HIT Consultant Insightful coverage of healthcare innovation
 

cloud visibility

Results 26 - 50 of 158Sort Results By: Published Date | Title | Company Name
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Sep 12, 2018
The Internet of Things (IoT) didn’t just connect everything everywhere; It laid the groundwork for the next industrial revolution. Connected devices sending data was only one achievement of the IoT—but one that helped solve the problem of data spread across countless silos that was not collected because it was too voluminous and/or too expensive to analyze. Now, with advances in cloud computing and analytics, cheaper and more scalable factory solutions are available. This, in combination with the cost and size of sensors continuously being reduced, supplies the other achievement: the possibility for every organization to digitally transform. Using a Smart Factory system, all relevant data is aggregated, analyzed, and acted upon. Sensors, devices, people, and processes are part of a connected ecosystem providing: • Reduced downtime • Minimized surplus and defects • Deep insights • End-to-end real-time visibility
Tags : 
internet of things, connected ecosystem, big data, operations monitoring, process control, analytical techniques
    
TIBCO Software
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: Anaplan     Published Date: Sep 07, 2018
For many years, large corporations have employed financial planning and analysis professionals to oversee budgeting, planning, forecasting and analysis. But the sea-change in technology, data and the competitive landscape is having a sustained impact on the FP&A function as it transforms from a predominately budgeting function to a forward-focussed strategic contributor. Now, as new cloud technology makes implementing modern FP&A quicker and cheaper, the function has become more accessible to medium-sized, or even smaller, organisations. There is a nascent but growing realisation that this corner of the finance function should be demanding more of an organisation’s attention, large or small, because having accurate and timely visibility, further into the future, could mean the difference between success and failure in today’s highly uncertain and volatile business environment.
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Sep 07, 2018
For many years, large corporations have employed financial planning and analysis professionals to oversee budgeting, planning, forecasting and analysis. But the sea-change in technology, data and the competitive landscape is having a sustained impact on the FP&A function as it transforms from a predominately budgeting function to a forward-focussed strategic contributor. Now, as new cloud technology makes implementing modern FP&A quicker and cheaper, the function has become more accessible to medium-sized, or even smaller, organisations. There is a nascent but growing realisation that this corner of the finance function should be demanding more of an organisation’s attention, large or small, because having accurate and timely visibility, further into the future, could mean the difference between success and failure in today’s highly uncertain and volatile business environment.
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Aug 28, 2018
For many years, large corporations have employed financial planning and analysis professionals to oversee budgeting, planning, forecasting and analysis. But the sea-change in technology, data and the competitive landscape is having a sustained impact on the FP&A function as it transforms from a predominately budgeting function to a forward-focussed strategic contributor. Now, as new cloud technology makes implementing modern FP&A quicker and cheaper, the function has become more accessible to medium-sized, or even smaller, organisations. There is a nascent but growing realisation that this corner of the finance function should be demanding more of an organisation’s attention, large or small, because having accurate and timely visibility, further into the future, could mean the difference between success and failure in today’s highly uncertain and volatile business environment.
Tags : 
rise, fp&a, corporation, professional, landscape, technology
    
Anaplan
Published By: Tenable     Published Date: Aug 07, 2018
"Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough. Get the CISO POV in this on-demand webcast and learn how to: • Minimize the attack surface • Expand visibility of assets beyond the perimeter • Enhance security practices to accommodate more dynamic IT environments"
Tags : 
cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
    
Tenable
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
Is your WLAN under increasing pressure from more users, more types of connected devices, and more bandwidth-intensive applications? It’s time to consider a better solution. With Ruckus Cloud Wi-Fi you get simple, centralized cloud-based management and the best performing Wi-Fi access points for high-density environments. Your job gets easier and your Wi-Fi gets better. Get visibility and control of your distributed Wi-Fi network with bandwidth to spare.
Tags : 
    
Ruckus Wireless
Published By: Butler Technologies     Published Date: Jul 02, 2018
As enterprises become more distributed and migrate applications to the cloud, they will need to diversify their network performance management solutions. In particular, the network operations team will need to complement its packet-based monitoring tools with active test monitoring solutions to enhance visibility into the cloud and help enterprises scale monitoring gracefully and cost-effectively.
Tags : 
    
Butler Technologies
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies
Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: Avi Networks     Published Date: May 14, 2018
Microsoft Azure is the cloud platform of choice for many enterprises to run their applications. Migrating applications to Azure requires specific strategies for application networking services such as load balancing, visibility, and performance monitoring. We have developed a step-by-step guide to setting up scalable application networking services in Microsoft Azure based on the application migration experiences of Fortune 500 enterprises. In this webinar, you'll learn: Best practices for load balancing in Microsoft Azure Analyzing application performance How to elastically scale applications on demand Ways to optimize deployments across hybrid clouds
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: May 14, 2018
Microsoft Azure is the cloud platform of choice for many enterprises to run their applications. Migrating applications to Azure requires specific strategies for application networking services such as load balancing, visibility, and performance monitoring. We have developed a step-by-step guide to setting up scalable application networking services in Microsoft Azure based on the application migration experiences of Fortune 500 enterprises. In this webinar, you'll learn: Best practices for load balancing in Microsoft Azure Analyzing application performance How to elastically scale applications on demand Ways to optimize deployments across hybrid clouds
Tags : 
    
Avi Networks
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Sherwood International, a specialist in providing customised in-bound supply chain solutions into Africa, has implemented the Sage Business Cloud Enterprise Management solution business management solution to boost efficiencies in its operations and gain better visibility into its business. It has also been able to streamline finances and improve operational controls.
Tags : 
    
Sage Software (APAC)
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Data overload have burdened practically every largescale enterprise today. It’s vital for competitive enterprise not only to find solutions that will deliver the right data at the right time, but also be confident that the data they are looking at is governed and trusted. Sage Business Cloud Enterprise Management enables businesses to gain real-time access to data and make critical business decisions; achieve a better ROI while reducing IT overhead; automate data integration and deliver a 360-degree view of the businesses; mitigate data security risks and comply with legal regulations. Download this whitepaper and discover how to overcome some common challenges of information overload to increase your business insight and visibility.
Tags : 
    
Sage Software (APAC)
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Schneider Electric     Published Date: Apr 20, 2018
Provide stable data center and network services across a multi-building, multi-campus school district.
Tags : 
data closets, cloud management, remote visibility, it staff, data center
    
Schneider Electric
Published By: Zebra Technologies     Published Date: Mar 07, 2018
To keep your operations running smoothly, you need industrial printers that are ready for today, ready for tomorrow, ready for anything. Zebra’s new ZT600 printers deliver next-generation power, intelligence and performance, in virtually any industrial environment. Building on the legacy of the legendary Xi™ Series, the ZT610™ and ZT620™ are built for best-in-class integration, deployment, management and maintenance: • Link-OS® remote management and cloud capabilities give you complete visibility—anywhere, anytime. • Secure cloud connections with advanced diagnostics let you scale up or down quickly and easily. • Micro-consistent printing delivers high-quality labels as small as 3mm. • Field-installable upgrades and flexible configuration options future-proof your set-up. Rugged environments? Demanding applications? Unpredictable challenges? Keep your supply chains working at full tilt with full visibility, thanks to the brawn, brains and adaptability of Zebra’s new ZT600 printers.
Tags : 
industrial printer, supply chain operations, plant floor, warehouse inventory, loading docks, printer durability, printer management, rugged environments, label capabilities, cloud connectivity
    
Zebra Technologies
Published By: NetApp     Published Date: Mar 05, 2018
For your hybrid cloud, you need visibility and actionable intelligence across both on-premises infrastructure and multiple cloud services. Learn how the right analytics software will help you gain new insights into your IT Infrastructure and improve control of your data in the hybrid cloud.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
In today’s evolving hybrid- and multicloud world, successful organizations need to make the best decisions about where to run their applications and workloads. But this demands sweeping visibility into data location, utilization, and performance.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Workday     Published Date: Feb 27, 2018
The benefits of cloud computing—a high return on investment, greater staff efficiencies, optimisation of IT resources, plus enhanced visibility and access to information—have piqued the interest of CFOs and finance leaders who are actively evaluating the risks versus the rewards of the cloud delivery model. Although a steady migration to the cloud is happening in many areas of the enterprise, finance professionals still have questions regarding the security, performance, privacy, risks and the actual cost and value of cloud computing. Download this whitepaper today and discover the benefits of moving finance operations to the cloud, and how it can drive sustainable ROI.
Tags : 
cloud, computing, workday, migration, enterprise, security, privacy
    
Workday
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.