HIT Consultant Insightful coverage of healthcare innovation
 

security as service

Results 76 - 100 of 268Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: AWS     Published Date: Nov 07, 2018
As more enterprises are moving some, if not all of their data and applications to the cloud – cost effectiveness, network performance and security are top of mind. AT&T NetBond for Cloud provides a dynamic, private connect to Amazon Web Services (AWS). Its enhanced infrastructure makes it easier to securely connect applications, platforms, and services. With AT&T NetBond for Cloud, customers are getting a single, end-to-end solution from one provider that allows them to maintain a hybrid environment, meaning that can utilize their current investments in their on-premises infrastructure and strategy. Download this eBook to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands in real-time - How to take advantag
Tags : 
    
AWS
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations The best use cases for implementing a supplemental or secondary DNS service
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: The critical role DNS plays in the user experience The failure and outage risks of relying on a single DNS solution The major resiliency and performance differences between unicast vs anycast addressing Criteria for evaluating a managed DNS service provider Download Now!
Tags : 
    
Oracle + Dyn
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: • How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure • The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations • The best use cases for implementing a supplemental or secondary DNS service Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Global DNS performance and availability are critical to business continuity, security and end-user experience. With online applications, content, data and services often scattered across the internet and housed in your own DCs, your CDN or in your cloud instances; it’s more important than ever to have a robust, redundant DNS solution making sure your assets get delivered as quickly and reliably as possible. This whitepaper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: • The critical role DNS plays in the user experience • The failure and outage risks of relying on a single DNS solution • The major resiliency and performance differences between unicast vs anycast addressing • Criteria for evaluating a managed DNS service provider Download Now! "
Tags : 
    
Oracle + Dyn
Published By: HP     Published Date: Jul 03, 2014
A Viewpoint paper on how managed cloud-based options balance control with flexibility and scale.
Tags : 
enterprise mobility, security and governance, cloud-based mobility services
    
HP
Published By: Centrify     Published Date: May 26, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : 
security, endpoint security, access control, authentication
    
Centrify
Published By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : 
e-mail security, guide, clearswift, clearswift
    
Clearswift
Published By: NetApp     Published Date: Dec 15, 2014
Organizations of all kinds rely on their relational databases for both transaction processing and analytics, but many still have challenges in meeting their goals of high availability, security, and performance. Whether planning for a major upgrade of existing databases or considering a net new project, enterprise solution architects should realize that the storage capabilities will matter. NetApp’s systems, software, and services offer a number of advantages as a foundation for better operational results.
Tags : 
database, transaction processing, analytics, enterprise solution architects, storage capabilities
    
NetApp
Published By: Mimecast     Published Date: Feb 13, 2017
Mimecast has seen firsthand that not all email security systems perform equally well. But, until now, we’ve lacked the comparative data to prove our perceptions. In order to address this head-on, Mimecast has launched the Email Security Risk Assessment (ESRA). The Mimecast ESRA has three goals: 1. To test the Mimecast cloud security service against an individual organization’s incumbent email security system. To help the organization understand the relative efficacy of the security systems and to see the number, type and severity of email-borne threats that are currently getting into the organization. 2. To inform the security industry with hard data on the effectiveness of various commonly-deployed email security systems. 3. To inform the security industry with hard data regarding the number, type and severity of email-borne threats that are being actively used in attacks. Download Now!
Tags : 
mimecast, email. esra, email security, cloud security
    
Mimecast
Published By: Okta     Published Date: Apr 17, 2017
In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.
Tags : 
    
Okta
Published By: Staples     Published Date: May 24, 2016
Today, many enterprises are struggling to manage their printing environments to ensure efficiency, security, and control. This problem has created one of the fastest-growing trends in printing today: managed print services (MPS). While keeping data safe is a growing concern for all companies, MPS software has no access to the content being printed, faxed, or scanned. Read this white paper to learn how MPS helps to protect and control printed assets and can play a big role in ensuring sensitive documents don't end up in the wrong hands.
Tags : 
it security, managed print services, outsourced print services, print management, print costs
    
Staples
Published By: Intel     Published Date: May 22, 2017
While holding the promise of HD quality, enriched services, and the benefits of a common packet switched access infrastructure, the adoption of infrastructure-based voice over LTE (VoLTE), along with rich communications such as video and real-time messaging, has stalled over the last few years with concerns around quality, security, and cost. During that time, the value of the phone number as a globally significant user ID and key services such as SMS and MMS have been relegated by phone manufacturers, over the top (OTT) services, and even the subscribers themselves as “technologies of last resort.” Finally, the proliferation of 4G, together with the emergence of network functions virtualization (NFV), powered by Intel®, Hewlett Packard Enterprise* (HPE), and Metaswitch*, is allowing network operators to take charge of the consumer’s communications experience, once more.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Aug 03, 2017
Security, network complexity and growing volumes of traffic are the top factors affecting enterprise network strategy, based on a recent IDG Research Services poll among IT leaders. Here’s what they’re planning to do about these issues
Tags : 
information technology, data security, network complexity, traffic volume, network strategy
    
Juniper Networks
Published By: HP Inc.     Published Date: Jun 20, 2019
Today’s IT departments face a unique set of challenges. On one hand, they have evolved from helpdesk support teams to key business enablers and must maintain increasingly complex IT landscapes while combatting significantly larger cyber security threats. On the other hand, they have to manage constant change with fewer resources and static, or minimally-increasing, budgets. As a result, many are looking to reduce costs while increasing efficiency and productivity. Some, in fact, are looking to Device as a Service, or DaaS. If you're looking for more reasons to convince your CFOs that DaaS is a smart move, download the whitepaper to explore five big benefits of deploying a best-in-class DaaS solution.
Tags : 
    
HP Inc.
Published By: Ahead     Published Date: Jan 10, 2019
A January 2018 commissioned study conducted by Forrester Consulting on behalf of ServiceNow How a Representative Organization Resolved Security Incidents 45% Faster This Forrester Study provides a framework and customer example to help readers evaluate the potential financial benefits of investing in ServiceNow Security Operations. To understand and illustrate the benefits, costs, and risks associated with ServiceNow, Forrester interviewed three current Security Operations customers to create a representative organization. This organization: Improved vulnerability response times by 25% Prioritized vulnerabilities 60% faster Achieved 230% ROI Download this study to evaluate the Total Economic Impact of using ServiceNow Security Operations to deliver fast and efficient security response.
Tags : 
    
Ahead
Published By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? This is not the right question to ask first. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services – or add additional ones – that are appropriate for your business. After examining each use case, we’ll show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.