computing can offer.

Tags : mobile computing, cloud computing, network performance, security management, mobile workers, smart phones, database security, content integration
    
By: Samsung     Published Date: Dec 11, 2014

This White Paper provides information on the evolution of computer tablets and how organisations appreciate the value of tough tablets designed to function in industrial settings and other non-office roles.

Tags : tablet computing devices, evolution of computer tablets, environmental demands of tablets, enterprise-grade tablets, application security, security management, mobile computing, mobile data systems
    
By: F5 Networks     Published Date: Dec 10, 2014

Virtualization caused a major cultural shift in IT. By enabling physical assets to be better utilized, IT teams realized that they could deliver systems to their customers in a more timely manner, thereby delivering better value. In this webinar you will learn what is NetOps and how is it different from DevOps.

Tags : f5 networks, devops, agile, netops, data center, virtualization, sdn, infrastructure
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage virtualization, database security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, database security, virtualization, data loss prevention
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 19, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, data protection, database security, virtualization
    
By: CA Technologies     Published Date: Nov 12, 2014

This white paper offers a detailed look at the solution’s architecture, and some of the key features that make it stand apart from the competition.

Tags : ca uim, infrastructure management solutions, infrastructure management, virtualization, cloud computing, infrastructure
    
By: CA Technologies     Published Date: Nov 12, 2014

This paper outlines the benefits of CA Unified Infrastructure Management and how it can have a positive impact on your business

Tags : complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, data management
    
By: CA Technologies     Published Date: Nov 12, 2014

This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.

Tags : complete it visualization, it operations visibility, application visibility, infrastructure management, uim, enterprise applications, data management, virtualization
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.