HIT Consultant Insightful coverage of healthcare innovation
 

cis

Results 3726 - 3750 of 3972Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Aug 18, 2014
Are you thinking of implementing collaboration features? 80% of businesses have deployed unified communications and collaboration from VoIP to collaboration platforms and even WebRTC clients. Download this commissioned study conducted by Forrester Consulting on behalf of Cisco. Discover how UC and Collaboration technologies have delivered real business benefits today.
Tags : 
research, collaboration, new world, work, cloud, platform, ownership, cost, productivity, maximize, robust, business value, communications, technologies
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Do communications really lead to a competitive advantage? Can a best-in-class unified communications platform lead to increased workforce and customer engagement? Get details in the “Unlocking the Full Potential of Collaboration with Cisco Unified Communications Manager Release 9” white paper.
Tags : 
research, customer engagement, communications, migrate, collaboration, new world, work, cloud, platform, ownership, cost, productivity, maximize, robust
    
Cisco
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Get CIO perspectives on the changing roles and relevance of IT teams in this report.
Tags : 
cloud computing, security, compliance vulnerabilities, visibility, service level agreements, cloud technologies
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Get the Cisco Validated Design Guide that helps you deploy personal, corporate, and guest devices on a highly secure network. Complete the form to get the design guide now.
Tags : 
design guide, deploy devices, securely deploy, byod, infrastructure, devices, device managers, configuration foundations, deployment
    
Cisco
Published By: Cisco     Published Date: Mar 03, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking. At the same time, the Internet of Everything (IoE) is accelerating. Opportunities are opening up for businesses and attackers alike as more things come online, along with the people, processes, and data that interact with them.
Tags : 
security, detection, blocking, data
    
Cisco
Published By: Cisco     Published Date: Mar 04, 2015
When it comes to game-changing infrastructure technologies, private clouds are leading the way toward new IT efficiencies and a simplified means of consumption. Building on their roots as virtualized data centers, private clouds are rapidly moving up the list of must-have technologies to become an architectural standard for IT organizations around the world.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 25, 2015
Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5585-X SSP60 v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall methodology v5.4 available on nsslabs.com.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco, firewall
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
The SVM depicts the value of a deployment of twenty NGFW devices and the appropriate central management console for each vendor.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Published By: Cisco     Published Date: Jun 02, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution.
Tags : 
malware protection, network security, it security, application security
    
Cisco
Published By: Cisco     Published Date: Jul 30, 2015
Transform IT.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 03, 2015
Business value of UCS.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Learn how IoT can help you improve business efficiency, control intelligence from a wide range of equipment, enhance operations, and increase customer satisfaction.
Tags : 
iot, internet of things, data management, business efficiency, manufacturing process, customer satisfaction, business intelligence, automation
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Learn more from executives who work with manufacturing companies that “bridge the IoT divide.”
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Overcome the limitations of traditional IT infrastructure and transform their data centers to support innovation and growth.
Tags : 
data center, it management, infrastructure, growth, innovation, support
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : 
unified communication, communication trends, midsize business, byod, bring your own device, mobility, it management, workforce management, telecommunication, deployment models, cloud integration, security requirements
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
A data center fabric is critical to a next-generation data center.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Learn more about the advantages of each decision based on your own business and IT priorities to learn which communication deployment option works best
Tags : 
cloud computing, communication deployment, it priorities, collaboration solutions, collaboration capabilities, workforce management, cisco solutions, growth plans, cloud service, byod policy, bring your own device
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Magic Quadrant report looking specifically at on-premises unified communications requirements for midsize organizations with 100 to 999 employees.
Tags : 
unified communications, midsize enterprise, uc solutions, productivity, business process, enterprise communications methods, integrated application, collaboration application, personal communication, mobility management, byod, analytic tools, business application, business process management
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
VMDC 2.2 is an incremental release, leveraging and only slightly modifying the architecture.
Tags : 
data center, it management, infrastructure, architecture, applications, delivery
    
Cisco
Start   Previous    143 144 145 146 147 148 149 150 151 152 153 154 155 156 157    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.