HIT Consultant Insightful coverage of healthcare innovation
 

remote

Results 301 - 325 of 730Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
    
Microsoft Office 365
Published By: Citrix Online     Published Date: Jun 09, 2010
This new white paper examines key challenges facing customer support organizations and explores the many advantages of collaborative remote support, including ad hoc training, faster first-contact resolution and an improved customer experience.
Tags : 
citrix gotoassist, corporate remote support, customer service, loyalty rentention, desktop management, manager monitoring
    
Citrix Online
Published By: Asentria Corporation     Published Date: Sep 04, 2007
In the high-stakes battle of Internet providers, WiMAX represents the latest up-and-comer to challenge DSL and cable technologies. This new wireless technology is gaining attention for its ability to provide high-speed, high-throughput broadband connections over distances of up to 30 miles instead of a few hundred feet. Exhibiting a surprising amount of utility, WiMAX can be used for a number of different applications.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: HP     Published Date: Jul 21, 2011
This IDC research with small and medium-sized businesses (SMBs) and branch offices shows that well-targeted technology upgrades, coupled with a rigorous program to standardize and improve IT practices at a company's remote locations and headquarters, can deliver substantial business value and could reduce total annual IT costs in the branches by over 30%.
Tags : 
idg, idc, branch offices, converged infrastructure, convergence, hp proliant, hewlett-packard, smbs
    
HP
Published By: Sponsored by HP and Intel     Published Date: Jul 21, 2011
This IDC research with small and medium-sized businesses (SMBs) and branch offices shows that well-targeted technology upgrades, coupled with a rigorous program to standardize and improve IT practices at a company's remote locations and headquarters, can deliver substantial business value and could reduce total annual IT costs in the branches by over 30%.
Tags : 
idg, idc, branch offices, converged infrastructure, convergence, hp proliant, hewlett-packard, smbs
    
Sponsored by HP and Intel
Published By: iLinc     Published Date: Aug 05, 2009
For 2010 and beyond, research firm Frost & Sullivan sees Web conferencing as a key catalyst for improving business processes by facilitating remote group decision-making and action. This paradigm shift repositions web conferencing as a strategic tool, not only an email or travel substitute.
Tags : 
ilinc, salesforce, webinar, presentation, web conferencing, video conferencing, visual aid, social networking
    
iLinc
Published By: Aventail     Published Date: Aug 21, 2009
Learn how to adequately protect your network while expanding your remote access capabilities. Read the free white paper, 'Increase Productivity and Reduce Security Risks for Teleworkers'.
Tags : 
ssl, vpn, mobile workers, remote workers, mobile workforce, remote workforce, network security, remote access
    
Aventail
Published By: ServiceNow     Published Date: Oct 22, 2018
A comprehensive service visibility strategy with automated infrastructure discovery and service mapping gives a clear view into business-critical services. Quickly locate potential problems before downtime happens. Learn best practices to develop your service visibility framework. Read this eBook.
Tags : 
service, business, infrastructure, remotely, servicenow
    
ServiceNow
Published By: Darktrace     Published Date: Jun 17, 2019
In recent years, the oil and gas industry has seen accelerated digitization of its operations. As the sector reaps tremendous benefits such as greater efficiency and increased agility, this move has also fundamentally shifted the security paradigm. Oil and gas companies must now protect connected field devices, sensors and control systems, as well as legacy systems, often in low-bandwidth, remote, and challenging environments.
Tags : 
    
Darktrace
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail
    
Aventail
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: Menlo Security     Published Date: Jun 01, 2018
"According to Gartner, ""by 2022, 25% of enterprises will adopt browser isolation techniques for some high-risk users and use cases, up from less than 1% in 2017.” ""By effectively isolating endpoints from browser-executable code, attacks that compromise end-user systems will be reduced by 70%, while eliminating the need to detect or identify malware."" -Gartner What do these organizations know that you don’t? Learn more about why Gartner believes this to be true in this report."
Tags : 
    
Menlo Security
Published By: GoToMeeting     Published Date: Jun 09, 2010
This new white paper examines the key challenges remote developers and teams face while exploring the advantages of leveraging an online collaboration solution to instantly connect, eliminate travel and expedite projects.
Tags : 
citrix gotomeeting, remote developer, online collaboration
    
GoToMeeting
Published By: U.S. Cellular     Published Date: Jun 04, 2018
Mobile Device Management (MDM) is a must for any business with employees who have access to company data via mobile devices. This free whitepaper will inform you on the basics of MDM technology and how it can give you more control over Smartphones, Tablets and laptops used by your employees—like being able to remotely lock and wipe lost or stolen devices
Tags : 
    
U.S. Cellular
Published By: Equinix EMEA     Published Date: May 22, 2019
This document outlines how Insurance providers must optimize and scale for policy collaboration in a rapidly changing, omni-channel environment while shifting to providing new types of digital insurance. Additionally, shifting demographics is transforming interaction between insurance providers, reinsurers and customers. To address, Insurance providers must move to the digital edge adjacent to customers, clouds, partners and remote devices.
Tags : 
    
Equinix EMEA
Published By: Advantech     Published Date: Nov 08, 2010
Integrating Distributed Energy Resources into the Smart Grid
Tags : 
distributed i o, data acquisition boards, remote i o, pci data acquisition, ethernet i o, data acquisition module, ethernet data acquisition, industrial ethernet
    
Advantech
Published By: Intel     Published Date: Aug 10, 2012
Learn about Intel IPT with Public Key Infrastructure including protected transaction display as well as One Time Password (OTP).
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Find the Intel® desktop processor to meet your business needs with this interactive desktop processor comparison tool
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise securirty, save time, save money
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Find the Intel® laptop processor to meet your business needs with this interactive laptop processor comparison tool
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel
Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth
    
Trend Micro SaaS
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
To be successful in today's safety-conscious and efficiency-minded marketplace, companies must combine compelling new technologies to offer the most convenient and effective business services and solutions. For monitoring remote tank sites, that means combining the intelligence of General Packet Radio Service (GPRS) communication with the risk mitigation properties of intrinsic safety.
Tags : 
business analytics, business management, business metrics, business intelligence, bi software, enterprise software, world telemetry, worldtelemetry
    
WorldTelemetry, Inc.
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, Mike Kirkup tells about BlackBerry application platform which simplifies the development, deployment and management of wireless applications. Leverages the core strengths of the BlackBerry solution to mobilize additional business processes and applications.
Tags : 
blackberry, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.