|
|
|
|
The CIO's New Guide to Design of Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size. Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster.
|
|
Break the Cycle of Infinite Information Retention
Infinite information retention is costly and a security risk for organizations, yet 95% of businesses hold on to unneeded data. Lou Harvey, HP IM Software Archive Solutions Enablement Director looks at the disadvantages of infinite information retention and the penalties organizations may face if they do not meet IM regulations. Duration: 17 minutes.
|
|
New PCI DSS 2.0 - Focus On Virtualization
The supplement will include detailed recommendations - perhaps requirements - and auditable controls for virtualized systems that are sure to impact your IT security and compliance plans for 2011 and beyond. But for now, this guidance is under review and subject to change. What should you do in the meantime?
|
|
Simplifying Virtualization: Management Through Automation
Virtualization - a technology that abstracts physical hardware from IT services - is a disruptive innovation that is taking IT by storm. A well-managed virtualization deployment improves server utilization, reduces hardware costs, increases uptime, makes IT faster to react, and drives significant ROI. It can also provide advantages in terms of service performance, application resiliency and responsiveness in delivering critical new IT services.
|
|
Managing Risk on the Journey to Virtualization and the Cloud
Virtualization has set IT free from many of its legacy constraints on resource optimization. But as virtualization enables IT to evolve into highly flexible service architectures such as cloud computing, these new approaches to technology also introduce new risks. How can enterprises best manage the wide range of risk and compliance challenges that accompany the many opportunities introduced by these innovations?
|
Upcoming Webinar Thursday, August 26, 2010 2:00 PM - 2:45 PM EDT
|
|
Where Ignorance Is Not Bliss: Understanding How Virtualization and Cloud Computing Changes Security Management
With the rise of virtualization - and new approaches to IT such as cloud computing that virtualization directly enables - long-established security concepts based on physical isolation and control now need reconsideration. This webcast explores the changes in security management wrought by the transformative technology of virtualization - changes that enterprises cannot afford to ignore - and the emergence of new techniques and tools that give enterprises the visibility and control over the virtual environment this new paradigm requires.
|
Register to Attend
|
|
Shield Vulnerabilities with Virtual Patching from Trend Micro
Got older systems? Shield vulnerabilities before they can be exploited! No time or budget to upgrade Windows 2000, hard-to-patch databases, or other unsupported systems? Without bug fixes, patch releases, or workarounds, these systems are vulnerable to new malware and other cybercriminal exploits. See what Trend Micro virtual patching can do for you.
|
|
Trend Micro - All Clouds Are Not The Same
Thirty-year security veteran and innovator, Raimund Genes, CTO, Anti-Malware,Trend Micro, offers an executive insight into cloud security and Trend Micro's Smart Protection Network.
|
|
Making the Case for Application Performance Monitoring
Monitoring the performance of your business-critical applications can be a significant undertaking in today's complex IT environment. This challenge is amplified as virtualization, cloud computing and composite applications continue to drive dynamic change in the data center.
|
|
Increase IT Performance from the Enterprise to the Cloud with WAN Optimization - Taneja Group
WAN optimization plays an important role in today's highly distributed datacenters and cloud computing architectures. Massive consolidation and data mobility, enabled by virtualization, have radically altered how we build servers, design applications, and deploy storage for the emerging 'cloud' decade. This paper discusses how Riverbed solutions effectively eliminate IT performance constraints in such environments.
|
|
Rethink Your Web Gateway Security - Why You Need More than URL Filtering
Cybercriminals are more organized to the point that web-borne malware has become an integral part of the Internet. This webinar explores the changing threat landscape, the movement toward cloud-based technologies in response to changing security requirements, and why real-time threat intelligence and consolidation of security services at the Internet gateway brings greater protection for less cost.
|
|
Practical VM Security Techniques for Internal and External Virtualized Infrastructures
This webcast discusses current trends in virtual infrastructure security while offering practical techniques for securely managing today's virtual infrastructures. Learn new approaches for virtualization security, security features that should be included in all production-use hypervisors, as well as key questions that IT decision makers should be asking to prospective hypervisor and security vendors.
|
|
Nemertes Research - Securing the Physical, Virtual, Cloud Continuum
The data center is undergoing a radical shift, from virtualization towards internal cloud environments where workloads dynamically move, start and stop driven by real-time performance needs. At the same time, IT practitioners are interested in exploring external cloud computing options - but security and compliance concerns are squelching adoption.
|
|
ESG Whitepaper - The Cloud-Based Threat Defense Model
While the economic forecast remains uncertain in 2010, ESG's research indicates an increase in IT spending with a focus on security and risk management initiatives. Why are CIOs still so concerned about security? Which security technologies will they purchase?
|
|
Security in a New Era of Threats
In this podcast, Jon Ramsey, CTO at SecureWorks, addresses an array of security issues currently facing businesses, including security in the cloud, insider attacks, securing mobile devices and how to manage spam and malware. The story of a CEO whose gmail account was hacked eventually leading to the loss of $1 million will shock you.
|
|
Evolving Mobility Needs and Requirements for the Enterprise
Even in a time with great economic and financial uncertainty, the IT and business landscape continues to change at a frenetic pace. One of the greatest areas of change pertains to the adoption of smartphones and other mobile solutions in the enterprise. This adoption has also changed in the last couple of years from an almost exclusively centrally procured process to one where individuals can go to their local store and purchase their smartphone of choice.
|
|