HIT Consultant Insightful coverage of healthcare innovation
 

critical data

Results 326 - 350 of 656Sort Results By: Published Date | Title | Company Name
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: F5 Networks Inc     Published Date: May 03, 2017
Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. But what does "performance" actually mean? In general, ADC vendors publish four main types of metrics to demonstrate performance: Requests per second (RPS) Connections per second (CPS) Transactions per second (TPS) Throughput (often measured in gigabits per second, Gbps) Download now to learn more!
Tags : 
application delivery controllers, cloud, data center, performance metrics
    
F5 Networks Inc
Published By: HP     Published Date: Jul 29, 2008
Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.
Tags : 
mission critical, security, datacenter, data center, storage security
    
HP
Published By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : 
netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage
    
NetApp
Published By: NetApp     Published Date: Jun 09, 2009
This paper focuses generally on optimal storage and storage management for SharePoint and specifically evaluates NetApp's approach, detailing how the capabilities in NetApp's DataONTAP and SnapManager for SharePoint Server offerings help to drive storage efficiency, reduce cost, and exclude complexity in a comprehensive SharePoint implementation. It is not so much a "how to" guide, but rather a "why to" explanation. Learn more today!
Tags : 
netapp, microsoft, sharepoint, networked storage, snapmanager, dataontap, direct attached storage, das
    
NetApp
Published By: HP Data Center     Published Date: Feb 18, 2009
Identify a strategic entry point for data center transformation to achieve facilities that are scalable, modular, energy-efficient, and continuously available.
Tags : 
hp critical facilities services, hp data center, eyp mcf, strategic entry point, data center transformation, scalability, energy-efficient, continuous availability
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained.
Tags : 
hp data center, data center, optimization, business strategy, hot spots, mission critical loads”, the it infrastructure, the availability
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
To accommodate increasingly dense technology environments, increasingly critical business applications, and increasingly stringent service level demands, data centers are typically engineered to deliver the highest-affordable availability levels facility-wide. Within this monolithic design approach, the same levels of mechanical, electrical, and IT infrastructure are installed to support systems and applications regardless of their criticality or business risk if unplanned downtime occurs. Typically, high redundancy designs are deployed in order to provide for all eventualities. The result, in many instances, is to unnecessarily drive up both upfront construction or retro-fitting costs and ongoing operating expenses.
Tags : 
hp data center, hybrid data center, dense technology environments, hybrid data center, critical business applications, it infrastructure, high redundancy designs, pods
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
When considering server virtualization, planning and design are critical.  How do you optimize your environment through virtualization?  How do you keep your server sprawl from becoming virtual server sprawl?  How will a virtualized environment help your business?  Will your existing data center meet current, and future, business requirements? Answer your Questions today!
Tags : 
hp data center, virtualization, server planning, server design, server sprawl, tco, roi, server consolidation
    
HP Data Center
Published By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization
    
VMware
Published By: VMware     Published Date: Feb 26, 2009
The primary goal of this guide is not simply to provide a checklist of tasks, but to help you develop an understanding of the disaster recovery (DR) planning process and the principles that underlie it. Before getting into the details, let’s consider first just what this guide will do for you and equally importantly, what it will not do. What this guide will do is to lay out a framework for DR planning that keeps things conceptually simple and helps you know what steps must be carried out and why, without a lot of jargon or unnecessary formality.
Tags : 
ca xosoft, vmware, disaster recovery, business impact analysis, bia, outside-in analysis, inside-out analysis, contingency planning guide
    
VMware
Published By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : 
vmware, disaster recovery, smb, it system, it infastructure, virtualization, storage replication, ups
    
VMware
Published By: Revinetix, Inc.     Published Date: Nov 03, 2010
Ensuring immediate access to business critical data following a disaster event is a top priority for IT management. More organizations are replicating their backups to remote locations for disaster recovery.
Tags : 
revinetix, disaster recovery, business continuity, remote backup replication, business critical data, disk backup, remote replication
    
Revinetix, Inc.
Published By: Mimecast     Published Date: Nov 10, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, software as a service, saas, data loss prevention, risk and compliance, email, security
    
Mimecast
Published By: Citrix Systems     Published Date: Sep 06, 2013
As the adoption of mobile devices continues to expand, IT organizations are challenged to keep up with the mobile demands of today’s fast-paced workforce and at the same time secure critical business data.
Tags : 
citrix, windows mobile
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
An ADC is one of the most critical elements of an organization’s datacenter and cloud architecture. As you evaluate ADC solutions, it’s essential to pay close attention to their ability to address the most important challenges in your environment. This paper highlights nine key datacenter and cloud architecture challenges that NetScaler helps solve more effectively than F5 to help you.
Tags : 
    
Citrix Systems
Published By: Oracle Global Marketing     Published Date: Jul 13, 2012
As the amount and importance of corporate data grows, companies of all sizes are finding that they increasingly need to deploy high-availability database solutions to support their business-critical applications.
Tags : 
data, database, oracle database appliance, choosing hardware. storage, internal networking, memory, cpu, verify patch compatibility
    
Oracle Global Marketing
Published By: Netezza IBM US     Published Date: Feb 29, 2012
This white paper details seven steps that are critical for delivering big data projects that can be undertaken to turn the flood of data into an advantage, and truly understand one's network and one's customers, while turning up profitability.
Tags : 
network, network analytics, data management, customer relation, data projects, customer satisfaction, data quality
    
Netezza IBM US
Published By: CDW     Published Date: Jun 10, 2013
It’s critical to understand how a defense-in-depth strategy can protect the most precious information asset: data.
Tags : 
cdw, enterprise encryption, defense-in-depth, sensitive data, security posture, encryption of information, compliance, security posture
    
CDW
Published By: CDW     Published Date: Jun 18, 2013
A mix of well-thought-out policies and up-to-date technologies are needed to protect critical data.
Tags : 
cdw, mobile security, protecting data, critical data. notebooks, smartphones, tablets
    
CDW
Published By: McAfee     Published Date: Mar 08, 2013
With McAfee® Database Security, achieving protection and compliance is easier than you might think.
Tags : 
database security, database audit, database compliance, cert, database security policy, database vulnerability management, database virtual patching, database activity monitoring
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : 
database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection
    
McAfee
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee
Published By: Dell     Published Date: Sep 12, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.