HIT Consultant Insightful coverage of healthcare innovation
 

protocol

Results 126 - 150 of 246Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Mar 10, 2011
Read this white paper to recognize the most vital features of any business phone system.
Tags : 
cisco, business phone system, voice over internet protocol, voip
    
Cisco
Published By: Cisco     Published Date: Mar 10, 2011
Read this paper to know the 10 ways that businesses can save money with VoIP.
Tags : 
cisco, business phone system, voip, voice over internet protocol, voice communication, data network
    
Cisco
Published By: Cisco     Published Date: Mar 10, 2011
Find out how deploying a company-wide voice over Internet protocol (VoIP) solution is one of the best ways to realize cost reduction across the organization.
Tags : 
cisco, business phone system, voip, voice over internet protocol, voice communication
    
Cisco
Published By: Cisco     Published Date: Mar 10, 2011
Read here to know the five ways businesses are taking advantage of new VoIP technology to save money.
Tags : 
cisco, business phone system, voip, voice over internet protocol, voice communication
    
Cisco
Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci, pc ftp application, script file exposure, file encryption processes
    
Linoma Software
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Learn why businesses are increasingly using a managed services approach for their EDI/B2B needs. You too may consider it for your business.
Tags : 
liaison, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, eai, business integration, service provider, it systems, it functions, productivity, partner management, core competency, integration platform, change management, edi vendors, data infrastructure, data mapping
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Businesses and their IT departments are increasingly looking into the Cloud to drive innovation and increase business agility. Are you on the cloud?
Tags : 
liaison, the cloud, cloud computing, hybrid approach, hybrid business, business agility, increase innovation, applications or processes, electronically exchange, managed services, manage data, b2b, data management, enterprise application integration, data infrastructure, data mapping, connectivity protocols
    
Liaison Technologies
Published By: Cisco     Published Date: Jan 20, 2012
This white paper provides migration steps that can save your business time and money - and answers to the two most burning questions about IPv6.
Tags : 
ipv6, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
In this whitepaper, Cisco provides recommendations on a building strategic network to address business needs for today and tomorrow.
Tags : 
ipv6, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4, ipv6, security, video traffic, cloud infrastructure, network performance
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4, ipv6, security, video traffic, cloud infrastructure, network performance
    
Cisco
Published By: IBM     Published Date: Jul 02, 2012
Many organizations move a wide variety of sensitive information with file transfer protocol (FTP), and these servers are proving to be easy targets for thieves. Read this paper to learn more about IBM Sterling Managed File Transfer that helps you manage and control the critical information flows in your company's dynamic business networks.
Tags : 
ibm, ftp, secure file transfer, file, business, business network, technology, business technology
    
IBM
Published By: CDW     Published Date: Apr 04, 2016
As organizations evolve from virtualized infrastructures to private clouds, IT management must measure success by the efficiencies of the infrastructure in providing end users with flexible and cost-effective services and service levels. NetApp® OnCommand® Insight storage resource management software provides service analytics that help enterprises manage the complexity of this transition. OnCommand Insight provides a holistic view into complex multivendor and multiprotocol storage services and powerful analytics to help organizations fully leverage the promise of cloud computing.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, analytics
    
CDW
Published By: McAfee     Published Date: Apr 14, 2014
Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
Tags : 
vpn, virtual private network, next generation firewall, mpls, bgp, high availability vpn, multiprotocol layer switching
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking
    
Intel Security
Published By: Equinix     Published Date: Mar 26, 2015
The client had an extensive global multiprotocol label switching (MPLS) network with over 30 Gbps of bandwidth. However, the client was experiencing bandwidth growth of >30% compound annual growth rate (CAGR) and foresaw increasing demands for multi-media applications, data center to data center traffic, and cloud solution usage to support its business units and global workforce. It became crucial for the client to re-architect their current network to support growth and provide a globally consistent user experience at lower cost. With 40% of their WAN traffic being http internet traffic, they needed regional internet service provider (ISP) breakouts. The client needed a lower cost/MB high capacity WAN backbone for better application performance and cloud optimization. Their network needed to be scalable to poise them for anticipated growth and offer improved site connectivity options.
Tags : 
bandwidth growth, multi-media applications, data center, cloud solution, internet service provider, cloud optimization
    
Equinix
Published By: CDW - NetApp     Published Date: Apr 07, 2016
As organizations evolve from virtualized infrastructures to private clouds, IT management must measure success by the efficiencies of the infrastructure in providing end users with flexible and cost-effective services and service levels. NetApp® OnCommand® Insight storage resource management software provides service analytics that help enterprises manage the complexity of this transition. OnCommand Insight provides a holistic view into complex multivendor and multiprotocol storage services and powerful analytics to help organizations fully leverage the promise of cloud computing.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, analytics
    
CDW - NetApp
Published By: Forcepoint     Published Date: Nov 17, 2017
Networking communication protocols make it possible for the Internet to work. Unfortunately, criminals can use those trusted systems to obfuscate malicious data and penetrate your network defenses undetected. An advanced evasion technique (AET) is a method of delivering an exploit or malicious content into a vulnerable target so that the traffic looks normal and security devices will pass it through. By combining attacks using several protocol layers, these advanced evasions bypass most existing security solutions. Forcepoint NGFW (Next-Generation Firewall) applies sophisticated analysis techniques specifically to detect this type of attack. Download this whitepaper to find out more.
Tags : 
    
Forcepoint
Published By: Sponsored by HP and Intel®     Published Date: Feb 02, 2012
This analysis compares various cloud offerings in the market. Discover resources available to help you assess your options and accelerate the launch of your initiative.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation
    
Sponsored by HP and Intel®
Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
back up systems, symantec, netbackup, ndmp, it infrastructure
    
Sponsored by HP and Intel®
Published By: Aerohive     Published Date: Oct 01, 2012
Next Generation Access Network Architecture:Protocols are Free
Tags : 
aerohive, data, network architecture, capex, opex
    
Aerohive
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: NetApp     Published Date: Nov 01, 2009
This ESG paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs.
Tags : 
netapp, esg, storage efficiency, san environments, data storage infrastructure, data center, multiprotocol unified storage, data reduction, virtualization, backup
    
NetApp
Published By: WhichVoIP     Published Date: Jul 23, 2010
Receive FREE customized, no obligation, business VoIP phone service quotes and learn how your company can benefit from VoIP (Voice over IP) technology.
Tags : 
whichvoip, business phone quote, hosted voip phone system, voice over internet protocol, ip pbx, voip service provider, practice management
    
WhichVoIP
Published By: WhichVoIP     Published Date: Aug 24, 2010
With the rise in popularity of hosted VoIP options, you can be up and running (and saving money) in just a few hours, without having to install any costly equipment.
Tags : 
whichvoip.com guide, voip phone service, smb, small businesses, voice over internet protocol, telephone network, telecommunication
    
WhichVoIP
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.