Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

providers

Results 26 - 50 of 937Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : 
web security, best practices, mitigation services, network management, automotive, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 08, 2017
Video quality can be measured in multiple ways, but the primary metrics – playback reliability and image quality – are the most critical. Get these right, and content providers are on their way to winning the loyalty of online audiences and driving monetization. Get them wrong, and viewers will defect in a heartbeat. For live-streaming events, such as sports, where there’s can’t-miss fast action, the ante is raised even higher. In this white paper, we’ll explore why online video quality matters and the specifics of how it should be measured. Get a peek “under the hood” to understand the core elements of video delivery that contribute to high-quality viewing experiences. Most importantly, see why the choice of a content delivery partner is essential to your online video success.
Tags : 
video quality, playback, video reliability, high quality viewing, online video success
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 13, 2018
The ongoing adoption of cloud computing by communications service providers (CSPs) continues to fundamentally reshape their business models and technology strategies on several levels. One such area that is garnering significant attention is the impact of the cloud on security services. This is because security services and the vital tools they encompass can be empowered through the adoption of a carrier cloud model. This, in turn, better positions CSPs to meet the demands of their customers, including those in the small to medium-size business (SMB) market segment. The timing of this migration is optimal, since many SMBs now recognize the threats they face and realize that given their limited IT budgets and lack of security expertise, CSPs are well positioned to protect them from cyberattacks. While the opportunity for CSPs is significant, many are hesitant to make a move in this area because they want to ensure they can address SMBs’ needs and maintain control of the service in a car
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Small and midsize businesses (SMBs) need – and want – cybersecurity. However, with limited resources, they often have to look for outsourced solutions. ISPs are well positioned to address SMBs’ security needs with their ongoing IT relationships, established contacts, and billing connections. Security offerings can help providers improve subscriber engagement, drive incremental revenues, and increase service provider affinity. This white paper will explore the following: • SMB exposure on the internet, and unique challenges they face dealing with security threats • How ISPs can help SMBs address their security exposure • The market opportunity for SMB security, and how providers can build a business case
Tags : 
    
Akamai Technologies
Published By: ALE     Published Date: Dec 05, 2018
A highly resilient data and communications network that supports easy accessibility and cost efficiency is a requirement for hospitals and medical facilities that seek to leverage technology to digitally transform their processes. Alcatel-Lucent Enterprise (ALE) provides a broad range of robust and secure networking, infrastructure and communication products and services to connect patients, caregivers, staff and the entire healthcare ecosystem. ALE specialized data and communications networks for healthcare providers optimize the care pathway through improved communications and more efficient processes to provide more timely, safe and effective care. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: AlienVault     Published Date: Oct 20, 2017
This 2017 Spotlight report reveals the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs. You'll learn about key findings including: The predominant driver for organizations to consider managed security services The most critical capabilities organizations look for in MSSPs The most requested security services offered by MSSPs Key benefits respondents have achieved by partnering with an MSSP Whether you are evaluating using an MSSP, or are an MSSP yourself, download this report to gain valuable insights into how MSSPs are helping their clients improve their security posture.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: Alight Solutions     Published Date: May 07, 2018
Choosing a payroll provider is never easy. Read the top questions you should be asking to assess payroll providers.
Tags : 
payroll provider, tax vendor, garnishments, quality assurance, tax reconciliation, payroll on cloud, payroll service, tax filing
    
Alight Solutions
Published By: Allscripts     Published Date: May 01, 2014
Meaningful Use Stage 2 increases many of the thresholds that were in Stage 1, but the main focus of Stage 2 is on exchanging structured information among providers and patients. With less than 7% of EHR vendors certified, are your systems and providers ready?
Tags : 
allscripts, ehr certification, portal challenges, cpoe adoption, direct messaging, technology upgrade, replacements, cloud reporting
    
Allscripts
Published By: Allscripts     Published Date: Oct 22, 2014
Download this case study to learn how Hutchinson Clinic, an independent, multi-specialty practice, was able to reduce costs, manage their patient population, and have 100% of their providers successfully attest for Meaningful Use Stage 1 with Allscripts TouchWorks® EHR solution
Tags : 
allscripts, open ehr core, ehr solution, hutchinson clinic, care model, oncology, multi-specialty
    
Allscripts
Published By: Altiscale     Published Date: Mar 30, 2015
This industry analyst report describes important considerations when planning a Hadoop implementation. While some companies have the skill and the will to build, operate, and maintain large Hadoop clusters of their own, a growing number are choosing not to make investments in-house and are looking to the cloud. In this report Gigaom Research explores: • How large Hadoop clusters behave differently from the small groups of machines developers typically use to learn • What models are available for running a Hadoop cluster, and which is best for specific situations • What are the costs and benefits of using Hadoop-as-a-Service With Hadoop delivered as a Service from trusted providers such as Altiscale, companies are able to focus less on managing and optimizing Hadoop and more on the business insights Hadoop can deliver.
Tags : 
hadoop implementation, hadoop cluster, hadoop-as-a-service, managing and optimizing, it management
    
Altiscale
Published By: Aon Hewitt     Published Date: Apr 22, 2014
Download our business brief to learn more about the changing health care landscape and how private health exchanges are realigning incentives to benefit everyone in the value chain: employers, insurance carriers, employees and providers.
Tags : 
corporate health exchange, active health exchange, private health exchange, aon hewitt exchange, aon exchange, aon health exchange, corporate health care, health benefits
    
Aon Hewitt
Published By: Aon Hewitt     Published Date: Oct 13, 2014
Are you struggling to predict and manage the rising cost of health care at your organization, while still trying to offer your employees and their families quality, affordable health coverage? Private health exchanges have emerged as a strategy employers are using to help curb this cost trend while offering employees more choice and control over their health care. Download XChanges Today to learn about this changing marketplace and how private exchanges are realigning incentives to benefit everyone in the value chain: employers, insurance carriers, employees, and providers.
Tags : 
aon, health coverage, private health exchanges, insurance, xchanges, affordable health coverage
    
Aon Hewitt
Published By: AppDynamics     Published Date: Aug 25, 2015
In collaboration with Enterprise Management Associates (EMA), AppDynamics has conducted a survey of application management professionals and managers to determine exactly what IT organizations want and need from APM providers. Here are some key findings from the research: • Only 30% of companies currently have application-specific solutions to monitor apps • 50% or fewer of the tools companies have purchased are actively being used to monitor apps • 27% of application-related problems are detected by monitoring tools • A “unified monitoring platform” is the top choice in a feature of an APM solution Download the full report to review the findings and understand the key challenges and “must haves” associated with APM solutions voiced by IT professionals themselves.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure, business intelligence, business management
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 20, 2017
Every industry is going through digital transformation. Whether retail, manufacturing, media, finance, or software - in order to survive organizations are changing the way they operate in order to meet the demands of today’s connected customers. Whether it’s Uber redefining urban transportation for consumers, Slack enabling teams to collaborate in totally new ways, or Docker rivaling legacy virtualization providers, innovation is being powered by technology, and it’s happening faster than ever before.
Tags : 
development operations, digital transformation, application, automation, safeguards
    
AppDynamics
Published By: apperian     Published Date: Apr 13, 2012
Enterprise app stores seem to be a proverbial win/win situation. Businesses win because they don't have to hang out with the unincorporated, if not unwashed, consumer masses. It's a win for the ecosystem of app store providers who suddenly have a much larger and more granular market to target. Read to find out more.
Tags : 
apperian, technology, business technology, enterprise, app store, mobile
    
apperian
Published By: Aprimo     Published Date: May 01, 2012
The real-time buzzword is back. Marketers, vendors, and service providers use this term in a variety of scenarios to describe technologies, analytics, customer service, and processes. In this report, Forrester outlines how firms should evaluate the need to build an agile and real-time environment using a combination of analytics, technology, and business processes.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy
    
Aprimo
Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra
Published By: Apstra     Published Date: Feb 25, 2019
This in-depth white paper explains how service providers are capitalizing on Intent-Based Networking — a new and effective networking model that provides a way of abstracting an application, feature, network, or resource in such a way that the intent is exposed, but the implementation is hidden.
Tags : 
apstra, intetn-based networking
    
Apstra
Published By: Apstra     Published Date: Aug 19, 2019
Yahoo Japan Corporation, one of Japan’s largest Internet service providers, is deploying Clos fabric networks for efficiently addressing their ever-growing data center traffic. Apstra® was selected for streamlining the design, build, and operations of these networks.
Tags : 
    
Apstra
Published By: Arbor     Published Date: Feb 07, 2013
The single biggest factor holding back enterprises from leveraging hosting and cloud service providers continues to be security and availability concerns.
Tags : 
arbor, ddos, cloud service, hosting providers, attack trends, protection services
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.
Tags : 
distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions
    
Arbor
Published By: Arbor     Published Date: Mar 13, 2014
For hosting and cloud service providers, learn how to secure your data and seize those opportunities of generating more revenue.
Tags : 
arbor, frost and sullivan, arbor networks, ddos protection, hosting providers, cloud providers, cloud service, attack trends
    
Arbor
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.