HIT Consultant Insightful coverage of healthcare innovation
 

business network

Results 176 - 200 of 752Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
View this paper now to explore the top four security risks businesses face when using social networks. In addition, discover various ways to protect against and mitigate these risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Noction     Published Date: Jan 09, 2014
Service Providers have unique networking challenges as compared to other environments. Factor, differentiating Service Provider`s network from others, is the requirement for 100% uptime. The network stability is crucial to their customers’ business and is, therefore, intolerant to disruptions or outages, which may damage the company`s reputation and market position, or even affect it irreversibly. Downtime risks can no longer be mitigated by simply over-engineering the network, but rather deploying network optimization solutions, based on the intelligent monitoring and automated response, versus manual network troubleshooting and brute force time spending.
Tags : 
network performance, congestion, outages, downtime, hosting, bgp, router, ip network, networking, network, performance, optimization, network infrastructure, service provider, cdn, risks
    
Noction
Published By: Extreme Networks     Published Date: Feb 12, 2015
En este documento, le mostraremos casos de uso concretos de cómo una solución de business intelligence puede ser muy útil para gestionar eficientemente las operaciones de TI
Tags : 
solución de business intelligence, extreme networks, operaciones de ti
    
Extreme Networks
Published By: Mitel     Published Date: Mar 30, 2017
It's no secret that mobile technology has revolutionized the way consumers conduct their lives. Mobile technology has become ubiquitous, influencing the business workplace and workforce. Last year, IDC predicted that 75% of the US and nearly 40% of the global workforce would be mobile and signs indicate that the rate of mobile growth is only being accelerated by the advancement of cloud technology, improved security, and more reliable network access.
Tags : 
    
Mitel
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
Most businesses have experienced an IT or technology outage in the past five years. Outages and disruptions result in business and IT challenges. Business continuity and disaster recovery (BCDR) plans ensure a company's ability to continue business uninterrupted and survive unforeseen disruptions. By adopting network diversity, IT pros expect to experience a variety of business and IT benefits, including protection against unexpected disruptions. Check out this easy-to-absorb infographic, based on Forrester survey data, to learn how your peers view the importance and structure of BCDR strategies.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
What does high growth mean to your business? Ask your business peers that question and there will be critical elements and key priorities in common: the need for speed and efficiency, a future-proof technology strategy, and high-performance network connectivity, just to name a few. Of course, reliability, scalability, and security will also come up as indispensable aspects of any high-growth solution. This guide gives you an overview of the steps you need to build a foundation for sustainable growth -- the kinds of investments, drivers, and differentiators that are involved.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
Catskill Hudson Bank has grown from its roots as a community bank serving Sullivan County, NY to providing services to business customers across five counties by merging small-town customer service with "a big-bank technology backbone." As a result of this growth and to better respond to today's business customers, the bank needed better connectivity, reliability, and functionality than its existing network could provide. Read this case study to learn how Catskill Hudson Bank can push over 30 time more data over its network than before with better reliability, speed, and security.
Tags : 
    
Spectrum Enterprise
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: Windstream     Published Date: Oct 08, 2018
Vetted Third-Party Service Providers Facilitate The Creation Of Individualized Business Network Fabrics
Tags : 
    
Windstream
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As Italy’s businesses grew increasingly vulnerable to the threat of ransomware, data breaches, and other malicious malware attacks, service provider Telecom Italia sought an innovative solution to effectively and efficiently protect the network and data of its business users. In this case study, you’ll read about how Italy’s largest service provider partnered with Cisco Umbrella to increase value for customers and accelerate their revenues with cloud security.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"We live and surf in a cyber world where attacks like APT, DDOS, Trojans and Ransomware are common and easy to execute. Domain names are an integral part of any business today and apparently an integral part of an attacker's plan too. Domain names are carriers of malwares, they act as Command and Control servers and malware's ex-filtrate data too. In today's threat landscape - predicting threats, spotting threats and mitigating them is super crucial.. This is called Visibility and Analytics. Watch this on demand session with our Cisco cloud security experts Shyam Ramaswamy and Fernando Ferrari as they talk about how Cisco Umbrella and The Umbrella Research team detect anomalies, block threats and identify compromised hosts. The experts also discuss how effectively Cisco spot, react, filter out IOC, block the network communications of a malware; identify and stop a phishing campaign (unknown ones too). "
Tags : 
    
Cisco Umbrella EMEA
Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
Exploring four commonalities that drive organziations toward hybrid IT can help you make a business case for expanding and automating your data center. • Cloud’s role in providing your high-performance computing requirements • Evolving asset refresh cycle and expansion needs in the face of security threats • Strategic innovation investments to gain competitive market advantage
Tags : 
    
Juniper Networks
Published By: Cisco     Published Date: Sep 27, 2018
Blockchain, called the “tech breakthrough megatrend” by PWC¹, is rapidly gaining broad acceptance. According to IDC, global spending on this innovative technology is expected to reach $2.1 billion in 2018.² Across the globe, industries are investigating ways to use blockchain to increase trust across their business value chains and address primary challenges around complexity, transparency, and security.
Tags : 
    
Cisco
Published By: Aerohive     Published Date: May 13, 2015
A paper on enabling cloud networking to lower IT costs & boost IT productivity.
Tags : 
benefits of cloud networking, advantages of cloud networking, cloud, networking, cloud networking, aerohive networks, hivemanager, cloud computing
    
Aerohive
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Laser 2000     Published Date: Mar 12, 2019
Network
Tags : 
    
Laser 2000
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: Avaya     Published Date: Dec 18, 2013
It is a business maxim that the more a company knows about its customers and what they want, the better its chances of providing them a positive, fulfilling experience. With today’s ubiquitous, convenient communications methods, particularly the use of mobile devices and networks, opportunities for rich customer interactions are flourishing. Whether their interest is pricing, store locations or product support, people increasingly expect information to be available wherever, whenever and however they want it.
Tags : 
avaya, cem, customer experience management, contact center, mobile, mobile devices, customer interactions
    
Avaya
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.