network

Results 1 - 25 of 3735Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Feb 23, 2017
Companies are increasingly using outside contractors and suppliers stay competitive, which means granting third-parties access to applications via VPN or VDI. This reliance causes increased complexity and burden on the Enterprise team while also creating additional security risk, as third-party access creates additional points of entry to an organization’s network. Read this solution brief to learn about a new painless, secure approach to remote access.
Tags : 
painless, security, third-party, resources, enterprise, vpn, solution
    
Akamai Technologies
Published By: Cox Business     Published Date: Dec 19, 2016
Reliable and secure network connectivity is no longer optional. It supports critical priorities for healthcare providers, including enhancing patient care outcomes, improving operational efficiency and boosting financial returns. If a healthcare provider’s network infrastructure is not resilient, reliable and secure, the provider will not be able to reap the benefits of its healthcare IT investments.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and greater convenience through the capabilities of better networking technologies, opportunities have never been greater to use technology to make for a truly seamless hospitality experience. However, growing dependence on your network for everything from booking to entertainment can also mean that hospitality networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Published By: Hewlett Packard Enterprise     Published Date: Feb 08, 2017
With HPE Just Right IT, you can keep your business running with pervasive network security and data protection that’s easy to implement and manage. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC     Published Date: Feb 23, 2017
In ESG research conducted shortly after the announced acquisition of EMC by Dell, 65% of the respondents indicated that they expected to benefit from more complete and innovative solutions from the combined company.1 That’s not surprising, given the complementary strength of their respective portfolios. Perhaps the most potential synergy is in the Converged Platforms and Solutions division, where servers, networking, storage and software come together.
Tags : 
    
Dell EMC
Published By: Akamai     Published Date: Mar 08, 2017
This solution needs to reach audiences reliably wherever they are, scale as fast as they grow, and adjust intelligently to dynamic network environments for the highest viewing quality possible. Missteps in online video strategy can have a long-lasting effect on audience perceptions, not only of the video experience – but also on the brand being represented.
Tags : 
video, online video strategy, video experience, engagement, customer engagement, online audience
    
Akamai
Published By: iCims     Published Date: Jan 24, 2017
here are many benefits to social recruiting. To start, social recruiting enables organizations to hire the best talent. This can be done by connecting, educating, and inspiring people through social networks. While some businesses have dabbled in the social arena, the majority are hesitant to fully pursue social recruiting.
Tags : 
    
iCims
Published By: Extreme Networks     Published Date: Feb 23, 2017
ABI Research’s Securing Medical Devices Technology Analysis Report analyzes the current risks posed by medical devices, noting various security issues, potential vulnerabilities, and the threat landscape. It reviews implementation mechanisms and efforts in medical device cybersecurity and safety. The final section looks at how the healthcare ecosystem is responding to the issues and the vendors driving change.
Tags : 
abi. healthcare, cybersecurity, medical
    
Extreme Networks
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: Workday     Published Date: Mar 21, 2017
Looking to enhance your understanding of the multiple issues that may impact payroll in 2017, including employer compliance? Watch as Michael Baer, managing editor of Bloomberg BNA's Payroll Library and Payroll Decision Support Network, and Howard Perlman, CPP, senior editor and writer for Bloomberg BNA, discuss the ways that managing payroll is expected to change under the Trump administration and Republican-led Congress.
Tags : 
us payroll, bloomberg, payroll, cpp
    
Workday
Published By: IBM     Published Date: Jan 13, 2017
As traditional network perimeters surrounding data centers dissolve, agencies face enormous difficulties fending off attacks using a patchwork of traditional security tools to protect classified or personally identifiable information (PII). Time and again, traditional security practices have proven porous and/or unsustainable. Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence -Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: Comcast     Published Date: Jan 23, 2017
Download this whitepaper to learn how to make sure your network can handle the needs of all your technology tools to offer the best care—and the best experience—for all users.
Tags : 
    
Comcast
Published By: Comcast     Published Date: Feb 03, 2017
Electronic health records are changing the face of patient record-keeping. No longer are doctors’ offices repositories for large, bulky, paper-based patient files—those have been replaced by computer-based files accessible to authorized people simply by logging on to the office’s network.
Tags : 
    
Comcast
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution, networking, knowledge management
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication, networking, knowledge management
    
Sangoma
Published By: FICO     Published Date: Mar 14, 2017
In this Executive Brief, we share best practices in how to evaluate and deploy layered controls that will help you develop a holistic approach to controls, investigate and control where risk is introduced, assess your risk appetite and benchmark your cybersecurity posture against others in your industry.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: FICO     Published Date: Mar 14, 2017
Learn how technologies such as AI, self-calibrating models and self-learning analytics are being used to detect cyber attacks before they happen. Download now!
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO
Published By: Cisco Wireless     Published Date: Mar 06, 2017
Do you know how to get the best network provider? Download the IDC report to find the best vendor for WLAN Enterprise Learn the strengths and strategy of the top 12 Enterprise Wireless vendors Discover how Cisco ranks against top WLAN providers Understand what you need to bring mobility to your business network
Tags : 
    
Cisco Wireless
Published By: Adobe     Published Date: Mar 03, 2017
By 2025, it’s projected that consumers will purchase 70 million virtual reality devices every year. This creates a major opportunity for TV networks and MVPDs to go beyond the smartphone and tablet and engage customers in a whole new immersive world. Read our guide, Capitalizing on Viewers’ Hunger for Virtual and Augmented Reality, and learn: • Six ways to delight viewers with virtual and augmented reality enhanced experiences • Untapped opportunities in the evolving VR and AR landscape, and how to monetize them • Key Adobe investments that will enable end-to-end video delivery in VR and AR
Tags : 
virtual reality, augmented reality, monetize vr and ar, video delivery, adobe primetime
    
Adobe
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations in every industry rely on applications to drive customer engagement, employee productivity and revenue. Deployed between users and the applications are a wide variety of “application services” designed to enhance security, improve performance and ensure reliability. F5 set out to evaluate the state of these services by asking IT professionals about their current and planned use of application services. Read the report to learn which strategic initiatives are driving application deployments including the most important trend for the next 2-5 years.
Tags : 
application delivery, app services, cloud, devops, automation, networking, enterprise applications
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
In a world where IT has become increasingly complex, cyber threats are unrelenting, and the cost to mitigate is becoming overwhelming, organizations are reconsidering the DIY approach to security and embracing the idea of outsourced security services. And while there are caveats to outsourcing security services, many organizations are reaping the OpEx and CapEx benefits while freeing themselves from becoming in-house security experts - refocusing on their core business. Read the whitepaper to learn more.
Tags : 
enterprise security, managed services, security
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations considering moving enterprise applications to the public cloud should ensure that they also move the application delivery services their applications rely on in the data center. In addition, cloud migration presents an opportunity to organize and rationalize security and access, gain visibility into cloud-based application traffic, and architect a strong disaster recovery plan. Download to read the 5 rules to follow when lifting and shifting apps to the the cloud.
Tags : 
apps, cloud, enterprise applications, public cloud, networking
    
F5 Networks Inc
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.