Virtualization

From servers to storage and networking, virtualization is the technology that drives efficiency and convergence. Go behind the hypervisor hype and discover actionable advice and expertise here.

  • Ubiquity Forensics: Your ICloud and You

    Webcasts // Dec 2015 // provided by SecurityTube.net

    Ubiquity or "Everything and everywhere" Apple uses this term describe iCloud related items and its availability across all devices. iCloud enables the users' to have their data synced with every Mac, iPhone, iPad and PC as well as accessible with their handy web browser. They can access their email, documents, ...

    Watch Now
  • Virtual Presence: How to Inspire + Motivate in a Virtual Environment

    Webcasts // Nov 2015 // provided by Citrix Online

    In a virtual environment there are two critical parts to move people to action: emotional engagement +a clear call to action. Learn how to spur your audience to action by using stories and powerful language followed by a clear, compelling request. This webinar will focus on: The difference ...

    Watch Now
  • LEARN HOW MUCH YOU CAN SAVE

    Webcasts // Nov 2015 // provided by Brocade

    Could you cut networking costs with virtualization? Now you can discover how much you could save from virtualizing your application delivery controller with our simple online TCO calculator. The simple online calculator allows you to calculate your TCO in minutes. Quickly compare physical and virtual deployments, includes server ...

    Watch Now
  • Can You Patch A Cloud?

    Webcasts // Oct 2015 // provided by SecurityTube.net

    What happens when an organization extend their infrastructure to "The cloud"? When they add the complexity of cloud computing how does this change their vulnerability management program? Do they just point the scanner at the cloud provider and "Let 'er rip"? Their provider may be less than pleased with this ...

    Watch Now
  • Chimera: Securing a Cloud App Ecosystem With ZAP at Scale

    Webcasts // Sep 2015 // provided by SecurityTube.net

    One of the biggest challenges in maintaining a cloud application ecosystem with software developed by Independent Software Vendors (ISV's) and developers is ensuring that data within that ecosystem stays secure. It's impossible for a centralized security team to be responsible for every ISV's product security, code maintenance, etc.,-yet in the ...

    Watch Now
  • On-demand Webroot Webinar: How to fight modern malware with the power of collective threat intelligence

    Webcasts // Aug 2015 // provided by Webroot

    Webroot has seen a continued rise in the number of malicious URLs, IP addresses, malware, and mobile applications used to enable cybercriminals to steal data, disrupt services, or cause other harm. According to Webroot, over 20 billion new internet-connected devices are expected to come online in the next few ...

    Watch Now
  • Embracing Cloud Computing

    Webcasts // Jun 2015 // provided by SecurityTube.net

    In this webcast, the presenter will cover how to get over the hump of resistance, do so smartly and possibly enjoy some security benefits in the process. The focus here will be on info sec (or 'Cyber'), rather than the normal DevOps/Agile mumbo jumbo. Vendor selection, indicators of success, net ...

    Watch Now
  • Virtualized Routers Soup to Nuts

    Webcasts // Jun 2015 // provided by SecurityTube.net

    In this webcast, the presenter will demonstrate the virtualization of Cisco routers using the router's .bin file. The virtualization technique is performed using open-source libraries in a VMWare environment. The webcast will be followed by a short discussion of applications of virtualized routers in a cyber-range test environment.

    Watch Now
  • Virtual Android Malware Detection and Analysis (VAMDA)

    Webcasts // Apr 2015 // provided by SecurityTube.net

    Mobile application vetting is pivotal to preserve the integrity of mobile platforms. Existing frameworks typically rely on virtual environments which are easily detected by malware. Advanced malware can avoid detection within existing vetting processes by limiting its functionality within the virtual environment.

    Watch Now
  • A Practical Attack Against Virtual Desktop Infrastructure (VDI) Solutions

    Webcasts // Apr 2015 // provided by SecurityTube.net

    The secure BYOD hype is growing and Virtual Desktop Infrastructure (VDI) is considered the alternative solution for secure containers. In a nutshell, VDI solutions provide a remote workstation offering so that no data is stored locally. The presenters decided to examine the architecture and see for themselves whether VDI delivers ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?