HIT Consultant Insightful coverage of healthcare innovation
 

network services

Results 76 - 100 of 338Sort Results By: Published Date | Title | Company Name
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform* purpose-built for heterogeneous, multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience. With vRealize Suite, IT can provision and manage at scale—compute, storage, network, and application services across multiple private and public cloud environments.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Nov 30, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle Dyn
Published By: Acronis EMEA     Published Date: May 19, 2015
The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.
Tags : 
mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity, acronis access, secure competitive, mobile device, share documents, authentication, visibility, access control
    
Acronis EMEA
Published By: Cisco     Published Date: Sep 17, 2015
This paper explores how service providers are unleashing the power of their networks to improve agility and become more efficient.
Tags : 
simplifying the network, service providers, network, intelligent network, network architecture, cisco evolved services platform
    
Cisco
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks
    
Arbor
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldn’t fully anticipate how quickly emerging technologies would transform their business operations — and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: SAP     Published Date: Nov 22, 2017
To keep up with sweeping global economic and societal changes, public services organizations are undergoing significant technology-driven transformation. Aging populations, rapid urbanization, political instability, concerns about sustainability and resiliency, and changing worker and resident expectations are driving public services organizations to radically improve operations and service delivery. At the core of this transformation is the ability to collect and process vast amounts of data to help to improve outcomes and services. One way to generate this data is through the Internet of Things (IoT) — which IDC defines as a network of networks of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity. The IoT is a transformational technology that can reshape the public sector, enabling improved outcomes and new services such as remote patient monitoring, advanced traffic solutions and predictive policing.
Tags : 
global, economic, societal, technology, driven, transformation, political
    
SAP
Published By: Schneider Electric     Published Date: Apr 20, 2018
Provide stable data center and network services across a multi-building, multi-campus school district.
Tags : 
data closets, cloud management, remote visibility, it staff, data center
    
Schneider Electric
Published By: iPass     Published Date: Sep 22, 2009
A few short years after 3G service brought us anytime, anywhere broadband-and before Apple rolled out its 3G iPhone-4G networks began raising the bar in select markets. This latest evolution in wireless networking offers faster wireless data transmission speeds, vastly superior coverage and support for a new generation of mobile applications and services.
Tags : 
ipass, wifi, smartphones, roaming, web portal, vpn, ethernet, connection detail records, mobility, mobile workers, cdrs
    
iPass
Published By: McAfee     Published Date: Sep 15, 2014
This report presents the results of ESG Lab’s validation testing of the McAfee Next Generation Firewall. Integrating application control, intrusion detection, and evasion prevention, the product is designed to provide next generation firewall services, leveraging a unified software core to enable the deployment of multiple security services when and where they are needed.
Tags : 
application control, network security, firewall, firewall services, it security
    
McAfee
Published By: Intel     Published Date: Nov 29, 2016
Just after the turn of the decade researchers are predicting there will be somewhere north of 24 million subscriptions to next generation 5G networking services. Today most of those services are little more than pilot projects. But thanks to emerging network function virtualization (NFV) software running on Mobile Edge Computing (MEC) platforms enabled by Intel most of those 5G services should be in production before the end of the decade. Come learn how MEC platforms are about to transform every corner of the networking world to not only drive the creation of a vast array of new IT services, but also make networks more agile and responsive than anyone ever thought possible.
Tags : 
    
Intel
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Citrix Systems     Published Date: Jul 28, 2015
Organizations are looking to SDN to improve network agility by incorporating network automation in cloud computing platforms. So far the focus of SDN has been on L2-L3 switching and routing services. However applications don’t just need network connections. They also need L4-L7 network services.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
The modern enterprise workforce poses new challenges for IT. Today’s employees work in more places, on more devices— personal or company-owned—and over more networks than ever, using a diverse array of datacenter applications, mobile apps, SaaS and cloud services. As they move among apps, networks and devices, IT needs to be able to control access and ensure data and application security without impeding productivity. That means enabling users to get to work quickly and easily in any scenario without having to deal with different ways of accessing each app. Traditional VPNs and point solutions add complexity for both users and IT, increase costs and fail to enable a holistic approach to business mobility. Over the years, many IT organizations have addressed these evolving requirements through point solutions and by case-by-case configuration of access methods. The resulting fragmented experience poses a key roadblock to productivity and increases user frustration. For IT, the lack of a
Tags : 
    
Citrix Systems
Published By: Riverbed     Published Date: Apr 12, 2017
AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That’s where Riverbed comes in. Riverbed’s SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Register for the upcoming webinar to experience a fundamentally new approach to networking, with real users sharing their experience in addition to a joint customer, OpenEye that has saved time and money by utilizing this approach to cloud networking. OpenEye Scientific Software leveraged Riverbed SteelConnect to very quickly and easily establish secure connections to and between AWS VPCs, saving hours of network administration time.
Tags : 
    
Riverbed
Published By: Riverbed     Published Date: Apr 17, 2017
Amazon Web Services (AWS) Cloud integrates with Riverbed’s SD-WAN solution to enable cloud migration and performance, all managed via quick and simple workflows.
Tags : 
    
Riverbed
Published By: HP     Published Date: Feb 02, 2015
Diversified Agency Services serves a global network of marketing services and specialty communication companies. To provide its internal customers and their clients with safe, secure access to applications and services, DAS worked with HP on a multi-year project to consolidate its IT networks and implement HP SDN cloud-enabled networking. These steps have vastly simplified DAS IT operations, enabling it to deliver a faster, more agile, and more secure network. Read this case study to learn more.
Tags : 
    
HP
Published By: K2     Published Date: Aug 24, 2015
This white paper, based on the Process Excellence Network and K2 webinar, “5 Ways to Transform Business Processes to Optimize Agility,” by Rob Speck, Vice President of Services at K2, focuses on: What drives business process innovation What causes organizations to adopt platforms that support process innovation Examples of organizations that have done this and their return on investment (ROI) as a result Download this white paper to discover the 5 key components to transforming your business processes.
Tags : 
    
K2
Published By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 07, 2018
Enterprises seeking the security and performance capabilities of establishing their own private network are often turned away by the high cost and technical expertise required. AT&T NetBond® for Cloud helps establish private, dynamic connectivity from on-premises data centers to Amazon Web Services (AWS) in as little as 2-3 days. Aira, a customer focused on augmented reality, has leveraged the global connectivity capabilities of AT&T NetBond® to connect low vision or blind smart glasses users with a network of agents to guide the visually impaired through everyday tasks such as interpreting prescriptions. Download this case study with AT&T, Aira, and AWS to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
    
AWS
Published By: Lightower     Published Date: Jan 26, 2017
Lightower's comprehensive suite of fiber-based solutions is trusted by over 40% of Fortune 500® companies with their mission critical networking needs. And with over 33,000 route miles of all-fiber network and over 22,000 service locations, Lightower provides the custom connectivity services to ensure optimal application and business performance. Watch our video to discover the industries Lightower serves and learn how the Lightower Limitless Network at the center of everything you do.
Tags : 
    
Lightower
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.