HIT Consultant Insightful coverage of healthcare innovation
 

cloud risk

Results 276 - 300 of 309Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : 
security, cloud, ibm, access management, identity management, governance, risk management, compliance
    
IBM
Published By: IBM     Published Date: Jan 25, 2013
Educating Everyone To Guard the Cloud
Tags : 
security, cloud, ibm, access management, identity management, governance, risk management, compliance
    
IBM
Published By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding
    
Courion
Published By: Datto Inc.     Published Date: Jan 31, 2013
You can even conquer a Superstorm when all the pieces come together. Read how the entire Datto team, from product and technical support to the CEO, worked with Partners and their clients to make it through Sandy with data intact and minimal downtime.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Published By: NETIQ     Published Date: Mar 12, 2013
NetIQ’s Identity, Access and Security Management solutions integrate seamlessly to help you control access to cloud services and data, reduce your risk of data breaches in mixed environments.
Tags : 
security and compliance in the cloud
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This paper contains three simple steps for maintaining visibility and control when moving to the cloud and explains how NetIQ can help with each.
Tags : 
netiq, cloud infrastructure, cloud computing, security risks, regulations, information security, compliance management, public cloud, private cloud, hybrid cloud, cloud security, cloud, data security, it security, cloud service, cloud technology, cloud solution, security management
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks
    
IBM
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express
    
Globalscape
Published By: NetApp     Published Date: Mar 05, 2018
Download IDC's paper to learn how a single data management tier across on-premise and multiple clouds is critical to making hybrid cloud and multicloud environments effective. This foundation for digital transformation success helps businesses: improve time to market, cut compliance risk, and enable businesses to innovate at an accelerated pace.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
Companies are moving applications to the cloud with software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS) usage increasing at a steady rate. IDC research has found that over half of organizations currently utilize a hybrid cloud configuration. For many companies, backing up data to the cloud is the easiest way to begin using the cloud. To achieve the benefits of backup to the cloud without taking on extra risk, IT leaders need to understand the nuances of cloud-based storage services and plan accordingly.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: AWS     Published Date: Jul 24, 2019
What you'll learn in this webinar: Optimize your operations by taking advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS). Migrate your Oracle applications and databases to AWS and get all the benefits of the cloud. Migrating mission-critical Oracle databases and applications to the cloud is complex and you may feel locked into your platform. Amazon Aurora provides commercial-grade database performance and availability at a fraction of the cost. Apps Associates—an AWS Partner Network (APN) Partner and Oracle expert—can migrate enterprise workloads to the cloud, freeing customers to focus on higher-value initiatives. Watch this webinar to learn how to: Run your entire Oracle database and application environment on the cloud Take advantage of lower IT costs on the cloud and reduce your Total Cost of Ownership (TCO) Leverage Amazon Aurora to help satisfy your company’s cloud-first mandate, improve security, and reduce risk
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data. Register for our webinar to learn how Pacific Dental leveraged McAfee’s CASB solution, McAfee MVISION Cloud, to address these challenges and fulfill their security responsibility.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
How do you maintain secure systems and operations across an elastic, complex AWS environment? As SailPoint transformed from a startup to a publicly traded company, their AWS infrastructure grew as well. With this growth, SailPoint needed to be able to identify and respond to anomalous behavior quickly, while simultaneously trying to align their organization into a cohesive DevSecOps organization. Join this webinar to learn how SailPoint gained a holistic view into their cloud infrastructure, plus how you can enable your Security and DevOps teams with in-depth insights into AWS infrastructure to make actionable, data-driven decisions to reduce risk.
Tags : 
    
AWS
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Most companies would love to move enterprise applications to the public cloud and cut the costs, complexities, and limitations of current infrastructure. Major public cloud providers, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud have done well in enabling web, mobile, and content applications in the cloud. These are cloud-native applications designed to use cloud “object” storage, and object storage is very popular for use cases such as backup and disaster recovery. However, enterprise applications typically require “block” storage. Although native cloud block storage exists, it has several shortcomings, particularly around reliability, durability, and lack of data mobility. So, enterprise applications have largely stayed on-premises or in private clouds. Now there’s an innovative new way to move enterprise applications to the public cloud while actually reducing risks and tradeoffs. It’s called multicloud storage, and it’s an insanely simple, reliable, secure w
Tags : 
    
Hewlett Packard Enterprise
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle
    
Veracode
Published By: Pure Storage     Published Date: Jul 18, 2017
Application consolidation can be an important cloud initiative. By consolidating applications on an all-flash, cloud-centric platform, IT has the opportunity to reduce costs, lower risk and support a more integrated and interoperable infrastructure. But for any organization thinking about application consolidation, it is important to closely evaluate the features and functions of the underlying all-flash storage platform. You want to make sure that your platform not only delivers the performance you need, but also enables you to reduce costs, eliminate migrations, simplify operations and support cloud-enabled business agility.
Tags : 
it management, administration, flash storage, cloud centric platform
    
Pure Storage
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : 
carbonite, doubletake, risk mitigation
    
Carbonite
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : 
cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx, vsrx
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Leveraging cloud technology enables your enterprise to be more agile and competitive while significantly reducing costs. However, there are risks associated with these benefits. Getting new capabilities quickly is worth far less if it means exposing vulnerabilities that result in regulatory compliance violations and fees, loss of intellectual property (IP), loss of customer data, or damage to your reputation, brand, and future business.
Tags : 
    
Oracle Security Solutions
Published By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for manufacturing operations that assists customers with the entire process: from financial management to supply chain management and production management. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectivelyexamine the potential return on investment (ROI) enterprises may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their manufacturing organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with four Enterprise Management manufacturing customers, each with at least three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
    
Sage People
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.