HIT Consultant Insightful coverage of healthcare innovation
 

cis

Results 3976 - 4000 of 4242Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Aug 18, 2014
You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Are you looking to maximize the productivity of the workforce by shifting to the cloud? Do you have a robust Collaboration platform in place to enable the new world of work? See for yourself all the reasons companies are shifting to the cloud and lowering total cost of ownership. Gain an edge by upgrading to Cisco Unified CM Version 9.0 or higher.
Tags : 
research, collaboration, new world, work, cloud, platform, ownership, cost, productivity, maximize, robust
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Are you thinking of implementing collaboration features? 80% of businesses have deployed unified communications and collaboration from VoIP to collaboration platforms and even WebRTC clients. Download this commissioned study conducted by Forrester Consulting on behalf of Cisco. Discover how UC and Collaboration technologies have delivered real business benefits today.
Tags : 
research, collaboration, new world, work, cloud, platform, ownership, cost, productivity, maximize, robust, business value, communications, technologies
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Do communications really lead to a competitive advantage? Can a best-in-class unified communications platform lead to increased workforce and customer engagement? Get details in the “Unlocking the Full Potential of Collaboration with Cisco Unified Communications Manager Release 9” white paper.
Tags : 
research, customer engagement, communications, migrate, collaboration, new world, work, cloud, platform, ownership, cost, productivity, maximize, robust
    
Cisco
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Get CIO perspectives on the changing roles and relevance of IT teams in this report.
Tags : 
cloud computing, security, compliance vulnerabilities, visibility, service level agreements, cloud technologies
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Get the Cisco Validated Design Guide that helps you deploy personal, corporate, and guest devices on a highly secure network. Complete the form to get the design guide now.
Tags : 
design guide, deploy devices, securely deploy, byod, infrastructure, devices, device managers, configuration foundations, deployment
    
Cisco
Published By: Cisco     Published Date: Mar 03, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking. At the same time, the Internet of Everything (IoE) is accelerating. Opportunities are opening up for businesses and attackers alike as more things come online, along with the people, processes, and data that interact with them.
Tags : 
security, detection, blocking, data
    
Cisco
Published By: Cisco     Published Date: Mar 04, 2015
When it comes to game-changing infrastructure technologies, private clouds are leading the way toward new IT efficiencies and a simplified means of consumption. Building on their roots as virtualized data centers, private clouds are rapidly moving up the list of must-have technologies to become an architectural standard for IT organizations around the world.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 25, 2015
Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5585-X SSP60 v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall methodology v5.4 available on nsslabs.com.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco, firewall
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
The SVM depicts the value of a deployment of twenty NGFW devices and the appropriate central management console for each vendor.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Published By: Cisco     Published Date: Jun 02, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution.
Tags : 
malware protection, network security, it security, application security
    
Cisco
Published By: Cisco     Published Date: Jul 30, 2015
Transform IT.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 03, 2015
Business value of UCS.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Learn how IoT can help you improve business efficiency, control intelligence from a wide range of equipment, enhance operations, and increase customer satisfaction.
Tags : 
iot, internet of things, data management, business efficiency, manufacturing process, customer satisfaction, business intelligence, automation
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Learn more from executives who work with manufacturing companies that “bridge the IoT divide.”
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Overcome the limitations of traditional IT infrastructure and transform their data centers to support innovation and growth.
Tags : 
data center, it management, infrastructure, growth, innovation, support
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : 
unified communication, communication trends, midsize business, byod, bring your own device, mobility, it management, workforce management, telecommunication, deployment models, cloud integration, security requirements
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
A data center fabric is critical to a next-generation data center.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Learn more about the advantages of each decision based on your own business and IT priorities to learn which communication deployment option works best
Tags : 
cloud computing, communication deployment, it priorities, collaboration solutions, collaboration capabilities, workforce management, cisco solutions, growth plans, cloud service, byod policy, bring your own device
    
Cisco
Start   Previous    153 154 155 156 157 158 159 160 161 162 163 164 165 166 167    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.