Virtualization White Papers

Results 1 - 25 of 809Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Feb 24, 2015

The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.

Tags : software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management, software testing
    
By: CDW     Published Date: Feb 24, 2015

Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.

Tags : software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
By: Workday     Published Date: Feb 23, 2015

Learn about five business trends that are driving cloud adoption in this free whitepaper.

Tags : hr in the cloud, saas adoption, saas, cloud, hr workforce, targeted talent strategies, hr technology, technology innovation
    
By: Docusign     Published Date: Feb 18, 2015

This White Paper reveals the benefits for High-Tech Companies of using eSignature technologies.

Tags : esignature technologies, mcafee, salesforce, linkedin, esignature solutions, authentication, identity management, return on investment
    
By: Docusign     Published Date: Feb 18, 2015

This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.

Tags : wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology, risks of putting data in the clouds, digital signature, application security
    
By: Lumesse     Published Date: Feb 13, 2015

This white paper from Lumesse reveals the 5 key predictions and workforce trends for the HR world ahead.

Tags : hr predictions, hr trends, recruitment methods, talent disruption, job 3.0, 2015 hr trends, virtualization
    
By: Lumesse     Published Date: Feb 12, 2015

This white paper from Lumesse reveals the 5 key predictions and workforce trends for the HR world ahead.

Tags : hr predictions, hr trends, recruitment methods, talent disruption, job 3.0, 2015 hr trends, virtualization
    
By: CA Technologies     Published Date: Feb 09, 2015

This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.

Tags : complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, data management
    
By: Avaya     Published Date: Feb 06, 2015

This White Paper provides information on how mobile, cloud and UC make perfect business sense. When everyone works together, things get done. Decisions are made faster, actions are taken effectively, and results improve. That’s why tomorrow’s market leaders are acting now to harness the power of Unified Communications and Collaboration tools and unleash the potential of their business.

Tags : unified communications, managing uc, uc becoming more powerful and useful, mobile computing, mobile data systems, application integration, business integration, business intelligence
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.

Tags : security, virtualization, security approaches, kaspersky, anti spam, anti spyware, anti virus, application security
    
By: Avaya     Published Date: Jan 28, 2015

The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.

Tags : software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions, business management, data center design and management
    
By: Avaya     Published Date: Jan 20, 2015

The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.

Tags : software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions, data management, business management
    
By: Kaspersky     Published Date: Jan 07, 2015

Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: CA Technologies     Published Date: Nov 12, 2014

This paper explains how CA Unified Infrastructure Management can have an important impact on your business.

Tags : complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, virtualization
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing
    
By: Aerohive     Published Date: Oct 15, 2014

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, cloud computing, virtualization
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, cloud computing, data center design and management
    
By: Aerohive     Published Date: Oct 15, 2014

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, wireless infrastructure, cloud computing
    
By: Workday     Published Date: Aug 27, 2014

The results are in. The majority of European IT departments are shifting to the cloud. And, of those still using on-premise solutions, 56% plan to move to the cloud in the next 12 months. In other words, if you're an IT professional using an outdated HCM system, the question isn't whether to switch to a cloud-based solution, it's when.

Tags : idg survey, the move to the cloud, it trends, european movement to the cloud, hcm system, mobile computing, wireless application software, cloud computing
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Tableau     Published Date: Mar 05, 2015

Learn the position of big data visualization from a leading data visualization vendor and a panel of experts.

Tags : tableau, big data, visualization, data visualization, storage virtualization, server virtualization, data warehousing, data deduplication
    
By: McAfee     Published Date: Feb 25, 2015

This white paper articulates the business benefits derived by companies that have deployed NGFW.

Tags : ngfw, mobile workforce, security, mcafee, new generation firewall, firewall security, firewall, anti spam
    
By: Juniper Networks     Published Date: Feb 18, 2015

Why data centers need network automation? As application workloads are redefined, data centers must change. This IDC Whitepaper looks at how network automation and orchestration can aid this transition, building simpler and more agile networks.

Tags : backup and recovery, business process automation, cloud computing, data center design and management, virtualization
    
By: Juniper Networks     Published Date: Feb 18, 2015

Learn how a simple, open and smart network can help with accelerating the deployment and delivery of applications. This Whitepaper on network virtualization best practices explains how to transform and bridge the virtual and physical networks.

Tags : network virtualization, best practices, networking, juniper, juniper networks, network architecture, network performance, storage virtualization
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.