Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Virtualization

Below you will find reports with the tag of “Virtualization”

image from 2017 Security Annual Volume 2 - Luminary Interviews

2017 Security Annual Volume 2 - Luminary Interviews

This paper provides interviews with a variety of well known individuals in the cyber security industry.

Added: October 21, 2018
image from 6 Key Security Requirements for Next Generation Mobile Networks

6 Key Security Requirements for Next Generation Mobile Networks

Mobile network operators (MNOs) are evolving rapidly to deploy transformative networks—4G, 5G, SDN/NFV. Meanwhile they are battling a new and different cyber attack landscape that could compromise BOTH their networks AND their subscribers. Network and subscriber protection are no longer separate problems in this new digital age. Legacy security solutions are inadequate. A new approach to security is needed—with a focus on PREVENTION —not just a reaction to prior known threats. Adopting a prevention posture enables operators to get ahead of the evolving sophistication of attackers.

(more available)
Added: October 21, 2018
image from Seven Decision Points When Considering Containers

Seven Decision Points When Considering Containers

The decision to deploy code to containers versus virtual machines or dedicated servers has some unique characteristics. Amalgam Insights has identified seven key decision points that should be considered when choosing to deploy to containers. These seven decision points can act as guideposts that will help point to or from using containers.

(more available)
Added: October 21, 2018
image from Virtualization Makes CIOs Role Key

Virtualization Makes CIOs Role Key

An October 2016 Bitdefender survey of 250 IT decision makers in the United States in companies with more than 1,000 PCs, shows they will rise in companies’ hierarchies, as CEOs and board members face increasing internal and external security risks that could ruin customer trust and business forecasts. Still, not all C-suites include CIOs/CISOs in the business decision-making process. This survey, carried out by iSense Solutions, shows how IT decision makers perceive their role inside the organizations and what they need to meet shareholder expectations. How has virtualization changed the security game? How many attacks can be stopped with the current resources? Would they pay to avoid public shaming?

(more available)
Added: October 21, 2018
image from Impact vs. Metasplout Pro Efficiency Study

Impact vs. Metasplout Pro Efficiency Study

Under most tested scenarios, Core Impact users can expect a notable reduction in both operator time and total elapsed time when performing common penetration testing tasks. This whitepaper presents the repeatable methodology and testing protocol used in our study.

(more available)
Added: October 20, 2018
image from Ransomware Response:Ideal vs. Reality

Ransomware Response:Ideal vs. Reality

From the Report, “This newsletter introduces the latest ransomware trends and best practices for ransomware response using the AhnLab MDS (Malware Defense System). "

(more available)
Added: October 20, 2018
image from Software Asset Management.Next

Software Asset Management.Next

This paper seeks to help organizations understand the future of Software Asset Management.

Added: October 19, 2018
image from The Emotional Side of Virtualization

The Emotional Side of Virtualization

Virtualization is a strategic priority at large companies, and trust plays a crucial role in their choice of cloud service provider and in determining the type of data they store outside company infrastructure, according to a Bitdefender survey of 503 IT decision makers at companies in the US, the UK and Germany with more than 1,000 PCs. Hybrid infrastructures, a mix of public cloud services and privately owned data centers, have become the major architecture in the enterprise environment, and CIOs have to adapt to the new world. This survey, carried out by iSense Solutions, reveals why companies virtualize, which countries CIOs trust and what kind of data companies care most about.

(more available)
Added: October 19, 2018
image from HIPAA Compliant Containers

HIPAA Compliant Containers

This Technical paper discusses the need for Containers. Containers allow deployment of single-purpose virtual compute instances for processing workloads in the cloud regardless of the operating system used. Care must be taken, however, to ensure that your container strategy, deployment methodology, monitoring protocols, and vulnerability management practices are harmonized in a manner that complies with the HIPAA Security Rule, as well as industry recognized security frameworks such as NIST, ISO, CSF and PCI DSS. Read the Paper to understand more about that issue.

(more available)
Added: October 18, 2018
image from Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

Monitoring 201: Moving beyond simplistic monitors and alerts to #MonitoringGlory

This guide was written as a follow-up to “Monitoring 101.” It seeks to provide further more advanced information about Monitoring, the challenges and the successes that can be had.

(more available)
Added: October 18, 2018
image from An Integrated Approach To IT Troubleshooting

An Integrated Approach To IT Troubleshooting

In this paper, we will share some approaches to monitoring your IT environment and how those approaches impact troubleshooting.

Added: October 17, 2018
image from Global IT Risks Survey 2015

Global IT Risks Survey 2015

From the report, “It’s time for businesses to recalibrate the way they think about their security budgets. Seen as a separate expense to IT infrastructure, it appears hard to justify until disaster strikes. But understood as an essential part of the IT environment – including mobile devices and virtualized machines – its value is obvious, especially in the context of the damage and huge costs it can prevent.”

(more available)
Added: October 17, 2018
image from RightScale 2018 State Of The Cloud Report

RightScale 2018 State Of The Cloud Report

In January 2018, RightScale conducted its annual State of the Cloud Survey. The survey questioned technical professionals across a broad cross-section of organizations about their adoption of cloud infrastructure. The 997 respondents range from technical executives to managers and practitioners and represent organizations of varying sizes across many industries. Respondents represent companies across the cloud spectrum, including both users (19 percent) and non-users (81 percent) of RightScale solutions. Their answers provide a comprehensive perspective on the state of the cloud today.

(more available)
Added: October 17, 2018
image from 2016 State Of The Cloud Report

2016 State Of The Cloud Report

In January 2016, RightScale surveyed 1,060 technical professionals across a broad cross-section of organizations about their adoption of cloud computing. This report is based on those findings.

(more available)
Added: October 16, 2018
image from A Journey Through Hybrid IT And The Cloud

A Journey Through Hybrid IT And The Cloud

This e-Book seeks to provide the reader with some information and insight into the challenges and struggles that come with switching data to a cloud based system.

(more available)
Added: October 16, 2018
image from Delivering Strong Security In A HyperConverged Data Center Environment

Delivering Strong Security In A HyperConverged Data Center Environment

From The Report, “Just as hyperconvergence in the data center will have a huge impact on how systems and data are managed, it will have significant repercussions for information security. Any organization that thinks security does not need to change in a hyperconverged environment puts data and systems reliability at risk.”

(more available)
Added: October 16, 2018
image from Growing Disaster Recovery Needs Change the Role of Data Backup

Growing Disaster Recovery Needs Change the Role of Data Backup

Data protection in the form of backup and recovery remains one of the key tools in a company’s disaster recovery/business continuity toolbox. However, the increasing adoption of cloud-based IT options has also added a new set of challenges for managing and protecting business processes that can extend beyond the datacenter. There’s an increasing need for contingency plans that address the potential loss of mission-critical services, as well as the applications and data itself.

(more available)
Added: October 16, 2018
image from MMap Vulnerabilities - Linux Kernel

MMap Vulnerabilities - Linux Kernel

This article reviews the Linux Kernel, mainly searching for vulnerabilities in different drivers. In this particular article, they took a look into drivers trying to roll their own usage of the mmap() function.

(more available)
Added: October 15, 2018
image from Advanced Precision Threat (APT) Protection: Market Quadrant 2018

Advanced Precision Threat (APT) Protection: Market Quadrant 2018

This report discusses APT Protection and how it impacts a certain quadrant of the Market.

Added: October 14, 2018
image from The Definitive Guide To Micro Segmentation

The Definitive Guide To Micro Segmentation

This eBook gives a detailed understanding of Adaptive segmentation and how it can be effectively used for cloud security.

Added: October 14, 2018
image from Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

Cybersecurity Insights Volume 7: Cybersecurity For Today's Digital World

In this report, the authors outline an approach for edge-to-edge security for companies to consider as they build their digital transformation roadmaps. Strengthening a company’s security posture in a world of SDI requires rethinking both the human and the infrastructure elements, leaving behind the idea of network-centric security and moving toward data-centric security.

(more available)
Added: October 13, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • 4
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 12:08 UTC (build b1d7be4)