Tag Archives: cybersecurity

Regional dental firm Great Expressions protects distributed data with lower complexity thanks to amalgam of Nutanix HCI and Bitdefender security

Modern dentistry depends on more than good care. It also demands rapid access to data and applications. For a rapidly growing dental services company — consisting of hundreds of dental offices spread across 10 US states — the task of … Continue reading

Posted in big data, Bitdefender, Cloud computing, Cyber security, data center, disaster recovery, electronic medical records, enterprise architecture, Enterprise transformation, ERP, healthcare, hyperconverged infrastructure, Nutanix, Security, Software-defined storage, storage, Virtualization | Tagged , , , , , , , , , , , , , , | Leave a comment

How one MSP picked Bitdefender’s layered security approach for cloud-to-client protection

Solving security concerns has risen to the top of the requirements list for just about everyone, yet service providers in particular have had to step up their game. Just as cloud models and outsourcing of more data center functions have … Continue reading

Posted in Bitdefender, Cloud computing, Cyber security, data center, Enterprise architect, enterprise architecture, Enterprise transformation, managed services, multicloud, Security, server, Software, Software-defined storage, storage | Tagged , , , , , , , , , , , | Leave a comment

How a large Missouri medical center developed an agile healthcare infrastructure security strategy

Healthcare provider organizations are among the most challenging environments to develop and implement comprehensive and agile security infrastructures. These providers of healthcare are usually sprawling campuses with large ecosystems of practitioners, suppliers, and patient-facing facilities. They also operate under stringent … Continue reading

Posted in application transformation, Bitdefender, Citrix, Cloud computing, Cyber security, Data center transformation, disaster recovery, Help desk, Identity, Security, server, User experience, Virtualization, VMware | Tagged , , , , , , , , , , , , , | Leave a comment

Kansas Development Finance Authority gains peace of mind, end-points virtual shield using hypervisor-level security

Implementing and managing IT security has leaped in complexity for organizations ranging from small and medium-sized businesses (SMBs) to massive government agencies. Once-safe products used to thwart invasions now have been exploited. E-mail phishing campaigns are far more sophisticated, leading … Continue reading

Posted in Bitdefender, Citrix, Cloud computing, Cyber security, data center, Data center transformation, Enterprise architect, machine learning, Microsoft, mobile computing, Security, server, Virtualization, VMware | Tagged , , , , , , , , , , , , , , | Leave a comment

How a Florida school district tames the wild west of education security at scale and on budget

Bringing a central IT focus to large public school systems has always been a challenge, but bringing a security focus to thousands of PCs and devices has been compared to bringing law and order to the Wild West. For the … Continue reading

Posted in big data, Cloud computing, Cyber security, disaster recovery, Enterprise architect, Government, Help desk, Identity, Microsoft, Security, social media | Tagged , , , , , , , , , , , , , | Leave a comment

The next line of defense—How new security leverages virtualization to counter sophisticated threats

When it comes to securing systems and data, the bad guys are constantly upping their games — finding new ways to infiltrate businesses and users. Those who protect systems from these cascading threats must be ever vigilant for new technical … Continue reading

Posted in application transformation, big data, Bitdefender, Citrix, Cloud computing, Cyber security, data analysis, data center, DevOps, Enterprise architect, enterprise architecture, Enterprise transformation, Government, Identity, risk assessment, Security, Virtualization | Tagged , , , , , , , , , , , , | Leave a comment

DevOps and security, a match made in heaven

This next BriefingsDirect DevOps thought leadership discussion explores the impact of improved development on security and how those investing in DevOps models specifically can expect to improve their security, compliance, and risk-mitigation outcomes. Listen to the podcast. Find it on … Continue reading

Posted in DevOps, Hewlett Packard Enterprise, HP | Tagged , , , , , , , , | Leave a comment