HIT Consultant Insightful coverage of healthcare innovation
 

secure cloud service

Results 51 - 75 of 76Sort Results By: Published Date | Title | Company Name
Published By: XO Communications     Published Date: Apr 13, 2015
Use this step-by-step guide from enterprise technology expert David Linthicum to help improve your network to handle services delivered from multiple clouds. With the right network infrastructure, it is much easier to connect, secure and speed up delivery of all of the cloud applications and services consumed by your organized. No matter where you are in your cloud implementations, learn best practices and strategies in this eBook series focused on Building the Network that Empowers Digital Business. Part 2 of the series, this guide focuses on best practices and creating a master implementation plan. Interested in crafting your strategy and business case for using multiple clouds, watch for Part 1 in the series "The Evolution from Network to Multi-Clouds."
Tags : 
    
XO Communications
Published By: XO Communications     Published Date: Apr 13, 2015
One of the leading ways that today’s organizations are providing secure, reliable and scalable answers for their networking needs is through MPLS IP-VPN network usage. However, businesses are also looking to create Intelligent WAN that integrates security, application performance management, and cloud services in order to create more intelligent wide area networks. This paper examines how to use the attributes of MPLS-based VPNs to enable enterprises to create a truly intelligent WAN, discussing key planning, implementation and management considerations to pave the way for a more intelligent and cloud-enabled WAN.
Tags : 
    
XO Communications
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security
    
Navisite- A Time Warner Cable Company
Published By: AWS     Published Date: Nov 08, 2018
In this webinar, you’ll learn how a major Healthcare organization is using integrated, reliable, and secure cloud-based solutions from Commvault and Amazon Web Services (AWS) to help address significant data growth while reducing infrastructure costs.
Tags : 
    
AWS
Published By: NetSpi     Published Date: Sep 20, 2019
The cloud has become a valued part of modern infrastructure and there are now more resources than ever to help organizations secure their cloud environments. Even with all of the available tools and resources, there are still a million ways to configure services incorrectly. Public and non-public breaches seem to happen weekly and the maturity of the information security program doesn’t seem to influence the likelihood of the breach. One easy mistake in a cloud environment can be disastrous and it’s reasonable to be concerned when a new breach report hits the news. Just like anything in security, there are no magic bullets, but to help address these concerns, NetSPI recommends some general guidelines to help get ahead of the cloud security curve. These are general best practices that could be applied to any portion of your IT environment, but it’s good to keep these in mind while working with the cloud.
Tags : 
    
NetSpi
Published By: YouSendIt     Published Date: Oct 26, 2011
Mail server management is a balancing act between server performance and user satisfaction. In this white paper from Osterman Research, find out how to improve mail server performance and boost user productivity by integrating a secure, cloud-based file sharing solution into your Microsoft Exchange migration. In addition, learn why integration plays a key role, and how choosing a solution that works seamlessly with Outlook can support how users want to communicate, while reducing the burden on IT. The Osterman white paper is offered courtesy of YouSendIt, the first business content collaboration service to offer an integrated approach for sending, sharing and signing documents online. Download the white paper.
Tags : 
yousendit, technology, email, exchange, windows. osterman research
    
YouSendIt
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications
    
Webroot
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing
    
Intralinks
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model
    
BubblewrApp
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we will look at factors favoring cloud and SaaS solutions in general, reasons why secure web gateways in the cloud can provide better security than appliances and local servers, and how the Webroot Web Security Service can maximize security and minimize costs using a cloud-based architecture.
Tags : 
web threat, security, could, saas solutions, webroot
    
Webroot Inc
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this environment, mobile app reputation services will be a key tool to retain credibility to increase competitiveness.
Tags : 
mobile app, credibility, reputation service, secure cloud service, endpoint, device protection
    
Webroot Inc
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : 
cloud environment, iaas, paas, saas, access management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
"Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as ""shadow IT,"" is uncontrolled growth of cloud services, away from the watchful eyes of company IT departments. "
Tags : 
ibm, ovum, cloud, cloud security, ibm cloud security enforcer, saas
    
IBM
Published By: IBM     Published Date: May 24, 2016
Join Forrester and IBM to learn how, clients are leveraging mobile and cloud to transform their businesses and bring new innovations to market. Understand how organizations can continuously deliver high quality mobile enterprise applications that leverage Cloud computing to securely integrate with their IT systems opening up new sources of revenue and innovation. Forrester Principal Analyst John M. Wargo will share insights Forrester has gleaned from conversations with clients deploying packaged solutions and building custom applications using cloud services. IBM's Botond Kiss will provide insight into how leading organizations are using cloud to accelerate their mobile transformation.
Tags : 
ibm, forrester, cloud, mobile, mobile applications
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as ""shadow IT,"" is uncontrolled growth of cloud services, away from the watchful eyes of company IT departments.
Tags : 
ibm, ovum, cloud, cloud security, ibm cloud security enforcer, saas
    
IBM
Published By: SilverSky     Published Date: May 22, 2014
Who are the current leaders in the business email market? The Radicati Group, a technology market research firm, said SilverSky offers “one of the most secure Cloud Business Email services available in the market today.” When run on IBM SoftLayer, it’s also the most reliable. Read the full report.
Tags : 
silversky, ibm, email, email services, email service providers, cloud, cloud business email, cloud business email services
    
SilverSky
Published By: Cisco     Published Date: Dec 21, 2016
Every inspiring organization, large or small, faced with the opportunities and challenges of digital business needs a digital-ready network. Agile, secure networks simplify IT and enable rapid innovation. Without a network that can actively enable and protect your business strategy, the applications, cloud services, and devices you deploy cannot live up to their potential
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 07, 2015
Businesses are transforming themselves to participate in the API economy. But how do you rapidly and securely expose your business to this developer ecosystem? Attend this webcast to find out how you can define and publish your APIs easily using the IBM API Management Service — the new SaaS solution from IBM. This cloud hosted service provides a complete set of capabilities to create, secure, manage, and socialize APIs to internal and external developer communities in the cloud, without incurring any IT infrastructure setup. Learn more from IBM's product team on how it will help enable companies to embrace the API economy and accelerate business transformation. Webcast attendees will learn about the following: •IBM API Management Service capabilities, features and benefits •Understanding different use cases of IBM API Management Service •Pricing models •How to get started using the API Management Service
Tags : 
ibm, business transformation, api management, develop, saas, it infrastructure, application, programming
    
IBM
Published By: Cisco     Published Date: Jan 05, 2015
Experience the flexibility of cloud-based collaboration, which can help businesses like yours to more quickly deploy applications to promote productivity. The Cisco Hosted Collaboration Solution (HCS) offers highly secure collaboration solutions for public, private, and hybrid clouds from partners delivering Cisco Powered cloud services.
Tags : 
cloud-based, collaboration, hosted, flexibility, productivity, deployment, public, private
    
Cisco
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks
Published By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon
Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.