HIT Consultant Insightful coverage of healthcare innovation
 

access point

Results 126 - 150 of 184Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Nov 14, 2011
See how HP is setting the benchmark for 802.11n performance with the industry's first three-spatial-stream 802.11n dual-radio access points.
Tags : 
wireless, 208.11n, dual-radio, performance, benchmark, ehternet, range, coverage, workforce
    
HP
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
The networks that support this free-moving, agile world need the same kind of distributed intelligence. Revolutionary distributed control places intelligence in the access point, allowing automatic optimization of coverage and bandwidth.
Tags : 
wi-fi, technology, wireless, mobile devices, innovation, organizations, hr professionals, workforce
    
Alcatel Lucent Enterprise
Published By: Alcatel Lucent Enterprise     Published Date: Sep 07, 2017
The networks that support this free-moving, agile world need the same kind of distributed intelligence. Revolutionary distributed control places intelligence in the access point, allowing automatic optimization of coverage and bandwidth. With contractors on site, and employees using their own devices, future-ready networks must support all kinds of devices, including legacy equipment. Airtime fair access provides optimal connectivity, even for older devices.
Tags : 
wi-fi, technology, wireless, mobile devices, innovation, organizations, hr professionals, workforce
    
Alcatel Lucent Enterprise
Published By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : 
aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing, mobile device access management, network management, wlan policy, network access layer, wireless mobility, iphone, smart phones, wlan, layer 2 roaming, vpn, byod
    
Aerohive
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn about two approaches for efficient WLAN design and see how you can seamlessly integrate 802.11ac into your WLAN in order to lay the foundation for the future of high-speed technologies.
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access
    
Aerohive Networks
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn about the 10 requirements needed for optimizing your network for mobility and see the potential issues IT faces in a mobile-first enterprise and the advantages of framing the problems properly for long-term success and effectiveness.
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access
    
Aerohive Networks
Published By: Aerohive Networks     Published Date: May 27, 2014
Learn how a controller-less wireless architecture will provide significant benefits over the traditional-controller-based model in terms of deployment simplicity, ongoing management, and cost..
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access
    
Aerohive Networks
Published By: OKTA     Published Date: Mar 30, 2018
"Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT and user access management. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace and stay secure. This white paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration with comprehensive user provisioning and build a solid foundation for future cloud-first, mobile-first IT."
Tags : 
    
OKTA
Published By: K2     Published Date: Jan 07, 2016
User adoption has always been something of an issue. Despite having ready access to SharePoint, many users cling to their file-shares, or more recently, adopt other ways of collaborating and sharing documents via web-based services. A third of the organizations surveyed feel that their SharePoint project has struggled to meet their original expectations, and a further 26% feel progress has stalled. Is this because of poor training and governance, restricted functionality of SharePoint, or simply the inevitable result of being the first ECM system to move beyond the safer boundaries of compliance-based aoperations? As we will see in this report, it is likely to be a combination of all of these.
Tags : 
aiim, microsoft sharepoint, user adoption, enterprise content management
    
K2
Published By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : 
security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution
    
K2
Published By: IBM     Published Date: Sep 08, 2016
Read this white paper to discover how predictive analytics and cognitive commerce make it possible to get instant access to integrated information and actionable insights so you can deliver superior-and profitable-interactions with customers. You'll learn: What it takes to uncover hidden trends and explore relationships across disparate data sources using natural language queries Ways to use in-depth insight to create highly relevant campaigns and content that's aligned with individual customer behaviors and preferences How to take product recommendations to new levels of accuracy with pinpoint prediction and targeting
Tags : 
ibm, ecommerce, b2c, b2c ecommerce, commerce, data, business advisor
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: IBM     Published Date: Aug 05, 2014
Watson Explorer provides organizations with a combined, trusted 360-degree view of both structured and unstructured data. The solution indexes information from unstructured data sources (PDFs, Microsoft SharePoint, flat files, social media, blogs and so on) as well as structured sources for search and discovery. Organizations can leverage their data in place, respecting existing security models when creating this virtual access point to all information. Watson Explorer requires trusted master data to ensure that links are accurate and reliable, so the end user can confidently leverage a holistic view of a customer or product.
Tags : 
ibm, data, customer, watson explorer, master data, structured
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Microsoft Dynamics     Published Date: Jul 23, 2007
This paper walks you through the tools and technologies that enable service orientation. The purpose of this paper is to share with you the value of Real-World SOA and a few success stories from our customers who have taken on Real-World SOA projects to support their business vision.
Tags : 
microsoft, microsoft dynamics, soa, service-oriented, service oriented architecture, web services, soap, simple object access protocol, dynamics ax, dynamics crm, aif, application integration framework, biztalk, sharepoint
    
Microsoft Dynamics
Published By: SonicWall     Published Date: Sep 10, 2009
Hear real-world examples of how companies like yours consolidated their security to lower their total cost of ownership, optimized existing resources, increased their security and dramatically improved productivity!
Tags : 
sonicwall, free pcmagcast webinar, unified threat management, a different, efficient, costly bandwith, consolidating multiple solutions, run bandwidth on your web 2.0 apps, long term costs of owning solutions, potamac hospital, sonicwall clean wireless solution, integrates wireless access points, utm firewall, deep packet inspection technology
    
SonicWall
Published By: SAS     Published Date: Nov 16, 2018
More account openings are taking place through digital devices and online, giving the access and anonymity fraudsters need to steal or fabricate identities. Since credit fraud often starts with a falsified application, it makes sense to have strong tools to monitor loans and credit lines from that point onward. This paper discusses analytics-driven methods for validating applications and spotting trouble at all three stages of bust-out fraud schemes.
Tags : 
    
SAS
Published By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : 
ibm, mobile, mobile app, api, api management, web application, application programming interface, app, ubm tech, mobility, cloud, mobile devices, software
    
IBM
Published By: Kapost     Published Date: Jan 16, 2014
Over the past 10 years, the Internet has provided unprecedented access to information. Consequently, B2B buyers are constantly online learning about industry trends and innovative solutions to their pain points. Given their busy schedules, buyers have grown accustomed to the convenience of researching and comparing multiple options online, narrowing their choices independently of the vendor and, only then, engaging with sales. While buyers have always made the final purchase decision, in today’s world, the vendor is not given an opportunity to engage until the buyer is close to a choice. Today, the buyer is in control of their own journey.
Tags : 
content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform, content marketing software, editorial strategy, marketing campaign planning, content marketing best practices, content marketing companies, editorial content, content marketing workflow
    
Kapost
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.