Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

secure data access

Results 1 - 25 of 63Sort Results By: Published Date | Title | Company Name
Published By: Auth0     Published Date: May 12, 2016
HIPAA is the Health Insurance Portability and Accountability Act. It’s the legislation that makes sure your protected health information (PHI) is kept private and kept secure. It covers how healthcare providers and associated businesses should keep handle your data and protect your health information, and provides the standards needed to ensure PHI data stored, handled, and accessed correctly at all times.
Tags : 
auth0, hipaa, compliance, health insurance, legislation
    
Auth0
Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: AWS     Published Date: Oct 12, 2018
Safeguarding your data is more important than ever. In today’s data-driven business landscape, companies are using their data to innovate, inform product improvements, and personalize services for their customers. The sheer volume of data collected for these purposes keeps growing, but the solutions available to organizations for processing and analyzing it become more efficient and intuitive every day. Reaching the right customers at the right time with the right offers has never been easier. With this newfound agility, however, comes new opportunities for vulnerability. With so much riding on the integrity of your data and the services that make it secure and available, it’s crucial to have a plan in place for unexpected events that can wipe out your physical IT environment or otherwise compromise data access. The potential for natural disasters, malicious software attacks, and other unforeseen events necessitates that companies implement a robust disaster recovery (DR) strategy to
Tags : 
    
AWS
Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox
    
Axeda Corporation
Published By: BlackBerry     Published Date: Apr 13, 2010
Equipping staff with the right tools can enhance productivity, motivation and staff retention. Highly secure mobile email and data applications help mobile workers stay in touch and up-to-date with a wide range of business issues. Extending that streamlined anytime, anywhere access to mobile voice applications is the next frontier in worker empowerment.
Tags : 
blackberry, fixed mobile convergence, fmc, pbxvoip, smartphones, it communication, microsoft exchange, mobile device management
    
BlackBerry
Published By: BubblewrApp     Published Date: Jan 20, 2015
The Company (name withheld) provides data center management and monitoring services to a number of enterprises across the United States. The Company maintains multiple network operations centers (NOCs) across the country where engineers monitor customer networks and application uptimes around the clock. The Company evaluated BubblewrApp’s Secure Access Service and was able to enable access to systems within customer data centers in 15 minutes. In addition, the Company was able to: a. Do away with site-to-site VPNs – no more reliance on jump hosts in the NOC b. Build out monitoring systems in the NOC without worry about possible IP subnet conflicts c. Enable NOC engineers to access allowed systems in customer networks from any device
Tags : 
systems management, customer data centers, network operation centers, secure access service, enterprise applications
    
BubblewrApp
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA API Management is a robust, enterprise-grade solution that can enable the success of your API initiatives. The software provides industry-leading tools to rapidly create APIs from existing data assets, orchestrate legacy services and safely expose enterprise applications and services. The solution also allows you to quickly onboard, manage and enable the developers who will create innovative apps that add value to your business. And, just as importantly, CA API Management secures your enterprise data to meet the toughest compliance and regulatory standards, while providing you with full control over which apps, developers and partners can access your APIs.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
In today’s application economy, interaction between a business and its customers, partners and employees is increasingly through apps. And omni-channel access to these applications—from anywhere at any time—is dependent on APIs. These APIs provide an interface for developers to code against, and must be robust enough to support ever-growing demand. As a result, APIs are perhaps the most critical technology in digital business design today. APIs sit between your application clients —apps, websites and devices—and application backends. By leveraging APIs, you can securely stretch the boundaries of your enterprise by tapping into a broad array of digital businesses, digital customers and digital devices. But just as important as the API, is the application backend itself. Behind the API, the data access layer and application logic layer are doing the heavy lifting—implementing business rules, maintaining data consistency and managing interactions with various data sources. These three com
Tags : 
    
CA Technologies EMEA
Published By: Carbonite     Published Date: Jul 18, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
pdf protection, data security, password protection, hacker prevention
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: • Exchange confidential client files and emails with superior encryption and security. • Offer a more professional solution compared to password-protected PDFs. • Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
citrix, quickbooks, file sharing, file security, pdf protection, customer service
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, your accountancy firm’s data and your clients’ information could easily be exposed to hackers. Download this white paper to learn more about PDF password protection failures that: • Expose data when people share passwords with others, especially through email. • Prevent your firm from knowing when files are read by unauthorized individuals. • Allow hackers to easily to gain access to confidential financial documents within minutes.
Tags : 
business documents, file sharing, file security, file backup, file sync, file delivery, data protection, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: • Exchange confidential client files and emails with superior encryption and security. • Offer a more professional solution compared to password-protected PDFs. • Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
client engagement, data security, confidential data, data protection, email security, customer service
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: • Exchange confidential client files and emails with superior encryption and security. • Offer a more professional solution compared to password-protected PDFs. • Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection, accounting protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
streamline sharing, data security, customer service, data encryption
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : 
data security, passwords, password protection, data vulnerability
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: Exchange confidential client files and emails with superior encryption and security. Offer a more professional solution compared to password-protected PDFs. Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data security, data encryption, file sharing, mobility, customer service
    
Citrix ShareFile
Published By: Citrix Systems     Published Date: Apr 15, 2015
IT professionals are rethinking remote access strategies to enable a mobile workforce. Whether they are in the office or on the road, people need secure remote access that’s simple to use, so they can be productive from anywhere. Empower your mobile workers with the right level of access to Windows® apps and data, using a solution that IT can trust. Used by more than 100 million people worldwide in organizations of all sizes, Citrix XenApp is the proven solution for secure remote access.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, compliance, application security
    
Citrix Systems
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
    
Commvault
Published By: Cox Communications     Published Date: Nov 10, 2014
A company’s most valuable asset is arguably its data and it needs to be backed-up, stored, secured and managed so that its available to the organization when and where needed. Have you ever thought about how much data your organization generates every day? Are you concerned about how your business can safely store and reliably access their growing data?
Tags : 
cloud backup, cloud computing, asset management, asset storage, cox
    
Cox Communications
Published By: GE Healthcare     Published Date: May 12, 2015
Help optimize cardiovascular care with a single database of images and information from virtually anywhere there is an internet connection.
Tags : 
cardiovascular diagnostics, image quality, secure web-based data integration, remote access, it management
    
GE Healthcare
Published By: GE Healthcare     Published Date: May 12, 2015
Help optimize cardiovascular care with a single database of images and information from virtually anywhere there is an internet connection.
Tags : 
cardiovascular diagnostics, image quality, secure web-based data integration, remote access, cardiovascular information system, cvis software, cvpacs, cardiovascular informatics
    
GE Healthcare
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.