Skip to main content
 

virtual environment

Results 401 - 425 of 426Sort Results By: Published Date | Title | Company Name
Published By: Infoblox     Published Date: Jun 11, 2012
The dynamic nature of virtual and private cloud environments cannot be accommodated by an underlying infrastructure that is a static, physical assembly of routers, switches, servers, and firewalls. Find out more in this complimentary white paper
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls, agilitytime, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox
Published By: Splunk     Published Date: Oct 15, 2012
Visibility and cross-tier correlation for the largest virtual environments
Tags : 
data management, virtualization, splunk, splunk app, vmware, performance metrics, data management
    
Splunk
Published By: HP - Intel® Xeon® processors     Published Date: May 06, 2013
What’s needed today is storage that’s flexible enough to be used for both legacy IT and virtual systems environments and repurposed as new needs arise. Storage must be quickly expandable and must enable data and applications to be easily and securely migrated, with workloads automatically rebalanced. Applications need to be online 24 x 7, so high availability is paramount. Management of the entire storage pool, as well as coordination with virtualized servers and networking, must be streamlined and simplified. This Tech Dossier reveals how HP Converged Storage can meet your organizations storage requirements.
Tags : 
converged storage, optimize, virtualization, cloud deployment, high availability
    
HP - Intel® Xeon® processors
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear, emc, buying, data, social media, manage, voicemail, presentation, residents, issues, disk
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
Client virtualization technologies are redefining the way IT resources are delivered to end users, and creating exciting new opportunities for IT organizations as they work to streamline and improve operations. By abstracting applications and operating systems from client hardware, virtualization enables client assets to be stored on central servers and delivered to client endpoints. The implications are profound. End users can log on to any networkconnected computing device and access their custom operating system and application environment. For IT departments, central management of client virtual machine (VM) images brings efficiencies in everything from routine maintenance and updating to operating system upgrades.
Tags : 
    
CDW
Published By: SafeNet     Published Date: Mar 29, 2013
The move to the cloud and virtualized environments along with an increasingly mobile workforce, emerging employee BYOD trends and the adoption of cloud based applications is blurring the boundaries of the traditional network security perimeter.
Tags : 
authentication, byod, mobile workforce, it security, key management
    
SafeNet
Published By: ExtraHop     Published Date: Jul 25, 2013
Worried about application performance in the cloud? Real-time analysis of wire data provides you with deterministic application response times and detailed L7 metrics. This white paper explains how you can get the visibility you need to manage P2V migrations and cloud performance.
Tags : 
    
ExtraHop
Published By: HP and Intel ®     Published Date: May 03, 2013
HP Cloud Solution for Microsoft is designed to provide a scalable, high-performance integrated infrastructure optimized for virtual environments built on Microsoft Hyper-V. Designed and built according to the Microsoft Private Cloud Fast Track reference architecture, HP Virtual System for Microsoft comes standard with Microsoft Windows Server 2012 (which includes Hyper-V) and is designed to deliver top performance for a wide range of virtualized applications, including Microsoft Exchange, SQL Server, and SharePoint. This paper will focus on ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP Cloud Solution for Microsoft, versus a comparable conventional data center infrastructure comprised of discreet, non-integrated compute, storage, network, and management components.
Tags : 
cloud, virtualization, data center, infrastructure, storage, network, management
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
While virtualization is delivering clear benefits to multiple areas of IT, organizations need to start thinking about it holistically to serve business needs. Learn more about maximizing the value of your virtualization IT environment with this CIO.com eBook.
Tags : 
virtualization, enterprise, data center, benefits
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
With the gaining popularity of virtualization in today’s enterprise data centers, you need a virtual security solution that allows you to confidently adopt virtualization throughout your data center without compromising on your existing security postures.
Tags : 
virtualization, security, enterprise, data center, virtual security
    
HP and Intel ®
Published By: IBM     Published Date: Sep 27, 2013
ITIC asserts that IBM’s latest Linux-only Power Systems offer current and prospective Big Blue customers high performance and reliability for physical and virtualized environments at an extremely aggressive price point.
Tags : 
itic, ibm, powerlinux, servers, powerlinux servers, big blue customers, servers, virtualization
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
IT-Informatik chose a full virtualization strategy, based on IBM® PowerLinux™ servers with IBM PowerVM® virtualization and Live Partition Mobility, to manage its SAP hosting services. The new solution slashes IT operational costs by more than 50 percent and enables IT-Informatik to set up new customer environments 80 percent faster.
Tags : 
it-informatik, sap, ibm system, ibm powerlinux, operational costs, linux enterprise, partition mobility
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
Consolidating data center servers through virtualization is integral to successful IT systems design. Read the white paper and see how IBM PowerVM on POWER7 offers higher ratios of server virtualization than VMware on comparable Intel x86 platforms. This enables superior performance, greater operational savings and improved efficiency.
Tags : 
ibm power7 systems, virtualization, powervm, vsphere, powervm technology, virtualization performance, intel xeon, hp proliant, tpox benchmark, throughput performance, memory vios, gb system, virtualization infrastructure, edison group, workload management, lifecycle management, ibm systems, virtualized environment
    
IBM
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center, virtual datacenter
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : 
server security, virtual server security, cloud server security, data center server security
    
Intel Security
Published By: HP     Published Date: Sep 02, 2015
HP Service Virtualization software allows developers and testers access to limited or unavailable services in a simulated, virtual environment. This helps application teams lower costs and reduce testing times by finding defects earlier in the application life cycle when they are easier, faster and less expensive to fix.
Tags : 
hewlett-packard (hpq), virtualization, virtualization management, simulation software
    
HP
Published By: Rackspace     Published Date: Mar 24, 2016
In today’s economy, companies that stay in place fall behind. Businesses that fail to decrease their dependence on legacy infrastructure risk stagnation and losing ground to competitors. Thankfully, advances in virtualization and emerging cloud technologies can deliver the agility that today’s IT organizations need to compete, but only if selected and deployed wisely. Learn how you can extend your existing virtualization environment into the cloud to maximize the benefits of both, and get some advice on how to get started in paving the way toward an effective and efficient outcome.
Tags : 
rackspace, virtualization, vmware, cloud
    
Rackspace
Published By: CA Technologies     Published Date: Jun 01, 2018
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
    
CA Technologies
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment. Often referred to as private cloud, these projects are fueling significant expansion into what can be referred to as the public cloud.
Tags : 
    
Palo Alto Networks
Published By: Carbonite     Published Date: Aug 02, 2017
Carbonite Cloud Migration Powered by DoubleTake is an online service that enables migrations from any physical, virtual or cloud-based environment into VMware vSphere, vCloud Director, OpenStack, Amazon Web Services EC2 or Microsoft Azure infrastructure as a service (IaaS) cloud environments. The webbased console provides automated, centralized migration to the cloud. This document provides a detailed technical briefing on the functionality and use of Carbonite Cloud Migration and assumes that the reader will have at least a basic understanding of infrastructure as a service (IaaS).
Tags : 
carbonite, cloud, cloud-based environment, iaas. cloud migration
    
Carbonite
Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.