10 virtualization companies to watch, 08/20/07: These technology innovators promise products that boost performance, make management easier or otherwise enhance your virtualization experience.
Novell this week will lay out an ambitious plan to secure applications across heterogeneous virtualization platforms at customer sites and off-premises, an effort designed to play off Novell’s ...
We’ve already discussed the relative lack of tools to secure virtualized servers and infrastructures, the problems inherent in adding bolt-on tools, risks in connecting a VM to the wrong part of a ...
As it kicks off the second day of its VMworld conference, VMware is sharing newly published security and compliance recommendations for virtual environments. The vendor's guidelines focus primarily on ...
IBM Corp. subsidiary Red Hat today announced the general availability of the Red Hat OpenShift Virtualization Engine, a version of the OpenShift orchestration platform that’s geared exclusively toward ...
Defining a set of security and compliance policies is a key first step. But enforcing security policy is not as easy. Defining a set of security and compliance policies is a key step. Having a ...
The virtualization management space is really starting to heat up. Recently announced new comers Embotics and Fortisphere are now being joined by ManageIQ, a company founded and managed by a team of ...
Red Hat has announced the general availability of Red Hat OpenShift 4.18, providing enhanced features aimed at improving security, virtualization management, and operational efficiency. This latest ...
*EDITOR’S NOTE: This is the second in a series about alternative desktop technologies for improving management and security of Windows and other desktop platforms. One Boston-based ISV is giving ...
Is virtualization safe? Chris Ingle, IDC Paul Shaul Swartz, Netkeepers Ernesto Lobo, Kroll Ontrack Weighing up the benefits with the risks of virtualization You cannot doubt the rapid success of ...
The idea behind preemptive security is not that detection becomes irrelevant, but that prevention and constraint should carry ...