HIT Consultant Insightful coverage of healthcare innovation
 

networks

Results 226 - 250 of 1820Sort Results By: Published Date | Title | Company Name
Published By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
enterprise networks, aerohive, network structure, wi-fi and networking
    
Aerohive
Published By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages
    
Aerohive
Published By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages
    
Aerohive
Published By: Vectra Networks     Published Date: Nov 05, 2015
Intrusion Detection Systems have ceased to live up to their name and have lost their ability to spot today’s sophisticated intrusions. Consequently, cyber attackers are taking advantage of it by launching more evasive and strategic threats that spread rapidly within networks. And security teams are left without the proper tools or insight to identify intrusions that pose the biggest risk.
Tags : 
intrusion detection systems, cyber attackers, sophisticated intrusions, intrusion detection
    
Vectra Networks
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss
    
Vectra Networks
Published By: VMware AirWatch     Published Date: Oct 14, 2016
Advances in the technologies of the electronic components essential to mobility continue to yield powerful and productive mobile computers and communicators, with an amazing range of function and raw capabilities that even seasoned professionals find remarkable. There also have been dramatic improvements in wireless networks—from Wi-Fi to the broadband cellular services that continue to expand in both coverage and capacity—that offer throughput and related performance characteristics that rival what’s possible on wire. Finally, add in apps, cloud solutions and related management capabilities, and there’s never been a better time than right now to profit from a strategy that reaps the benefits of a mobile workforce—and, really, a mobile organization.
Tags : 
    
VMware AirWatch
Published By: Ruckus Wireless     Published Date: May 05, 2016
Password-based (PEAP, TTLS) networks experience high rates of user disruption based on password changes. Disconnected devices try to connect back to the network causing severe user disruption. So, what’s the solution to this? Certificate-based wi-fi, of course!
Tags : 
ruckus wireless, wi fi, passwords, certificate wifi, user experience
    
Ruckus Wireless
Published By: Nokia     Published Date: Dec 22, 2015
The part 2 describes Nuage Networks SD-WAN solution to the challenges.
Tags : 
    
Nokia
Published By: Nokia     Published Date: Nov 08, 2016
The company tells you to get a new store operational within weeks for an upcoming launch. Instantly you get that sunken feeling in your stomach.
Tags : 
alcatel-lucent, wide area networking, nuage network, virtualized network services
    
Nokia
Published By: Nokia     Published Date: Dec 22, 2015
This is a two-part post, the part 1 introduces the challenges of traditional WAN.
Tags : 
network, smarter, wan, business evolution, application
    
Nokia
Published By: SAP     Published Date: May 05, 2016
To learn more about how business networks are driving the next wave of innovation, download this compelling and timely whitepaper.
Tags : 
sap, ariba, business network, innovation, customer experience
    
SAP
Published By: SAP     Published Date: May 05, 2016
New Forrester report provides the analysis you need to make timely, critical decisions
Tags : 
sap, ariba, vendor, business networks, b2b, ecommerce
    
SAP
Published By: SAP     Published Date: May 05, 2016
New Forrester report provides the analysis you need to make timely, critical decisions
Tags : 
sap, ariba, vendor, b2b, business netowrks
    
SAP
Published By: Avi Networks     Published Date: May 23, 2019
TCPdump may be old, but does that matter? Application proliferation as apps move from bare metal to virtual machine to containers Network teams are asked to do more with the same number of people Network analysis in public clouds and containers requires different tools
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises seeking to become application-centric, with many modern data centers now running a combination of cloud-native applications based on microservices architectures alongside traditional applications. With application owners seeking publiccloud- like simplicity and flexibility in their own data centers, IT teams are under pressure to deliver services and resolve application issues quickly, while simultaneously reducing provisioning time for new applications and lowering costs for application services.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Modern application architectures such as microservices are changing the way that modern enterprises run their infrastructure. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. And now with the emergence of containerized applications, it is critical to re-evaluate how application services are provided across data centers and multiple cloud environments.
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
    
Avi Networks
Published By: Red Hat     Published Date: Jun 23, 2016
Cisco is a leading provider of networking solutions that transform how people connect, communicate, and collaborate. A US $47 billion global company, Cisco develops intelligent networks and technology architectures for customers in industries ranging from government and military to healthcare and transportation. To help keep pace with rapidly changing customer demand, Cisco built its internal Lightweight Application Environment on OpenShift Enterprise by Red Hat. With this solution, Cisco IT delivers application middleware quickly and easily to internal developers through a self-service portal. Cisco has decreased time to market for new applications, streamlined the infrastructure using containers, increased operational efficiencies, and improved the developer experience.
Tags : 
cisco, best practices, networking, software development, productivity
    
Red Hat
Published By: SAP Ariba     Published Date: May 05, 2016
New Forrester report provides the analysis you need to make timely, critical decisions
Tags : 
sap, ariba, vendor, b2b, business netowrks
    
SAP Ariba
Published By: SAP Ariba     Published Date: May 05, 2016
To learn more about how business networks are driving the next wave of innovation, download this compelling and timely whitepaper.
Tags : 
sap, ariba, business network, innovation, customer experience
    
SAP Ariba
Published By: SAP Ariba     Published Date: May 05, 2016
New Forrester report provides the analysis you need to make timely, critical decisions
Tags : 
sap, ariba, vendor, business networks, b2b, ecommerce
    
SAP Ariba
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper Networks works with leading companies around the world to increase the service agility of their networks. With simple, open, and smart networks, financial services firms can bring innovative new services to market faster and at lower costs. They can leverage Juniper’s expertise, experience, and partner ecosystem to build agile, service-aware networks. Juniper is a leader in high-performance, highly reliable routing, switching, and security, with solutions deployed in some of the most complex networks in the world across banking, capital markets, and insurance providers. A broad ecosystem of solution, services, delivery, and consulting partners can provide businesses with a complete offering that enables innovation.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
As the pressures of digital disruption force companies to either transform or die, companies in Asia’s BFSI sector are rushing to integrate cutting-edge technologies and roll-out innovative new services to their customers. Fortunately, thanks to rapidly advancing technologies, developments in the regulatory landscape and the initiative of leading BFSI organisations, we are seeing incredible examples of innovation within the sector on a monthly, if not weekly, basis.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.