HIT Consultant Insightful coverage of healthcare innovation
 

uc environments

Results 326 - 350 of 382Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: May 21, 2015
Leading technology research firm, IDC, reports customers using ServiceNow’s suite of cloud-based service management solutions are seeing substantial savings and business value for both their IT and business operations. Download this report to learn how ServiceNow is making employees more productive and IT & business processes more efficient by: • Reducing fragmentations of IT and business environments • Automating repeatable processes • Improving service delivery
Tags : 
service management, roi, idc, business operations
    
ServiceNow
Published By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor
    
Solidcore
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures
    
Splunk
Published By: Sponsored by HP and Intel®     Published Date: May 09, 2013
In healthcare, bringing new and reliable products to market is essential for staying relevant and competitive. That's why when McKesson needed to transform its development environments, the nation's largest healtchcare IT solutions provider turned to HP CloudSystem Matrix. By moving from a traditional rack-mount server infrastructure to an HP CloudSystem Matrix integrated solution, McKesson saw an 84-fold increase in processing speeds on their development environments (down to 40 mins. from 7 days). They also enjoyed a 42% reduction in physical server count and a 67% decrease in management time. Read this case study to see how your own organization can use an HP CloudSystem Matrix solution to enhance productivity, reduce costs, and drive innovation. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
mckesson, cloud, bringing new and reliable products, staying relevant, competitive, hp cloudsystem matrix
    
Sponsored by HP and Intel®
Published By: Sponsored by HP and Intel®     Published Date: May 13, 2013
Learn more about this offering that includes a self-service infrastructure portal for quick auto-provisioning, along with built-in infrastructure lifecycle management to optimize infrastructure, manage the resource pools, and help ensure uptime. CloudSystem Matrix is integrated by design with broad support of heterogeneous environments, including VMware, Microsoft® Hyper-V, and KVM through OpenStack as an enabling technology that manages and provisions virtual machines to the Red Hat KVM hosts.
Tags : 
    
Sponsored by HP and Intel®
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
In this white paper sponsored by HP and Intel®, without a proper goal and plan for implementing IT, organizations open themselves to risk re-infecting their IT environments with complexity and other issues.
Tags : 
cloud, cloud implementation, cloud plan, cloud infrastructure, intel, it environments, traditional it
    
Sponsored by HP and Intel®
Published By: Stratus Technologies     Published Date: Apr 14, 2009
Has the economic meltdown taken its toll on your business? Is the endless onslaught of bad news making it difficult to maintain a positive perspective? The good news is that despite the economic downturn, there’s never been a better time to raise the bar for your IT capabilities. Mature virtualization solutions, new affordable uptime solutions, powerful integrated capabilities and an increased focus on operational simplicity all enable businesses like yours to enhance IT operations — without biting off too much of your budget. Here are five things you can do immediately and affordably to add value to your business.
Tags : 
stratus, cost cutting, it costs, it infrastructure, it capabilities, budget, economics, economic downturn
    
Stratus Technologies
Published By: Success Factors     Published Date: Aug 19, 2014
In today’s demanding corporate environment, businesses are struggling to boost employee engagement. It is a strategic imperative but no small task given the severity of the problem. According to Gallup Inc.’s 2013 State of the Global Workplace report, only 13 percent of employees say they are engaged at work. Astoundingly, actively disengaged workers continue to outnumber engaged employees at a rate of nearly two to one.
Tags : 
successfactors, social collaboration, employee engagement, corporate environments, disengaged workers
    
Success Factors
Published By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : 
cloud, recovery-as-a-service, raas, infrastructure, platforms, heterogeneous
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : 
leveraging, visualization, optimizing, processes, technology, optimizing, server utlization
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Whether your business is involved with it yet or not, cloud computing will play a significant role in the future of IT: it has already been enthusiastically embraced by small and medium sized businesses and its potential is also being accepted and exploited by larger enterprises.
Tags : 
services, cloud, infrastructure, cloud computing, significant, enthusiastically, benefits, environments
    
SunGard
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn a four-pronged approach to create a disaster recovery plan for your hybrid IT environments to help ensure successful recoveries of your data and applications.
Tags : 
sungard, sungard availability service, disaster recovery, complex it environment, hybrid it environment, it environment, recovery time objective, rto
    
SunGard Availability Services
Published By: Symantec     Published Date: Oct 19, 2012
This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. It aims to compare the effectiveness of current anti-malware software. Read on to figure out which ran best.
Tags : 
virual environments, symantec, data security, malware, anti-malware products
    
Symantec
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security
    
Symantec
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale
    
Symantec Corporation
Published By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : 
secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts
    
Tenable
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
"Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough. Get the CISO POV in this on-demand webcast and learn how to: • Minimize the attack surface • Expand visibility of assets beyond the perimeter • Enhance security practices to accommodate more dynamic IT environments"
Tags : 
cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
    
Tenable
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.