HIT Consultant Insightful coverage of healthcare innovation
 

distributed

Results 226 - 250 of 483Sort Results By: Published Date | Title | Company Name
Published By: Kaseya     Published Date: May 13, 2015
Healthcare systems are inherently distributed across large campus environments, making regular IT systems management complex and time consuming. The risks of irregular maintenance and non-compliance of IT and security policies are not only measured in dollars lost but in lives saved.
Tags : 
business intelligence, enterprise content management, data warehousing, network infrastructure
    
Kaseya
Published By: Polycom     Published Date: May 12, 2015
To build deep relationships across a distributed network of consumers without skyrocketing costs, FSIs are turning to Highly Interactive Virtual Environments (HIVEs).
Tags : 
polycom, enterprise, collaboration, fsi, compliance
    
Polycom
Published By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to hospitality networks, and how to protect against them. As we are expected to host more information on our network, we increase our risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data. Customers expect to be able do everything online, and won’t tolerate any interruption in service. This expectation inhibit a situation where an attacker is holds your web services hostage, and you have to choose between paying them off or apologizing to a lot of angry customers.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
Never have Distributed Denial of Service attacks been more present globally, and it’s time for the hospitality industry to take notice. They have shut down of?ces, caused ransom-like threats, and created an atmosphere where a sophisticated attack could come from almost anywhere at almost any time.
Tags : 
    
Cox Business
Published By: Corero     Published Date: Dec 05, 2014
Few hosting providers today offer sufficient protection from DDoS attacks, so those that can implement robust DDoS attack protection will be able to more efficiently protect their hosted infrastructure and gain a competitive advantage in the marketplace. They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection services.
Tags : 
corero, ddos, distributed denial of service, data protection, ddos attack, threat protection, hosted threats
    
Corero
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : 
cognizant, banking, digital
    
Cognizant
Published By: IBM     Published Date: Dec 11, 2012
Enterprise Ready Intelligent Capture (ERIC) — a coordinated approach to document input and processing that combines distributed and centralized scanning with fax and electronic conversion across numerous departments. Read on to learn more.
Tags : 
government agencies, critical improvements, paper bound functions, ibm, enterprise ready intelligent capture, efficiency
    
IBM
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Tricentis     Published Date: Jan 22, 2019
Recent SAP advancements such as SAP S/4HANA and SAP Fiori 2.0 enable the agile, modular and distributed enterprise application environment necessary for successful Digital Transformation. However, as organizations upgrade, it becomes increasingly clear that conventional (manual) software testing approaches can’t satisfy the new business demands. Read this paper to learn: Why traditional manual testing can’t handle the increased demands on testing How SAP test automation addresses these shortcomings How SAP test automation helped leading enterprises accelerate testing, reduce business risk, and streamline the SAP S/4HANA migration process
Tags : 
    
Tricentis
Published By: APC by Schneider Electric     Published Date: Feb 15, 2011
This paper analyzes several of these incidents and makes recommendations for how a basic monitoring system can help reduce the occurrence of these unanticipated events.
Tags : 
apc by schneider electric, monitoring systems, human error, distributed server rooms, remote wiring closet, downtime
    
APC by Schneider Electric
Published By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : 
riak, basho, telecommunications service provider, license fees, scalability, availability, data usage, big data
    
Basho
Published By: Symantec.cloud     Published Date: Mar 02, 2011
This white paper examines the information security needs of midmarket organisations, and explains how SaaS security services can help address the security requirements of a distributed workforce.
Tags : 
symantec.cloud, messagelabs, midmarket, wireless device, remote workers, pda, smart phones, tablet pc
    
Symantec.cloud
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The largest DDoS attacks have increased greatly in strength, doubling in attack size during 2016. They are bigger, more complex, and require more expertise to defend against than past Distributed Denial-of-Service (DDoS) attacks. They are not limited to a specific industry.
Tags : 
mira botnet, cyber attack, ddos, security
    
Akamai Technologies
Published By: GFI     Published Date: Jun 13, 2008
Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR spam that has an effect similar to a Distributed Denial of Service on the email system. In this paper we provide a technical explanation of NDR Spam and recommend solutions that can prevent or limit exposure to this kind of unsolicited email.
Tags : 
email security, ddos, denial of service, distributed denial of service, ndr, spam, non-delivery report, non delivery report
    
GFI
Published By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
    
Incapsula
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai
Published By: TeamQuest     Published Date: Apr 09, 2014
The goal of capacity planning is to provide satisfactory service levels to users in a cost-effective manner. This paper describes the fundamental steps for performing capacity planning. Real life examples are provided using TeamQuest® Performance Software.
Tags : 
teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance
    
TeamQuest
Published By: Equinix EMEA     Published Date: May 22, 2019
This playbook outlines how insurance companies can evolve their business architectures to meet user demand, reduce risk and comply with regulations. Insurers’ employees, partners and customers are increasingly interacting at the digital edge, where commerce, population centers and digital ecosystems intersect. A distributed interconnection platform at the digital edge allows insurance companies and ecosystem participants to accelerate their transformation and effectively compete with increasingly nimble challengers.
Tags : 
    
Equinix EMEA
Published By: Druva     Published Date: Sep 27, 2017
Managing the backup and restore of virtual machines in a distributed environment is typically a convoluted process. Learn how a cloud-native platform for these data protection workloads enables organizations to reduce the demands on IT teams as well as their budgets.
Tags : 
vmware, data protection, cloud protection, native platforms
    
Druva
Published By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
    
Limelight
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies
Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as they do not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : 
lenovodcg, nutanix, hyperconvergedinfrastructure, hci
    
Lenovo - APAC
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.