HIT Consultant Insightful coverage of healthcare innovation
 

secure cloud service

Results 26 - 50 of 76Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data, mobile, device
    
MobileIron
Published By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
    
AWS
Published By: Oracle     Published Date: Mar 01, 2019
Most cloud infrastructure vendors offer companies a stable and secure environment on which to build and run their applications without having to manage a data center, invest in hardware, or install and update software. While most cloud vendors provide the same types of services, they differ in how they charge for and deliver those services.
Tags : 
    
Oracle
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The General Data Protection Regulation (GDPR) framework seeks to create a harmonized data protection framework across the European Union, and aims to give back EU citizens control of their personal data by imposing stricter requirements for those hosting and processing this data, anywhere in the world. IBM is committed to putting data responsibility first and providing solutions that are secure to the core for all customers. As such, IBM Cloud has fully adopted the EU Data Protection Code of Conduct for Cloud Service providers – meaning we agree to meet the entirety of its stringent requirements.
Tags : 
    
Group M_IBM Q418
Published By: Oracle     Published Date: Sep 21, 2018
In a connected world content becomes the nucleus of business growth. Oracle provides scalable, secure solutions to help drive an organization’s digitalization efforts maximizing operation automation, machine learning, and cloud services.
Tags : 
    
Oracle
Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q3'19     Published Date: Aug 12, 2019
Welcome to Secure Hybrid Cloud For Dummies, IBM Limited Edition. The hybrid cloud is becoming the way enterprises are transforming their organizations to meet changing customer requirements. Businesses are discovering that in order to support the needs of customers, there is an imperative to leverage the highly secure IBM Z platform to support missioncritical workloads, such as transaction management applications. The Z platform has been transformed over the years. The combination of z/OS, LinuxONE, open APIs, and the inclusion of Kubernetes has made IBM Z a critical partner in the hybrid cloud world. Businesses can transform their IBM Z environments into a secure, private cloud. In addition, through IBM’s public cloud, businesses may take advantage of IBM Z’s security services to protect their data and applications.
Tags : 
    
Group M_IBM Q3'19
Published By: MobileIron     Published Date: Feb 12, 2019
MobileIron is uniquely capable of helping customers leverage the new enterprise features in iOS 12. We enable users around the world to securely access hundreds of applications and cloud services from any of their devices.
Tags : 
    
MobileIron
Published By: Oracle     Published Date: Feb 21, 2018
Enable real-time transactions and securely share tamper-proof data across a trusted business network. Oracle Blockchain Cloud Service gives you a pre-assembled platform for building and running smart contracts and maintaining a tamper-proof distributed ledger.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Feb 21, 2018
Enable real-time transactions and securely share tamper-proof data across a trusted business network. Oracle Blockchain Cloud Service gives you a pre-assembled platform for building and running smart contracts and maintaining a tamper-proof distributed ledger.
Tags : 
    
Oracle
Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Ahead     Published Date: Nov 15, 2018
If your business is like many other organizations that are in the process of enabling a Microsoft Azure public cloud platform, then you might be struggling with the guardrails needed to secure and manage cost, while at the same time enabling flexibility for the teams consuming cloud services. While the Azure platform is already very secure, it also allows a great deal of flexibility in configuration. In order to avoid accidentally creating security holes and out-of-control spend, a Governance Framework is required. We created the AHEAD Azure Governance framework to allow enterprises to develop and maintain a fully optimized, and secure environment. The resulting framework will be tailored to your organization’s specific business and compliance needs, as every enterprise is different. This guide will introduce you to the components of this necessary Azure Foundational Governance Design.
Tags : 
    
Ahead
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
"Chrome Browser provides secure, trusted access to data, apps, and cloud services, connecting employees on any device to a new generation of powerful tools for work. With proactive securitymeasures protecting them while they work, users get a consistent, customizable experience whenever and wherever they access it."
Tags : 
    
Google Chrome Enterprise
Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast
Published By: AWS     Published Date: Nov 16, 2018
"Migrating to the cloud? Already living there? TIBCO Cloud Integration is an Integration Platform as a Service (iPaaS) that enables businesses like yours to connect applications easily and securely—no coding required. TIBCO Cloud Integration allows you to extend beyond connectivity to the cloud into IoT application services, analytics, and machine learning. Download this data sheet to see the top 3 reasons to choose TIBCO Cloud Integration for: • A modern platform • True open source innovation • Proven experience at enterprise scale"
Tags : 
    
AWS
Published By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint
Published By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
    
Tenable
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Are you trying to secure cloud applications, while reducing user friction? With the right technology, IT/Security professionals can empower employees to work securely and efficiently anywhere, anytime. Office 365 is the world’s most used enterprise cloud application, but it’s just one of many applications and services a company might need to authenticate. This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications. Learn how to achieve high assurance with a solution that is invisible to your users when you download the white paper, Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Citrix Systems     Published Date: Nov 10, 2014
Citrix NetScaler helps your organization fully optimize, secure and control the delivery of all enterprise and cloud services. NetScaler Insight Center and ActionAnalytics deliver unprecedented visibility and enables real-time control in response to network traffic from a variety of services such as native web and mobile apps and virtual desktops.
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control
    
Citrix Systems
Published By: Menlo Security     Published Date: Nov 11, 2019
"Digital Transformation Is Changing How Enterprises Provide Secure Web Access to Users. According to Gartner, “Digital business and edge computing have inverted access requirements, with more users, devices, applications, services, and data located outside of an enterprise than inside.” A New Approach to Enterprise Security in the Cloud Is Needed. Gartner recommends, “Complexity, latency and the need to decrypt and inspect encrypted traffic once will increase demand for consolidation of networking and security-as-a-service capabilities into a cloud-delivered secure access service edge (SASE, pronounced “sassy”).” This new approach requires an Internet isolation solution that: - Provides 100 percent malware-free email and web browsing - Preserves the native email and web browsing experience - Gives users ubiquitous yet secure access wherever they work Menlo already offers the solution that delivers on Gartner’s vision of network security in the cloud. Find out more by downloading t
Tags : 
    
Menlo Security
Published By: MuleSoft     Published Date: Jun 27, 2019
MuleSoft’s Government Cloud is an industry-leading FedRAMP-compliant cloud environment for building and deploying APIs and integrations with Anypoint Platform. MuleSoft’s US Federal Risk and Authorization Management Program (FedRAMP) compliant-solution enables government agencies to build and secure connections between their applications and citizen data. Download this whitepaper to learn: How MuleSoft’s Government Cloud enables agencies to increase project delivery speed by 3x. Why FedRAMP compliance reduces on-premises infrastructure costs. How government agencies can develop, deploy, manage, and monitor integrations and APIs in the cloud to rapidly expand cloud services.
Tags : 
    
MuleSoft
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
sd-wan, wan, cloud security
    
VMware SD-WAN by VeloCloud
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.