Search: security

More Results

Sort by: Relevance | Date
  • virtualisation

    In IT, virtualisation is the process of creating logical computing resources from available physical resources. This is accomplished using virtualisation software to create a layer of abstraction between workloads and the underlying physical...

  • VMworld Europe 2011

    Attend VMworld, the IT Industry’s Leading Virtualisation & Cloud Event

    VMworld 2011 offers more than 115 unique breakout...

  • RSA Security

    RSA Security is a United States-based organization that creates encryption, network and computer security products. Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent company in 1982. RSA derives...

  • secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps. The purpose is...

  • The mainframe is dead, long live the mainframe

    As with Mark Twain, the reports of the death of the mainframe have been exaggerated. From the early 1990s onwards, the mainframe has been portrayed as the dinosaur of computing, being steadily overtaken by more glamorous platforms and newer...

  • Expect More at IP EXPO on 20th & 21st October

    Visit IP EXPO - the only event to cover all aspects of IT in the enterprise and learn how you can Drive Efficiency, Increase Security, Reduce Costs, and Meet Business Needs.

    You can expect:

    • Over...

    • Secure Web gateways: Security add-ons

      Learn about five must-have features of secure Web gateways that could be critical to how your enterprise evaluates products.

    • EU Code of Conduct on Data Centres' Energy Efficiency

      The EU Code of Conduct on Data Centres' Energy Efficiency is a voluntary initiative aimed at reducing the environmental, economic, and energy-supply security impact of today's data centres.

    • IT Decisions 2010

      Find out what's hot on the IT agenda at IT Decisions 2010 (www.itdshow.com), including the latest developments in:

      • Unified Communications & VOIP
      • Managing BYOD endpoint security

        This newly updated Security School lesson breaks down BYOD challenges and help you develop a strategy that cuts across the myriad threats and platforms inside your organization.

Search Again: