HIT Consultant Insightful coverage of healthcare innovation
 

application access

Results 251 - 275 of 326Sort Results By: Published Date | Title | Company Name
Published By: Ericom     Published Date: Nov 05, 2012
The accelerating BYOD trend and the need to reduce IT overhead, organizations need to empower users with secure browser-based access to Windows Applications and desktops from any device. Learn how AccessNow empowers mobility and security.
Tags : 
ericom, html5, rdp, accessnowt, windows apps, desktops, mobility
    
Ericom
Published By: Reed     Published Date: Aug 03, 2013
The proliferation of mobile devices has created an insatiable appetite among users for applications that give them instant access to the content they want in the form they want it whenever and wherever desired. So the sparring between HTML5 and Native centers on the best means of developing engaging apps to meet this growing demand.
Tags : 
    
Reed
Published By: HP     Published Date: Jun 30, 2015
What continuous delivery means to a test automation engineer.
Tags : 
application performance, scalability, continuity, efficiency, savings, remote access
    
HP
Published By: IBM     Published Date: May 28, 2014
Different types of data have different data retention requirements. In establishing information governance and database archiving policies, take a holistic approach by understanding where the data exists, classifying the data, and archiving the data. IBM InfoSphere Optim™ Archive solution can help enterprises manage and support data retention policies by archiving historical data and storing that data in its original business context, all while controlling growing data volumes and improving application performance. This approach helps support long-term data retention by archiving data in a way that allows it to be accessed independently of the original application.
Tags : 
ibm, data retention, information governance, archiving, historical data, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : 
cloud environment, iaas, paas, saas, access management
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Read Tolly's assessment of web application protection, federation capabilities, risk-based access features and overall performance of IBM Security Access Manager.
Tags : 
ibm, security, security access manager, federation capabilities, risk management, best practices, technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Having an integrated approach to access management for mobile, web and cloud applications is essential to taking control of access management.
Tags : 
ibm, security, access management, access manager, integrated access management
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
ibm, security, identity governance and intelligence, identity governance
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Cisco     Published Date: Jul 11, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
    
Cisco
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : 
identities, manage identities, manage application access, application access
    
Group M_IBM Q1'18
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Businesses understand more than ever that they depend on data for insight and competitive advantage. And when it comes to data, they have always wanted easy access and fast performance. But how is the situation different now? Today, organizations want those elements and more. They want IT to strip away the limitations of time with faster deployment of new databases and applications. They want IT to reduce the limitations of distance by giving remote and branch offices better and more reliable access. And in a global world where business never stops, they want IT to ensure data availability around the clock. If IT can deliver databases and applications faster, on a more automated and consistent basis, to more locations without having to commit onsite resources, IT will be free to focus on more strategic projects."
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: F5     Published Date: Jan 31, 2013
Cloud computing is becoming a key IT resource, but securing applications and data in the cloud remains a concern. Secure remote access tech, web application firewalls, network-side scripting and other strategies can make cloud deployments secure.
Tags : 
securing cloud, cloud computing, security, cloud security, authenticaion, authorization
    
F5
Published By: Cisco     Published Date: Apr 10, 2015
Walk past your data center, and you might hear a soft, plaintive call: “Feed me, feed me…” It is not your engineers demanding more pizza. It is your servers and applications. And the call is growing louder New Cisco® 40-Gbps bidirectional (BiDi) optical technology lets you bring 40-Gbps speeds to the access layer using the same 10-Gbps cable plant you are using today. It is a huge cost savings, whether you are upgrading your current data center or building a new one. And it means you can start taking advantage of 40-Gbps performance for your business right now without needing special budget approval and without having to wait a year to get the capacity you need.
Tags : 
cisco, transceiver modules, wireless, cost effective, high performance switch, optical technology
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
    
Cisco
Published By: Epicor     Published Date: Sep 25, 2014
The software as a service (SaaS) model of application delivery, more commonly known as ‘cloud deployment’, in which software features are accessed through a Web browser, is an excellent way for manufacturing companies to get the bene?ts of enterprise resource planning (ERP) systems without the need to build additional IT infrastructure. ERP functionality delivered “from the cloud” avoids the complexity and costs that often accompany on premisess ERP implementations, and typically provides a much more favorable total cost of ownership, compared to legacy on premisess deployment. Companies subscribe to the software features that they need and can add new ones as business requirements change, without buying additional servers or storage to support new functionality. The ERP features are the same as for an on premises ERP system, except that it is hosted and maintained on the Cloud provider’s infrastructure.
Tags : 
saas, cloud deployment, cloud erp, it infrastructure, software features, application delivery
    
Epicor
Published By: VMware AirWatch     Published Date: May 18, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization
    
VMware AirWatch
Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network
    
Cisco
Published By: Cisco     Published Date: Apr 11, 2016
Cisco made Application Policy Infrastructure Controller Enterprise Module (APIC-EM) generally available on November 3rd, 2015. It is an SDN controller that supports apps that make WAN and access networks easier to deploy and manage. Cisco’s focus on a low-risk, incremental approach to adopting SDN will appeal to its user-base. Cisco needs to describe the policy control capabilities benefits of APIC-EM, and also highlight its power as a platform and its ability to distinguish apps from point solution offerings from many other companies with competitive features.
Tags : 
esg brief, cisco apic, sdn controller, wan, sdn
    
Cisco
Published By: VMware     Published Date: Dec 15, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch® support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, VMware AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
    
VMware
Published By: VMware     Published Date: Dec 15, 2016
Organizations that invest in proprietary applications and data for competitive advantage in their industries only succeed by making those investments available to employees, customers, and partners that drive revenue and opportunity. Securing those investments requires a fresh perspective as the types of devices accessing the cloud datacenter are changing rapidly and new workloads, such as VDI desktops, are appearing more regularly alongside server workloads. These changes alter the potential attacks and potential threats to datacenters whose security primarily stands firm at the perimeter, however, within the data center the security is weak. By combining VMware NSX with the AirWatch Tunnel and/or VMware Horizon View, organizations are able to bridge the device to datacenter security gap in a way that both increases the overall security of the cloud datacenter and makes it far simpler to manage security through defining and delegating application and services to specific users. Thi
Tags : 
    
VMware
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
citrix, mobile, deployment, app
    
Citrix Systems, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.