HIT Consultant Insightful coverage of healthcare innovation
 

remote

Results 101 - 125 of 726Sort Results By: Published Date | Title | Company Name
Published By: GE Healthcare     Published Date: May 12, 2015
Help optimize cardiovascular care with a single database of images and information from virtually anywhere there is an internet connection.
Tags : 
cardiovascular diagnostics, image quality, secure web-based data integration, remote access, information technology, practice management
    
GE Healthcare
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security, security access
    
Entrust Datacard
Published By: Vectra Networks     Published Date: Nov 05, 2015
Covert communications are key enablers of cyber attacks that allow remote humans to patiently manage and direct their attacks undetected. Attackers choose these vehicles specifically for their ability to evade signatures, malware sandboxes and reputation lists. To learn how Vectra empowers security teams to automatically pinpoint active cyber attacks as they’re happening, correlate threats with the hosts that are under attack, prioritize attacks that pose the greatest business risk, and quickly prevent or mitigate loss, register to get the white paper Detecting Covert Communications.
Tags : 
malicious covert communications, cyber attacks, undetected attacks, business risk, prevent and mitigate loss
    
Vectra Networks
Published By: Sitrion     Published Date: Oct 04, 2016
Communications is all about making sure all employees are engaged, aligned, and informed. It is your opportunity to leverage mobile technology and employee apps to improve your communications—connecting remote workers with the enterprise, saving money and time, and empowering employees to be more productive. Download this white paper to learn more about how mobile can help you reach and engage with your remote workforce
Tags : 
    
Sitrion
Published By: Sitrion     Published Date: Mar 20, 2017
Ways to engage employees in this new remote world. Download now!
Tags : 
    
Sitrion
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics, security, cybersecurity
    
Akamai Technologies
Published By: Carbonite     Published Date: Apr 09, 2018
The core technology behind Disaster Recovery as a Service (DRaaS) has evolved for decades. More recently, DRaaS has linked to the cloud, and finally hit its stride. Today it can provide unprecedented availability options to companies who don’t have secondary data centers dedicated to business continuity. Before now, only IT teams with additional IT budget, staff and geographic locations could effectively hedge against downtime, and disasters. But today’s DRaaS means that businesses of all sizes have the peace of mind that comes with knowing a replica of their data and systems is hosted at a remote site that they can fail over to—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the DRaaS provider. And the technology ensures that a replica is not only available, but always current and immediately available. This attractive value proposition led Gartner to predict that global DRaaS revenue will rea
Tags : 
    
Carbonite
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: EMS     Published Date: May 21, 2018
Uncover the top trends that can help you optimize your work environment and drive greater value for your business.
Tags : 
top trends, workspace, workplace, optimization, modern, employee, experience, flexible, productive environment, tech-infused, 2018, remote-work
    
EMS
Published By: EMS     Published Date: May 21, 2018
Explore the latest research on how you can optimize your employee experience and drive greater collaboration in your workplace.
Tags : 
top trends, workspace, workplace, optimization, modern, employee, experience, flexible, productive environment, tech-infused, 2018, remote-work
    
EMS
Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is giving organizations the agility to respond quickly to demand for new products, services and applications. Many organisations begin their HCI journey by targeting specific use cases such as virtual desktop infrastructure, disaster recovery and remote office-branch office environments. But HCI continues to evolve far beyond these use cases. In this case study, we look at real world deployments to identify how HCI is helping businesses to reduce TCO, improve scalability and rapidly adopt new technologies. Please enter your details to view the case study.
Tags : 
    
VMware
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
In this Magic Quadrant, Gartner examines the role of SSL VPNs in remote access and the state of the market. Read this report to learn how to evaluate the suitability of SSL VPNs in a range of remote-access use cases.
Tags : 
ssl vpn, virtual private networks, magic quadrant, remote access
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
The demand for access to email anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn why a service-oriented security perimeter improves security for Exchange.
Tags : 
microsoft exchange, exchange security, email security, email availability, exchange availability, secure exchange access, remote access to exchange, application security, preventing application attacks, application-layer attacks, application firewall, web application firewall
    
F5 Networks Inc
Published By: Oracle     Published Date: Aug 17, 2017
What you will learn from this report: • The opportunity of loyalty: two thirds of consumers are already members of at least one restaurant loyalty program • What consumers look for in a restaurant loyalty program • What puts consumers off joining loyalty programs in the first place
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
Oracle
Published By: VMware AirWatch     Published Date: Jul 19, 2017
VMware AirWatch® features a new – and more efficient – approach to Windows lifecycle management across any use case – whether deploying the OS to your remote workers, onboarding employees’ BYO machines, corporate deployments across your branch offices or managing a special line of business terminal. The unified endpoint management technologies fundamentally changes how organizations approach PC lifecycle management, allowing IT to deploy security patches and remediate vulnerabilities faster, install software more reliably and quickly and consolidate operational processes across devices on or off the domain.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: Oracle ODA     Published Date: Aug 15, 2016
Businesses understand more than ever that they depend on data for insight and competitive advantage. And when it comes to data, they have always wanted easy access and fast performance. But how is the situation different now? Today, organizations want those elements and more. They want IT to strip away the limitations of time with faster deployment of new databases and applications. They want IT to reduce the limitations of distance by giving remote and branch offices better and more reliable access. And in a global world where business never stops, they want IT to ensure data availability around the clock. If IT can deliver databases and applications faster, on a more automated and consistent basis, to more locations without having to commit onsite resources, IT will be free to focus on more strategic projects.
Tags : 
    
Oracle ODA
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
The workplace is changing. Are you taking advantage of new technology to improve your productivity? Learn how far modern tech can take you. Read the e-book to learn how you can: • Integrate new work routines • Improve client relationships • Eliminate barriers to collaboration
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Citrix ShareFile
Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
Published By: VMware     Published Date: Aug 02, 2017
When evaluating and migrating to Windows 10, it is critical to understand the use cases and benefits of various deployment choices. Should you: • Refresh or upgrade your existing deployments? • Migrate your physical endpoints to VDI? • Extend published remote apps to your Windows endpoints? We look at these use cases and introduce SysTrack - a tool that provides recommendations on an optimal Windows 10 deployment approach your organizations should take.
Tags : 
    
VMware
Published By: Carbonite     Published Date: Oct 12, 2017
There are five essential pieces to a sound backup and disaster recovery (BDR) plan, and IT pros who follow these steps are able to feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through BDR deployments, to learn these five fundamentals. Understand how to size your environment, evaluate your BDR capabilities, and test your system for any surprises.
Tags : 
bdr, recovery capabilities, backup data repositories, data center, over - the - wire, remote
    
Carbonite
Published By: Intel     Published Date: May 15, 2017
Mitel* delivers voice over Wi-Fi faster and with less disruption to existing network services. Read on to find out more.
Tags : 
mobile, network, wi-fi, mitel, mobile devices, remote working
    
Intel
Published By: Wasabi     Published Date: Oct 26, 2017
Kim Komando, “America’s Digital Goddess,” is a leading radio host and web entrepreneur. Every month her video-taped three-hour weekly radio show adds 2.8 TB of video content to its extensive playback library. Switching from their current storage solution, a combination of NAS Arrays and Tape Drives, to Wasabi not only generated huge savings it was simpler and faster. Plus, since Cloudberry works seamlessly with Wasabi, the show also enjoys efficient and cost-effective remote data protection. In this Case Study read in detail how the ‘Kim Komando Show’ made the transition to next generation cloud storage.
Tags : 
data protection, multimedia content, cloud storage, backup, recovery, secondary storage platform
    
Wasabi
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.