1. Security

    Comments Leave a Comment

    1-15 of 454 1 2 3 4 ... 29 30 31 »
    1. Mentioned In 454 Articles

    2. Cloud network services adjust to enterprise demands

      Cloud network services adjust to enterprise demands
      ... another layer of complexity. Cloud networking continues to adapt as enterprise demands push consistency and security to the forefront. But now, hybrid and multicloud add another layer of complexity. In discussions abou...
      Read Full Article
      Mentions: VDI Services SDN
    3. Getting Defensive With Patient Data

      Getting Defensive With Patient Data
      ...hen one occurs. From cloud security management to enterprise platform encryption and real-time backup, worthy security solutions are abundant. The patient data stream may be fraught with danger with the rise of the IoT, ...
      Read Full Article
    4. 1-15 of 454 1 2 3 4 ... 29 30 31 »
  1. Unified Access from Alcatel-Lucent Enterprise = seamless user experience
  2. Categories

    1. Industries:

      Education, Government, Healthcare, Hospitality, Manufacturing, Small Business, Transportation
    2. Technology Trends:

      Agile IT, Automation, Big Data, Business Intelligence & Analytics, Business Transformation, BYOD, Consumerization of IT, Digital Business, Digital Collaboration, Digital Transformation, Everything as a Service, Industry Reports, Internet of Things, IP Video, IT & Technology as a Service, IT Simplification, Mobility, Personal Cloud, Shift to Consumption Models, Tech Terms & Acronyms, Technology Evolution, The role of SIP, User Experience, WebRTC
    3. Business Strategies:

      Business Process, Business Strategy, Customer Service, Financial Models, IT as a Service, IT Management, IT Service & Support, Knowledge Management, Marketing & Sales
    4. ALE Technology Strategies:

      Application Fluent Network, Cloud, Convergence, Networking as a service, SDN, Security, Unified Access, Virtualization
    5. Technologies:

      DECT, Ethernet, Intelligent Fabric, IPv6, Link Aggregation, Network Access Control, Power over Ethernet, Smart Analytics, SPB, uNP, Virtual Chassis, Virtual Machine, Virtual Network Profiles, Voice over IP, Wireless LAN
    6. Solutions:

      Business Telephony, Cloud Communication, Customer Service, Data Center, Hardened Ethernet, Mobile Campus, Mobility, Network on Demand, Small & Medium Business, Unified Communications
  3. Quotes about Security

    1. We're trying to make sure that the security doesn't get in your way.
      In 10 encryption tips for the enterprise
    2. More security rules, more security tasks and more security delays have done little to drive more user buy-in for cybersecurity.
      In Federal Security Breaches Traced to User Noncompliance
    3. Without question, federal cybersecurity pros have a tough job, but they must start working with end users as partners instead of adversaries. It is a team game, and better support for users will deliver better results for security.
      In Federal Security Breaches Traced to User Noncompliance