Virtualization Security Trends & Insights: Results from KuppingerCole´s Recent Survey

  • LANGUAGE: English DATE: Friday, November 26, 2010 TIME: 17:00 CET, 11am EST
Upcoming Webinars

Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look like? In this webinar, Martin Kuppinger will show the results of the survey and will give you some background.

Virtualization has been a key enabler to further optimize your infrastructure for more flexibility through "Cloud IT" – environments which allow consuming IT services from the most appropriate service providers, whether they are internal or external ones. However, changes mean new risks. With virtualization, IT environments might not only be moved from server to server, but even to other service providers. And even in private environments, either on-premise or in dedicated environments of service providers, things are changing.

Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look like?

With more than 300 participants, this survey was a big success. In this webinar, Martin Kuppinger will show the results of the survey and will give you some background.


Speakers


Gold Sponsor

CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. With CA software at the center of their IT strategy, organizations can leverage the technology that changes the way we live—from the data center to the mobile device.

Watch now

Downloads

Webinar presentation

Webcast download

Popular Webcasts

Next Webinar

Webinar

6 Myths of Privileged Access Management Busted

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

Next Conference

Conference

AImpact Summit 2019

AImpact Summit held on November 27 – 28, 2019 in Munich, offers the unique opportunity to get a deep insight on the hottest topics of Artificial Intelligence, network with like-minded people, connect with peers who recognize that now is the time for AI, meet the people changing the perspectives and transforming the way we do business today. As AI increasingly permeates every aspect of our life, knowing how to apply the cutting-edge technology to one’s competitive advantage or how to avoid risks and threats become vastly important.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00