virtual physical

Results 1 - 25 of 122Sort Results By: Published Date | Title | Company Name

Download Acronis® Backup & RecoveryT 10 Advanced Server Virtual Edition

Published By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server Virtual Edition is the next generation of the Acronis True Image family of products, engineered specifically for virtualized environments. Acronis Backup & Recovery 10 Advanced Server Virtual Edition enables organizations of all sizes to extend the cost-saving benefits of virtualization by protecting virtual machines running on a single physical host for a low, fixed price.
Tags : 
acronis, backup and recovery, 10 advanced server virtual edition, patented disk imaging, bare metal restore, true image, disaster recovery, remote server, remote access, servers
    
Acronis

10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution

Published By: Acronis     Published Date: Dec 28, 2011
Virtualization platforms are different from physical platforms. The virtualization benefits extend to management and support for tightly integrated backup and recovery solutions. Solutions designed exclusively for virtual infrastructure backup provide a host of key benefits and should be leveraged whenever possible.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, backup hyper-v, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis, security management, security policies, cloud computing
    
Acronis

Taneja Group Technology Validation - Virtual Backup Twice as Fast

Published By: Acronis     Published Date: Dec 28, 2011
Taneja Group recently carried out a competitive assessment to put Acronis vmProtect 6 against Veeam in a head to head shoot-out. vmProtect 6 delivered across the board - demonstrating better simplicity, higher performance, and lower resource consumption.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis, veeam, vmprotect, acronis vmprotect, vm protection, backup and recovery
    
Acronis

Acronis vmProtect 6 - Best backup for VMware

Published By: Acronis     Published Date: Feb 09, 2012
Built specifically for VMware vSphereT, Acronis® vmProtectT 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis, veeam, vmprotect, acronis vmprotect, vm protection
    
Acronis

Virtualization and Cloud Computing: Optimized Power, Cooling, and Management Maximizes Benefits

Published By: APC by Schneider Electric     Published Date: Jan 21, 2016
IT virtualization, the engine behind cloud computing, can have significant consequences on the data center physical infrastructure.
Tags : 
cbs interactive, cloud, virtualization, infrastructure, network architecture, servers, it spending, power and cooling, data center design and management
    
APC by Schneider Electric

Infrastructure Performance Management for Virtualized Systems

Published By: Arcserve     Published Date: Jul 23, 2010
The management tools selected to support virtualization is essential to the ability of IT to grow the virtual environment without proportionately increasing the staff required to manage all of the new physical host servers and their guest VMs. Read more!
Tags : 
ca technologies, infrastructure performance management, virtualized system, virtualization management, it operation, infrastructure, network performance management, storage virtualization, application performance management, server virtualization
    
Arcserve

Meeting Business Data Protection Needs in a Mixed Physical / Virtual Environment

Published By: Arcserve     Published Date: Jun 11, 2014
Virtualization has without doubt enabled IT organizations to obtain maximum efficiency from their physical hardware, but virtualization has also increased the complexity these organizations have to manage, and that includes data protection. This paper discusses some of the hidden complexities virtualization introduces to backup and recovery requirements, and the challenges created when backup involves a combination of physical servers and virtual machines. It also discusses ways that backup and recovery processes can be simplified by avoiding point solutions.
Tags : 
arcserve, next generation architecture, data protection, data protection operations, metrics, security, it management
    
Arcserve

ASG's Business Service Portfolio Virtualization Management

Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, business activity monitoring, business process automation, business process management, change management, server virtualization, application integration, business intelligence
    
ASG Software Solutions

Virtualization Sanity Check: Stopping the Sprawl with Complete IT Visibility

Published By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : 
asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions

ASG's Business Service Portfolio Virtualization Management

Published By: ASG Software Solutions     Published Date: Jun 15, 2009
ASG's Business Service Portfolio (BSP) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions

Leader’s Guide to the Future of Work, feat. Gartner Research: “How We Will Work in 2028"

Published By: Avaya     Published Date: Nov 07, 2018
How new technologies will change how people connect with each other and serve customers tomorrow. The Leader’s Guide to the Future of Work, featuring Gartner Research, introduces you to a world where technology helps people connect better – with each other and with their customers. The workplace as we know it today is evolving into a digital, virtual work space, where work becomes more fluid, more project-based and more mobile than today. Where teams communicate and collaborate more effectively, beyond devices, physical locations and functions – even beyond the boundaries of the enterprise. And where humans and machines not only work together, but complement each other effortlessly.
Tags : 
    
Avaya

Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid, access control, application security, email security, internet security, network security appliance, security management, security policies, vulnerability management
    
Blue Coat Systems

Content-Aware Identity & Access Management in a Virtual Environment

Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection, application security, authentication, internet security, intrusion prevention, security management
    
CA Technologies

Getting Real About Virtual Platform Management

Published By: CA WA 2     Published Date: Oct 01, 2008
CA's vision is to unify and simplify the management of enterprise-wide IT. The rapidly growing use of virtualization and clustering in enterprise infrastructures provides a rich environment for increasing complexity. Unlike physically bounded infrastructures, the logical entities in virtualized and clustered environments are not visually apparent. Nevertheless, one needs to know what resources one has and if one is using those resources to their fullest capacity.
Tags : 
virtual, virtualization, network management, ca wa, ca wa 2, networking, infrastructure, server virtualization
    
CA WA 2

VMware and CA- Making the Most of Virtualization

Published By: CA WA 2     Published Date: Oct 01, 2008
Management of a virtual environment presents unique challenges; many organizations do not thoroughly anticipate the differences in managing a virtual environment from a purely physical environment. Many of your existing management tools may, in fact, only be able to manage physical machines or may collapse under the sudden load of many more systems.
Tags : 
virtual, virtualization, ca wa, ca wa 2, storage virtualization, server virtualization
    
CA WA 2

Top Reasons Why VNX Unified Hybrid Flash

Published By: CDW     Published Date: Apr 04, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, data management, network management, network performance, storage virtualization, application security, contact management, content delivery, content integration, virtualization, infrastructure
    
CDW

Top Reasons Why VNX Unified Hybrid Flash

Published By: CDW - EMC     Published Date: Apr 07, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, it management, enterprise applications, infrastructure, network management, network performance
    
CDW - EMC

Cloud and Data Center Security: Secure Virtual, Cloud, Physical, and Hybrid Environments Easily

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro

Cloud & Virtualization Security for Dummies

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : 
cloud security, virtualization security, virtualization, data center, security, it management, wireless, knowledge management
    
CDW-Trend Micro

Optimized Security for the Modern Data Center

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands— while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.
Tags : 
security, virtualization, cloud computing, trend micro, it management, wireless
    
CDW-Trend Micro

Rush University Medical Center Creates Safer Environment

Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
CDW-Trend Micro

Delivering on the Promise of Virtualization: Cisco Unified Computing System

Published By: Cisco     Published Date: Jan 05, 2015
Virtualization has transformed the data center over the past decade. IT departments use virtualization to consolidate multiple server workloads onto a smaller number of more powerful servers. They use virtualization to scale existing applications by adding more virtual machines to support them, and they deploy new applications without having to purchase additional servers to do so. They achieve greater resource utilization by balancing workloads across a large pool of servers in real time—and they respond more quickly to changes in workload or server availability by moving virtual machines between physical servers. Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco

Cisco and EMC VSPEX Design Guide

Published By: Cisco     Published Date: Jan 05, 2015
Private cloud technologies have proven themselves in large data centers and hosting organizations. The ability to quickly deploy new virtual machines, make configuration changes to virtual machines, live migrate virtual machines to different hosts before performing maintenance on physical components, and other benefits like this have cut operational expenses.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco

SAFE Architecture Guide Places in the Network: Secure Data Center

Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco

Virtual desktop acquisition cost analysis

Published By: Citrix Systems     Published Date: Apr 15, 2015
App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, network security, vpn, application integration, best practices, productivity, cloud computing
    
Citrix Systems
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.