HIT Consultant Insightful coverage of healthcare innovation
 

appliance

Results 301 - 325 of 369Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Aug 19, 2014
Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software.
Tags : 
optimization, wan bandwidth, high-latency, traffic, wan
    
Riverbed
Published By: HP     Published Date: Aug 26, 2014
Virtualization increases IT affordability, reliability, and agility, but can also present new storage challenges. Because there is no “one size fits all” solution, HP Simply StoreIT Solutions for Virtualization are based on an IT growth phases that help you navigate to a product that meets the needs of your business. Solutions feature HP Virtual Storage Appliance (VSA), HP MSA, and HP StoreVirtual Converged Storage Appliances (CSA) – all backed by HP's world-class expertise and support. Discover more.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution, improve, exchange, accessibility, management, system, contacts, device, performance, infrastructure, virtualization
    
HP
Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. This Buyer’s Guide highlights the most robust and feature rich integrated backup appliances available on the market today. These backup appliances have many if not all of the features needed to protect both physical and virtual environments and will give you visibility into the new set of features that will define the next generation of integrated backup appliances.
Tags : 
unitrends, integrated backup appliance, backup, recovery
    
Unitrends
Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. DCIG's analysts have done the heavy lifting for you. This Buyer's Guide evaluates the full range purpose-built backup appliance product capabilities, including features that enable the long-term retention of backups in the cloud and even application recovery in the cloud.
Tags : 
unitrends, hybrid cloud backup appliance, cloud, recovery, backup
    
Unitrends
Published By: Oracle Corp.     Published Date: Sep 13, 2012
Read this white paper to get an overview of the Oracle Database family of products and learn how you can transform your business, budgets, and service levels with Oracle Database 11g Release 2.
Tags : 
oracle, database, data guard, analytics, data masking, database appliance
    
Oracle Corp.
Published By: Oracle Corp.     Published Date: Mar 05, 2013
While Oracle has long offered Oracle Exadata to serve the needs of larger enterprises, the Oracle Database Appliance now offers that same high availability, service, and reliability to small- and mid-sized markets.
Tags : 
oracle, database, oracle database appliance, oracle exadata
    
Oracle Corp.
Published By: Eaton     Published Date: Feb 08, 2017
Hyperconvergence collapses the physical components of IT with its virtual aspects into a single appliance form factor. Servers, storage and virtualization layers are bundled into one scalable pool of resources and completely integrated for easier, faster and more costeffective management.
Tags : 
    
Eaton
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: NEC     Published Date: Aug 26, 2014
In addition to high reliability and availability, enterprise mission critical applications, data centers operating 24x7, and data analysis platforms all demand powerful data processing capabilities and stability. The NEC PCIe SSD Appliance for Microsoft® SQL Server® is a best-practice reference architecture for such demanding workloads. It comprises an Express 5800 Scalable Enterprise Server Series with Intel® Xeon® processor E7 v2 family CPUs, high-performance HGST FlashMAX II PCIe server-mounted flash storage, and Microsoft® SQL Server® 2014. When compared with the previous reference architecture based on a server with the Intel® Xeon® processor E7 family CPUs, benchmark testing demonstrated a performance improvement of up to 173% in logical scan rate in a data warehouse environment. The testing also demonstrated consistently fast and stable performance in online transaction processing (OLTP) that could potentially be encountered.
Tags : 
sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: IBM     Published Date: May 30, 2008
This white paper, authored by industry analyst IDC, explores the problems confronting IT organizations today as they seek to bring data together from disparate sources in order to achieve better information coherence, operational efficiency, and more effective overall governance. Specifically, the paper considers the problems posed by the complexity of "data integration" technology in terms of its configuration and maintenance. It looks at the utility of a grid computing approach in providing scalability and manageability for "data integration" and considers how an appliance approach can further reduce cost and risk for customers.
Tags : 
information management, data integration, blade server, ibm, leveraging information, ibm li, li campaign
    
IBM
Published By: IBM     Published Date: Jul 24, 2008
Tune into this TDWI Radio News interview, with Eric Kavanagh, to hear Karen Parrish, vice president of business intelligence solutions for IBM, as she explains Big Blue's take on the evolving industry of data warehouse appliances.
Tags : 
    
IBM
Published By: iDirect     Published Date: Aug 21, 2009
Secure communications is a necessity for many organizations to protect corporate data. Some highly secure organizations mandate the use of third-party encryption devices or external end to end security protocols. The iDirect Network Accelerator is an external appliance that maximizes the speed of encrypted traffic over a satellite network.
Tags : 
network security, encryption, secure communications, idirect, network accelerator, traffic management, cots, ipsec
    
iDirect
Published By: Reactivity     Published Date: Aug 21, 2009
Security is one of the main issues when deploying Web services in the enterprise. This white paper discusses the advantages of an appliance over an agent-oriented architecture for Web services security, how cross platform interoperation is immediate with a hardened appliance, and why web services security is different from web server security.
Tags : 
network architecture, quality assurance, xml, web service management, web service, web service security, web services security, security appliance, security hardware, appliance, reactivity
    
Reactivity
Published By: Sanbolic     Published Date: Aug 21, 2009
NAS solutions built using the Windows Storage Server 2003 on standard Intel platforms provide a very cost effective solution to file serving. Servers built on this platform can export file services using CIFS, NFS, and other protocols, which provides a convenient platform to consolidate files.
Tags : 
network attached storage, network-attached storage, scalability, scalable storage, flexible storage, windows, windows server, nas appliance, sanbolic
    
Sanbolic
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing
    
Secure Computing
Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection, ips, host-based ips, third brigade
    
Third Brigade
Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs, endpoint security, end point security, security hardware, kace
    
KACE
Published By: KACE     Published Date: Nov 14, 2006
This paper explores how Appliance-based Software Delivery (AbSD) provides a better alternative to both software and Software as a Service (SaaS).
Tags : 
appliance, network security, saas, absd, hosted model, on-demand model, software development, value-add, value-added, security appliance, kace
    
KACE
Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management, remote access, remote network management, architecture, jumpnode, jumpnode systems
    
Jumpnode Systems
Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management, jumpnode
    
Jumpnode Systems
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru
    
Decru
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.