RSS feed Get our RSS feed

News by Topic

scout

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security
     ForeScout
By: STANLEY Healthcare     Published Date: Mar 24, 2015
St. Joseph’s Hospital Health Center has a total of 310 refrigerators throughout the organization. These items require strict temperature ranges for quality patient care and safety. Regulatory agencies perform audits requiring logs of temperature monitoring and corrective actions. Read this case study to learn about how St. Joseph's deployed the wireless AeroScout Environmental Monitoring solution to leverage its wireless network by working with STANLEY Healthcare.
Tags : wi-fi, environmental monitoring, healthcare, pharmaceuticals, lab samples, patient care, patient safety, temperature monitoring
     STANLEY Healthcare
By: STANLEY Healthcare     Published Date: Mar 24, 2015
The Wales Home selected the STANLEY Healthcare AeroScout Resident Safety solution because of its ability to protect residents throughout the building and grounds, with every resident carrying a personal pendant to call for help at any time. Alerts are automatically directed to staff via Apple iPod® mobile digital devices, and activity is captured in a database for analysis. The Wales Home is also leveraging the AeroScout platform for temperature monitoring of its server room and refrigeration units. Read this case study to learn more about how The Wales Home increases resident safety and autonomy with STANLEY Healthcare’s AeroScout® Solutions.
Tags : resident safety, healthcare, nurse call systems, wi-fi, mobile devices, temperature monitoring
     STANLEY Healthcare
By: STANLEY Healthcare     Published Date: Mar 24, 2015
Using LEAN Six Sigma techniques, Central Sterile Processing and Materials Management leaders at Peninsula Regional Medical Center (PRMC) identified specialty bed management as an area ripe for improvement. They were spending too much time looking for these assets and renting too many specialty beds. Initially, the team focused on streamlining its order form process. They soon realized they were getting better—but at the wrong thing. They still weren’t achieving the desired results. Read this case study to learn how Peninsula Regional Medical Center implemented STANLEY Healthcare’s AeroScout® Real Time Locating System (RTLS) and uses real-time location to improve specialty bed management, dramatically reducing rental costs.
Tags : healthcare, medical center, medicine, location, bed management, rlts
     STANLEY Healthcare
By: STANLEY Healthcare     Published Date: Mar 24, 2015
In 2010, Children’s Hospitals and Clinics of Minnesota underwent a renovation at its Minneapolis facility. The goal was to transform the entire location into a place where patients and families – who previously received care in a shared-space environment – would enjoy private, family-centric rooms. Such a renovation would also transform the way staff worked together. Minnesota Children’s used the project as an opportunity to reevaluate its entire workflow and communications infrastructure. Read this case study to learn how Minnesota Children's Hospitals and Clinics of Minnesota implemented AeroScout® Real-Time Staff Visibility Solutions to achieve a quieter patient environment, enhanced safety, and improved workflow.
Tags : children's hospital, hospital, health care, staff visibility, patient environment, safety, workflow
     STANLEY Healthcare
By: ForeScout     Published Date: Feb 18, 2014
Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.
Tags : forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance
     ForeScout
By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance
     ForeScout
By: ForeScout     Published Date: Feb 18, 2014
Read the new Enterprise Strategy Report (ESG) analyst report. ESG projects that as NAC transforms into EVAS (Endpoint Visibility, Access & Security) it will become even more of a mainstream IT technology.
Tags : forescout, network access control, nac, enterprise strategy report, esg, endpoint visibility, access, security
     ForeScout
By: ForeScout     Published Date: Feb 18, 2014
Know your enemy! Establishing an effective defensive strategy is crucial with today's rapidly evolving cyberthreats. Understanding the cybercriminals' techniques used to perpetrate successful attacks is essential. The Cyberthreat Defense Report is based on a rigorous survey of IT security decision makers and practitioners across North America and Europe. It reveals the current and planned deployment of technological countermeasures. Read this new report from CyberEdge and stay one step ahead of your enemy.
Tags : forescout, cyberedge, cyberthreat, it security, security
     ForeScout
By: ForeScout     Published Date: Apr 18, 2014
Download your copy of the new eBook entitled “Definitive Guide™ to Next-generation Network Access Control.” This 84-page resource provides security practitioners with key capabilities, implementation considerations, use cases and operational advice for network access control (NAC) and details on how modern NAC platforms can be applied by IT organizations to achieve continuous monitoring and mitigation.
Tags : forescout, next generation network access control, implementation considerations, it organizations, security resources, nac platforms, security
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : forescout, counteract, compliance, independent, assesment, network, access, control
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
     ForeScout
By: ForeScout     Published Date: Jan 24, 2013
This IDC study surveyed IT managers about the number of consumer devices on their networks, they underestimated the number by 50%. Whether you are prohibiting, tolerating or embracing BYOD, you need to define policy and security.
Tags : bring your own device, byod, idc survey, it managers, devices on network
     ForeScout
By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : gartner magic quadrant, network access control, forescout, leader in network access control, nac, overall viability, it management
     ForeScout
By: ForeScout     Published Date: Jan 24, 2013
In this case study, Vistaprint Taps ForeScout CounterACT for Endpoint Compliance. Obtain real-time visibility into the security posture of all devices on the network, including both physical and virtual machines, in order to manage compliance.
Tags : vistaprint, case study, counteract, endpoint compliance, real time visibility, physical and virtual machines
     ForeScout
By: CDW     Published Date: Apr 22, 2015
To get a handle on what was possible, and all that would be involved, Bob Stirton, director of information technology for the Kansas City Chiefs football organization, sent Network Engineer Scott Fletcher on a scouting mission to the 2012 Super Bowl at Lucas Oil Stadium in Indianapolis. Fletcher watched first-hand the inner workings of a recently installed Cisco Systems wireless network in full-on, gameday action.
Tags : wifi, wireless, technology, network
     CDW
By: IBM     Published Date: Sep 30, 2013
The Smarter Workforce Accelerator uses a structured model that helps you understand your current capabilities and those that you need to develop to achieve your Smarter Workforce objectives. The assessment focuses on your current environment and capabilities such as scouting talent, recruiting talent, leadership development, and your work culture and methods. Each capability is assessed using an objective framework that defines the characteristics of an organization at each level. This approach helps you understand: • Your current and desired capability levels • Your organization’s relative maturity compared with the competition and leading practice • Business opportunities and priorities resulting from the capability gaps
Tags : ibm, ibm smarter workforce accelerator, workforce management, social business, technology, smarter workforce, recruiting, staffing
     IBM
By: ForeScout     Published Date: Mar 28, 2017
As successful data breaches continue to occur with increased frequency, organizations must address core challenges instead of simply adding security products. In this white paper, IDC suggests that organizations adopt an "already breached" attitude that focuses on device visibility and detection.
Tags : data, breach, frequency, organizations, idc, device, visibility
     ForeScout
By: ForeScout     Published Date: Mar 28, 2017
Continuous monitoring (CM) can result in continuous improvement that reduces attack surfaces and improves security postures according to this 2016 survey of 292 individuals actively involved in vulnerability assessment and remediation. 63% of respondents said CM was improving their security posture.
Tags : sans, surface, survey
     ForeScout
By: ForeScout     Published Date: Mar 28, 2017
Miercom analysts review results of its tests verifying the ForeScout platform’s ability to quickly discover, classify and assess endpoints, including unmanaged BYOD and IoT devices—without agents—and apply network and host-based controls to enforce security policy and remediation.
Tags : discover, classify, endpoints, miercom, byod, iot
     ForeScout
By: ForeScout     Published Date: Mar 28, 2017
This research report identifies seven IoT devices that can be hacked in as little as three minutes and make organizations extremely vulnerable to attack. The ubiquity of these devices is a recipe for disaster that must be addressed through visibility and control of devices on the network.
Tags : forescout, risk, report, hackable, enterprise
     ForeScout
By: InMage     Published Date: Feb 18, 2009
Business-critical data and applications must be available around the clock or serious business disruption could result.
Tags : inmage, practical business protection, dr-scout, continuous data protection, cdp, encryption support, host-agents, control servers
     InMage
By: InMage     Published Date: Feb 18, 2009
Enterprises Applications - the Challenge Businesses today rely on enterprise applications such as SAP, PeopleSoft, Siebel, Oracle and Microsoft SQL to provide day to day business operations.
Tags : inmage, dr-scout protection, database applications, tcp/ip, cost-effective disaster recovery, recovery point objectives
     InMage
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics