HIT Consultant Insightful coverage of healthcare innovation
 

think data

Results 1 - 25 of 192Sort Results By: Published Date | Title | Company Name
Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. As the average cost of a data breach is over $4 million, discover how investing in security impacts business growth. Download infographic >
Tags : 
    
Lenovo UK
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Dell EMC Storage     Published Date: Sep 03, 2019
The digital era is changing the way that organizations think about, protect, and monetize data. Now more than ever they are pushing to be digitally-driven, and to achieve this they must be data-driven. Data powers everything in modern organizations; analytics, digital experiences, IoT, and artificial intelligence are notable examples. All are essential to organizations that want to succeed in a digitally transformed world, but they simply cannot function without data. This is driving the shift from data as a static digital asset to data as a strategic business asset.
Tags : 
    
Dell EMC Storage
Published By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: Tricentis     Published Date: Aug 19, 2019
Think back just 5 years ago. In 2014… • The seminal DevOps book—Gene Kim’s The Phoenix Project—was one year old • Gartner predicted that 25% of Global 2000 enterprises would adopt DevOps to some extent by 20161 • "Continuous Testing” just started appearing in industry publications and conferences2 • Many of today’s popular test frameworks were brand new—or not yet released • The term “microservices” was just entering our lexicon • QC/UFT and ALM were still sold by HP (not even HPE yet) • Only 30% of enterprise software testing was performed fully “in house”3 • There was no GDPR restricting the use of production data for software testing • Packaged apps were typically updated on an annual or semi-annual basis and modern platforms like SAP S/4HANA and Salesforce Lightning hadn’t even been announced Times have changed—a lot. If the way that you’re testing hasn’t already transformed dramatically, it will soon. And the pace and scope of disruption will continue to escalate throughout the fo
Tags : 
    
Tricentis
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
The digital era is changing the way that organizations think about, protect, and monetize data. Now more than ever they are pushing to be digitally-driven, and to achieve this they must be data-driven. Data powers everything in modern organizations; analytics, digital experiences, IoT, and artificial intelligence are notable examples. All are essential to organizations that want to succeed in a digitally transformed world, but they simply cannot function without data. This is driving the shift from data as a static digital asset to data as a strategic business asset.
Tags : 
    
Dell EMC Storage
Published By: Lenovo - APAC     Published Date: Aug 13, 2019
Find out why it’s harder than ever to keep data secure, as well as what could be causing security breaches. Plus see how to mitigate this risk using end-to-end solutions in this infographic. Learn how Lenovo’s ThinkShield solutions, combine cutting-edge security solutions to protect your devices from cyber-attack, throughout their lifecycle. Making all the difference with true, end-to-end protection at the device, identity, online and data levels.
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Your guide to security. Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide
Tags : 
    
Lenovo - APAC
Published By: Lenovo - APAC     Published Date: Jul 02, 2019
Your guide to security Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC
Published By: Adobe     Published Date: Jun 26, 2019
Get inside the minds of key decision-makers in mid-size companies who are tackling today’s biggest content management challenges. Learn how they’re thinking, what they see as opportunities, and how they’re planning to come out on top. With more than 7,000 CMS solutions available from more than 6,000 unique suppliers, you have a mind-boggling array of options — making it hard to know which path to take and how to decide. Here's your chance to get inside the minds of key decision-makers who are tackling today’s biggest content management challenges: - Personalization - Keeping up with current technology - Difficult-to-use content management systems - Over-reliance on IT teams for simple functions - Inadequate access to customer data and insights - Integrating third-party apps - Managing and optimizing content
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
Put your data in the hands of those who need it most, so they can act quickly to deliver great customer experiences. And a better bottom line. Data is no longer the domain of a few. Everyone in your organization should be thinking about it. And more importantly, acting upon it. This means taking data insights out of the realm of data scientists and making them a natural part of everyone’s workflow — from the marketing department to the executive team. To seize and capitalize on the data you already have, it’s important for analysts and marketers to rethink data—shifting from a reporting mindset to an action mindset. 74% of organizations want to be data driven, yet only 29% say they’re good at connecting analytics to action.
Tags : 
    
Adobe
Published By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
Defense and intelligence agencies want to leverage the data they collect so they can use artificial intelligence to enhance readiness – but most who run these programs don’t know how to get started and find it difficult to make the business case to their leadership. In this research report, created by GovLoop in partnership with IBM, which provides innovative technology solutions for national security and military intelligence, you’re going to learn where your peers stand—and some practical tips on how to get started—even if you think your data is “dirty” or not ready for advanced applications.
Tags : 
    
Group M_IBM Q2'19
Published By: Datastax     Published Date: May 20, 2019
Data management challenges have evolved drastically over the last decade, leading most companies to rethink how they manage their data. The need for more powerful and far more flexible databases resulted in the birth of the NoSQL database Apache Cassandra™. Read this white paper to learn how Cassandra has evolved and how it works.
Tags : 
    
Datastax
Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Infinidat EMEA     Published Date: May 14, 2019
Even after decades of industry and technology advancements, there still is no universal, integrated storage solution that can reduce risk, enable profitability, eliminate complexity and seamlessly integrate into the way businesses operate and manage data at scale? To reach these goals, there are capabilities that are required to achieve the optimum results at the lowest cost. These capabilities include availability, reliability, performance, density, manageability and application ecosystem integration? This paper outlines a better way to think about storing data at scale—solving these problems not only today, but well into the future?
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Lenovo UK     Published Date: May 13, 2019
It’s time to think bigger than incremental processing power and storage capacity upgrades. In 2019 IT modernisation offers much more, providing opportunities to closely align infrastructure with your most ambitious goals and build a future-facing foundation for success. Whatever your goals, this playbook gives you six versatile strategies that can help you plan a successful IT modernisation project, supported by examples from our industry-leading data centre portfolio.
Tags : 
    
Lenovo UK
Published By: Zaloni     Published Date: Apr 23, 2019
Although data and analytics are highlighted throughout the popular press as well as in trade publications, too many managers think the value of this data processing is limited to a few numerically intensive fields such as science and finance. In fact, big data and the insights that emerge from analyzing it will transform every industry, from “precision farming” to manufacturing and construction. Governments must also be alert to the value of data and analytics as the enabler for smart cities. Institutions that master available data will leap ahead of their less statistically adept competitors through many advantages: finding hidden opportunities for efficiency, using data to become more responsive to clients, and developing entirely new and unanticipated product lines. The average time spent by most companies on the S&P 500 Index has decreased from an average of 60 to 70 years to only 22 years. There are winners and losers in the changes that come with the evolution of both technology
Tags : 
    
Zaloni
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : 
data, backup, recovery, virtualization, solutions, cloud, architectures
    
Rubrik EMEA
Published By: Oracle EMEA     Published Date: Apr 15, 2019
Forward-thinking enterprises understand what it takes to be successful in this data-rich, increasingly automated economy. According to the Harvard Business Review Analytic Services research report The Rise of Intelligent Automation: TurningComplexity into Profit, sponsored by Oracle, at least 7 in 10 executives understand that predictive analytics (80%) and AI and machine learning (68%) are important for the future of the business. Even as executives recognize the vital role data plays in their businesses, many are unable to take advantage of the value residing in their data. The old ways of collecting, managing, storing, and analyzing data are no longer effective, and are preventing businesses from extracting potential value. Many simply can’t execute on a data-driven vision.
Tags : 
    
Oracle EMEA
Published By: Mimecast     Published Date: Mar 19, 2019
An Executive Strategy Guide Brought To You By The Cyber Resilience Think Tank Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that matters—data that will help mitigate future risks. Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isn’t part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Tags : 
    
Mimecast
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.