Virtualization Security Trends & Insights: Results from KuppingerCole´s Recent Survey

  • LANGUAGE: English DATE: Friday, November 26, 2010 TIME: 17:00 CET, 11am EST
Upcoming Webinars

Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look like? In this webinar, Martin Kuppinger will show the results of the survey and will give you some background.

Virtualization has been a key enabler to further optimize your infrastructure for more flexibility through "Cloud IT" – environments which allow consuming IT services from the most appropriate service providers, whether they are internal or external ones. However, changes mean new risks. With virtualization, IT environments might not only be moved from server to server, but even to other service providers. And even in private environments, either on-premise or in dedicated environments of service providers, things are changing.

Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look like?

With more than 300 participants, this survey was a big success. In this webinar, Martin Kuppinger will show the results of the survey and will give you some background.


Speakers


Gold Sponsor

CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live—from the data center to the mobile device.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

New Methods to Accelerate Endpoint Vulnerability Remediation

IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00