HIT Consultant Insightful coverage of healthcare innovation
 

remote office

Results 51 - 75 of 81Sort Results By: Published Date | Title | Company Name
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : 
mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
    
Internet Security Systems
Published By: Dell EMC     Published Date: Nov 02, 2015
Enterprises with remote or branch offices and small to midsized businesses face very specific infrastructure challenges. Dell PowerEdge VRTX addresses these by providing scalable servers, storage, and networking in a compact, converged, easy-to-manage platform. Here’s how it brings simplicity, versatility and efficiency to ROBO or SMB environments.
Tags : 
    
Dell EMC
Published By: Aerohive     Published Date: Jan 04, 2012
In today's virtual enterprise, access to corporate resources must be secure, reliable, and manageable, with consistently enforced policy while simultaneously allowing access from anywhere at any time. This is why access network strategies are critical to business growth.
Tags : 
aerohive, branch office, cloud computing, remote networks, vpn, cloud enabled networking, distributed enterprise, cloud security services, business continuity, teleworker, remote office, call center, virtual office, disaster recovery, zero touch wireless, retail pci
    
Aerohive
Published By: Riverbed     Published Date: May 19, 2016
This white paper reveals how Hyper-converged Edge takes the value that Hyper-converged Infrastructure (HCI) provides in the Data Centre and projects it out to a “stateless” remote office.
Tags : 
riverbed, hyper-converged infrastructure, data center, data
    
Riverbed
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: Riverbed Technology, Inc.     Published Date: May 27, 2014
Data in branch and remote offices is subject to a variety of threats. Data centers are built to secure data, but remote offices lack the same level defenses. It’s now possible to eliminate the risks of branch office IT, consolidating servers and storage into the datacenter without sacrificing the benefits of having servers at the edge close to users.
Tags : 
datacenter, data security, consolidating servers, consolidating storage, data defense, enterprise expansion, edge close to users, riverbed, idg
    
Riverbed Technology, Inc.
Published By: Riverbed     Published Date: Feb 26, 2015
Nobody can afford to lose data. But managing data, including backup and availability, in locations can present many logistical and technological challenges that bring complexity, expense, and risk. It doesn’t have to be that way, though. A new branch converged infrastructure approach allows organizations to project virtual servers and data to remote offices, providing for local access and performance while storing the data in centralized data centers. Enterprises can now do business across the globe in any location without putting data at risk.
Tags : 
data center, lose data, infrastructure, data backup, infrastructure
    
Riverbed
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: Dell EMC     Published Date: Nov 02, 2015
For remote offices and branch offices (ROBOs), effective server performance is critical. This white paper introduces a server solution featuring Intel® Xeon® processors that provides simplicity, efficiency, and versatility for these office environments.
Tags : 
    
Dell EMC
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Businesses understand more than ever that they depend on data for insight and competitive advantage. And when it comes to data, they have always wanted easy access and fast performance. But how is the situation different now? Today, organizations want those elements and more. They want IT to strip away the limitations of time with faster deployment of new databases and applications. They want IT to reduce the limitations of distance by giving remote and branch offices better and more reliable access. And in a global world where business never stops, they want IT to ensure data availability around the clock. If IT can deliver databases and applications faster, on a more automated and consistent basis, to more locations without having to commit onsite resources, IT will be free to focus on more strategic projects."
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Dell EMC     Published Date: Jun 29, 2016
The EMC IsilonSD product family combines the power of Isilon scale-out NAS with the economy of software-defined storage. IsilonSD Edge is purpose built to address the needs associated with growing unstructured data in enterprise edge location including remote and branch offices. Read the solution brief to find out more about the power of software-defined storage combined with EMC Isilon.
Tags : 
storage, data, best practices, enterprise
    
Dell EMC
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
Software-Defined Wide Area Network (SD-WAN) is the application of software-based network technologies to WAN connections to more effectively route all network traffic between headquarters or data centers, remote and branch offices, and the cloud.
Tags : 
software-based networking, cloud data, sd-wan
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
What is SD-WAN? Software-Defined Wide Area Network (SD-WAN) is the application of software-based network technologies to WAN connections to more effectively route all network traffic between headquarters or data centers, remote and branch offices, and the cloud. More simply, it is the method of leveraging the benefits of the cloud, the bandwidth of broadband and existing enterprise-wide network infrastructure to more efficiently and cost effectively transmit media (data, video, voice) and quickly access cloud applications from every location in the network. SD-WAN dynamically utilizes multiple available connections (MPLS, broadband, LTE) to find the optimal delivery path for traffic across the entire network, shaping the bandwidth as needed to eliminate jitter and dropped data packets, thereby delivering an optimal user experience regardless of location. The more sophisticated solutions will first attempt to dynamically steer traffic to the best available link and if the available link
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Cisco     Published Date: Jun 03, 2015
As demands for “right here, right now” information sharing continue to rise, today's organizations are taking a hard look at their branch and remote locations, where performance and service enablement have always been a primary indicator of companywide productivity. In this episode, the TechWiseTV team takes a dive deep into the innovations and opportunities made possible by Cisco's new 4000 family of Integrated Services Routers. Learn how the architecture and new features that make up this exciting addition to Cisco's router portfolio are bringing more exciting new levels of integration, performance, and productivity to the branch office than ever before.
Tags : 
cisco, techwise, routers, wan, productivity, performance
    
Cisco
Published By: InMage     Published Date: Feb 24, 2009
The AODA currently provides IT support and management for 32 remote offices serving approximately 1,000 end users. In a field dependent upon the highest standards of data integrity, protection and retention, it was critical for the AODA to implement the disaster recovery (DR) and business continuity solutions necessary for fulfillment of its objectives.
Tags : 
inmage, data recovery, disaster recovery, business continuity, new mexico state aoda, dr scout, continuous data protection, cdp, disaster recover software
    
InMage
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: Clarus Systems     Published Date: Mar 18, 2008
In today’s global marketplace, you rely on your IP telephony environment to unite employees who work remotely, in a branch, or at the office headquarters by providing seamless, effective communications. Whether at the time of deployment, during an upgrade, or through an operational review, validating these environments to function properly and meet user expectations is critical.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Citrix Systems     Published Date: Apr 15, 2015
App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing
    
Citrix Systems
Published By: Citrix     Published Date: Jul 17, 2014
This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : 
citrix, xenapp, mobile workers, mobile workforce, desktop management, virtual desktop, virtualization, roi
    
Citrix
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.