HIT Consultant Insightful coverage of healthcare innovation
 

data collaboration

Results 1 - 25 of 172Sort Results By: Published Date | Title | Company Name
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: Amazon Web Services and Intel     Published Date: Oct 07, 2015
With the large amounts of data that are constantly being utilized in today’s highly digitized world, there is a necessity for top of the line infrastructure to maintain everything with precision. Download this case study to see how high performance cloud computing can enhance collaboration and see how it will allow for research to be shared easily and the ability to scale up when needed.
Tags : 
high performance cloud computing, collaboration, data
    
Amazon Web Services and Intel
Published By: Apptio     Published Date: Jul 16, 2019
We know that digital transformation is changing the economics of IT, but is this influencing CXO dynamics and strategic decision-making? To determine this, the Financial Times (FT) Focus partnered with Apptio to survey more than 550 C-suite leaders in technology and finance globally. Download this FT Focus report to discover how to: - Bridge the trust gap and ease tensions between the Office of the CIO and the CFO with accountability and real-time data - Leverage digital transformation to foster greater collaboration and avoid creating blurred responsibilities across the C-suite - Help leaders at global brands embrace AI, reskilling, cloud, Agile, and decentralized decision-making to move at hyperspeed and deliver value.
Tags : 
    
Apptio
Published By: Black Box     Published Date: Nov 24, 2015
Black Box can help you get the most out of your technology investment. We partner with customers to identify the right solutions for strategic IT needs that add value to your business. Our portfolios of Wired/Wireless, UCC, and IT Service solutions, and our depth of expertise, deliver positive business outcomes for evolving IT business scenarios. Black Box takes a vendor-independent approach to deliver the right solution, on the right network. Our long-term, established relationships with best-in-class IT technology providers allow us to offer objective, vendor-neutral solutions designed to meet a broad range of IT requirements. With more than 4,000 team members & 200 offices in 150 countries, we offer global capabilities with local expertise, and are committed to driving business success through IT excellence. Our passion to IT communications is unsurpassed, and we will work with you to find the ideal solution for today’s challenge while helping to anticipate tomorrow’s needs.
Tags : 
voip solutions, contact center solutions, business phone systems, ucc, it services, it solutions, it security, it infrastructure, uc solutions, mobility solutions, cloud solutions, enterprise business solutions, data center cloud service, it disaster recovery, network services, video collaboration
    
Black Box
Published By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : 
blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Blue Jeans Network     Published Date: Jul 21, 2014
Over the past two decades, the conferencing and collaboration industry has introduced a series of enterprise communications offerings that address these challenges by enabling voice, video, and data collaboration at a distance – saving customers time and money, fostering team collaboration, and improving employee work-life balance. More recently, video conferencing and collaboration solutions have moved to the "cloud," giving customers cost effective, scalable, and more flexible purchasing options to meet their expanding communications needs. Download to learn more!
Tags : 
video collaboration, conferencing, data collaboration, video conferencing, flexible purchasing options, cloud
    
Blue Jeans Network
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending
    
Brainloop
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
Published By: CA Technologies     Published Date: Jun 03, 2015
"DevOps helps drive continuous collaboration with the end-customer, gaining further visibility into online and mobile application usage and its effect on the brick-and-mortar experience. The data your company can derive from this collaboration should be used to continuously validate assumptions made earlier in the development process. Today’s empowered consumers have high expectations for the companies they do business with. They expect real-time communication, instant information, and the ability to connect in multiple ways. And they want it to be simple. A DevOps approach can help to accomplish this."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps helps drive continuous collaboration with the end-customer, gaining further visibility into online and mobile application usage and its effect on the brick-and-mortar experience. The data your company can derive from this collaboration should be used to continuously validate assumptions made earlier in the development process. Today’s empowered consumers have high expectations for the companies they do business with. They expect real-time communication, instant information, and the ability to connect in multiple ways. And they want it to be simple. A DevOps approach can help to accomplish this.
Tags : 
    
CA Technologies
Published By: Cisco     Published Date: Dec 23, 2014
We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Download your free white paper and learn how we have become the key supplier of converged technology and services in this space.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
UCS Advantage* is a limited time program that allows customers with qualified HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
UCS Advantage* is a limited time program that allows customers with qualified Cisco UCS M1/M2 and HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Virtualization has transformed the data center over the past decade. IT departments use virtualization to consolidate multiple server workloads onto a smaller number of more powerful servers. They use virtualization to scale existing applications by adding more virtual machines to support them, and they deploy new applications without having to purchase additional servers to do so. They achieve greater resource utilization by balancing workloads across a large pool of servers in real time—and they respond more quickly to changes in workload or server availability by moving virtual machines between physical servers. Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The Cisco UCS solution provides all management and configuration services at the centrally located Fabric Interconnects, so you can manage large-scale deployments from a single location. This method lets you consolidate hardware and streamline management. The IBM Flex System solution uses a distributed management model with chassis-level control. This method adds to the complexity to the hardware configuration, which can increase management needs.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
datacenter, data management, collaborations, business capabilities
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
This study includes an analysis of 11 worldwide enterprise videoconferencing equipment vendors. To qualify for inclusion in this IDC MarketScape study, vendors must offer a portfolio of enterprise-class videoconferencing products, solutions, and services either directly and/or through channel partners.Basic capabilities of the vendor offerings should include support for high-definition (HD) video and audio technology, availability of data collaboration tools and applications for use within a video session, and the ability to integrate with UC portfolios and business applications, among other criteria.
Tags : 
mobile, video collaboration, portfolios, investments, unified communications
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Download your free white paper and learn how we have become the key supplier of converged technology and services in this space.
Tags : 
ucs, datacenter, data management, mobility solutions, networking hardware, datacenter services, collaboration, ucs architect
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
Smart technologies are a force multiplier for public safety agencies, allowing them to serve growing populations even as public spending remains constrained. The Internet of Everything (IoE) provides the connective tissue in this evolving operational environment — not only bringing together objects embedded with electronics, software and sensors, but making them work together in the service of better policing. The IoE makes it possible to collect data and share it via the cloud, uniting disparate jurisdictions, agencies and ranks of command in positive ways. These smart and connected technologies promote collaboration and transparency among public safety agencies, revolutionizing how police, fire, courts and corrections do some of the nation’s most important work.
Tags : 
public safety, data, cloud, communication, ioe
    
Cisco
Published By: Cisco     Published Date: Jan 12, 2016
Higher education has come under increasing scrutiny as never before due to rising costs, changes in future job requirements, and new forms of learning opportunities offered by non-traditional companies and institutions. Students and parents are rightfully questioning the value of higher education based on perceived outcomes as well as staggering student loans that in some cases could take a lifetime to pay back. While the value equation debate rages on, there is another phenomenon taking place. It is nothing short of a revolution regarding the advances in technology and how institutions of higher learning along with nontraditional organizations are utilizing these powerful new tools. These new tools include new mobile devices, enhanced and feature-rich learning management systems, data-feeding sensors, 3D printers, smart classrooms, smart buildings, and collaboration tools allowing students and faculty to collaborate just about anywhere face-to-face, virtually.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education
    
Cisco
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Download the free guide to learn how to give employees secure, flexible access to the apps, content, and data that they need to work from any device and location. In the guide, you will discover: • If your current productivity and collaboration tools are falling short. • 3 questions that will help you spot gaps in your mobile device security that are putting your company at risk. • Quick ways to improve employee collaboration while enhancing your data security.
Tags : 
    
Citrix ShareFile
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.