HIT Consultant Insightful coverage of healthcare innovation
 

phi

Results 226 - 250 of 2017Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Polycom     Published Date: Sep 04, 2012
A collaborative video can support community health education and disease prevention, as well as connect a patient with his or her practitioner through applications like telemedicine, even if separated geographically.
Tags : 
video collaboration, video conferencing, healthcare, mobile device, re-hospitalization prevention
    
Polycom
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Inforgraphic Includes fast facts such as: Average Attack Size
Tags : 
ddos, stats, trends, attacks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
A compromised account is 17 times more valuable than a stolen credit card number. That’s why fraud bots, loaded with stolen credentials, use their lists of username/password pairs on thousands of websites. Credential stuffing bots can lead to data theft, customer identity fraud, and account takeover on your site. Learn about the risk to your business from credential stuffing bots in the Akamai infographic, Credential Stuffing 101: The Risk of Bots to Your Business.
Tags : 
credential stuffing, bot security, akamai, cyber security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Bots are responsible for 30% to 70% of website traffic. They have many purposes, range from good to middling to bad, and from simple to sophisticated. Bot management solutions vary a lot too. Vendors say they can solve your bot problems. Can they? The bot management market is evolving, with many vendors of different sizes, experiences and capabilities. It’s important to solve your bot problems without getting in the way of business. In this ebook, you’ll get insight into how to evaluate bot management solutions and understand what the differences mean for you.
Tags : 
credential abuse, bots, marketing, bot management, bot solutions
    
Akamai Technologies
Published By: IBM APAC     Published Date: Jul 09, 2017
Are you making the most of your enterprise content? Doing so can mark the difference between being a disruptor and being disrupted. Download this infographic to find out more.
Tags : 
digital transformation, enterprise content, ecm, enterprise content management
    
IBM APAC
Published By: Department for International Trade     Published Date: Feb 09, 2018
This is an exciting time for the UK’s diverse automotive industry. We’re experiencing rapid growth with many of the world’s leading manufacturers – including the BMW Group, Ford, Jaguar Land Rover, Nissan and Toyota – recognising the business case for investing here. The UK offers one of the lowest labour costs in western Europe, a competitive corporation tax (set to fall to just 17% by 2020) and regulations that support innovation and expansion. Meanwhile, the UK’s geographic location and strong supply and distribution infrastructure makes us a gateway to a customer base throughout Europe and beyond.
Tags : 
innovation, development, workforce, productivity, business, markets
    
Department for International Trade
Published By: Entrust Datacard     Published Date: Nov 24, 2015
This guide explores how EV certificates reduce phishing and man-in-the-middle attacks, bring trust, reduce shopping cart abandonment, protect brand and provide support saving.
Tags : 
verification, ev certificates, identification, extended validation ssl certificates, security
    
Entrust Datacard
Published By: ShoreTel     Published Date: Oct 26, 2012
This white paper discusses the benefits of researching the total cost of ownership for a UC system and how businesses can lower their total cost of ownership (TCO) by selecting a simple yet sophisticated solution.
Tags : 
shoretel, tco, total cost of ownership, uc system, unified communication system
    
ShoreTel
Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : 
cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity
    
Venafi
Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications
    
Venafi
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network
    
Venafi
Published By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : 
security, internet security, privacy, digital security certificates, security keys
    
Venafi
Published By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : 
security, internet security, privacy, digital security certificates, security keys
    
Venafi
Published By: Akamai Technologies     Published Date: Mar 09, 2017
Is your site ready for the mobile opportunity? Mobile users buy more often and spend more money, but 75% of consumers see their mobile experience as slow. Read the Mobile is the Moneymaker infographic now to find out what mobile users expect from your e-commerce website. Compiled using data from Akamai’s recent consumer web performance expectations survey, this infographic reveals: • E-commerce engagement and spending habits for mobile consumers • Mobile consumer page load expectations • The real-world business impact of not being mobile ready • The key challenges to successful mobile experiences
Tags : 
financial services, financial data, mobile opportunity, e-commerce, mobile consumers, mobile experiences
    
Akamai Technologies
Published By: DellEMC and Intel®     Published Date: Sep 16, 2016
This infographic explains how you can streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation.
Tags : 
it infrastructure, performance, end-user experience, converged infrastructure
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 16, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments
Tags : 
vxrail, hyper-converged infrastructure, converged infrastructure, vmware
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments
Tags : 
vxrail, hyper-converged infrastructure, converged infrastructure, vmware, convergence, infrastructure
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic explains how you can streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation.
Tags : 
it infrastructure, performance, end-user experience, converged infrastructure, convergence, infrastructure
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic explains how you can streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation. Intel® Xeon® Processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: Iron Mountain     Published Date: Aug 28, 2014
Download this infographic to learn 5 common myths about EMR Transition and enterprise-wide information governance revealed in a survey conducted by Iron Mountain.
Tags : 
iron mountain, him, health information managers, healthcare technology, information management, healthcare it, emr, emr transition
    
Iron Mountain
Published By: Jonckers     Published Date: Apr 11, 2011
Download our Localization Kit guide to learn best practices in localization kit development.
Tags : 
jonckers, localization service provider, lsp, software, graphics, documentation, action item
    
Jonckers
Published By: Prophix     Published Date: Jul 10, 2013
Prophix Interactive Demo
Tags : 
prophix, interactive demo, easy-to-use interface, secure environment
    
Prophix
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.