Management, security challenges threaten virtualization’s success, 05/23/07: Successful implementations of virtualization in enterprise production networks depend less upon virtual server vendors and ...
*EDITOR’S NOTE: This is the second in a series about alternative desktop technologies for improving management and security of Windows and other desktop platforms. One Boston-based ISV is giving ...
At the recent Microsoft Secure event a new tool was released in public preview into the company's stable of security tools, called Exposure Management. I've enjoyed access to the private preview for ...
The following is an excerpt from a 10-page special report, exclusive to ECT News Network, that looks at specific advantages of virtual infrastructure management and provides examples of ROI for ...
RSA CONFERENCE 2009 -- San Francisco -- April 23, 2009 -- In a joint effort to help customers gain the efficiency and flexibility benefits of virtualization across even their most sensitive ...
10 virtualization companies to watch, 08/20/07: These technology innovators promise products that boost performance, make management easier or otherwise enhance your virtualization experience.
Defining a set of security and compliance policies is a key first step. But enforcing security policy is not as easy. Defining a set of security and compliance policies is a key step. Having a ...
There are plenty of virtualization security vendors leaping out of the shadows. Here are five new players worth a look.Altor Networks. This company's Virtual Network Security Analyzer and Virtual ...
IBM Corp. subsidiary Red Hat today announced the general availability of the Red Hat OpenShift Virtualization Engine, a version of the OpenShift orchestration platform that’s geared exclusively toward ...
Novell this week will lay out an ambitious plan to secure applications across heterogeneous virtualization platforms at customer sites and off-premises, an effort designed to play off Novell's ...
While mobile and smartphone security is the hot topic of the moment among virtualization security gurus, plenty of other virtualization security topics demand IT’s attention right now. At the recent ...