Skip to main content

Cloud Computing

By Ephraim Schwartz | 08:04 am | July 11, 2016
A threat that could compromise a device automatically signals Cisco’s Identity Services Engine and Cisco TrustSec to quarantine and prevent the attack.
By Ephraim Schwartz | 08:03 am | July 11, 2016
Symantec Data Center Security uses a combination of host-based intrusion detection (HIDS), intrusion prevention (HIPS) and least privilege access control.
By Ephraim Schwartz | 08:02 am | July 11, 2016
Fortinet uses an integrated approach to scan both perimeter and internal traffic to protect not only the data center but medical devices as well.
By Ephraim Schwartz | 08:01 am | July 11, 2016
IBM's Protocol Analysis Module (PAM) uses heuristics and behavior-based analysis to identify and stop threats.
By Ephraim Schwartz | 08:00 am | July 11, 2016
The Threat Discovery Center used by Damballa to assess traffic using its behavioral analysis software.
By Ephraim Schwartz | 08:00 am | July 11, 2016
Juniper maximizes computing power in the cloud as files traverse various security devices by forking the file and sending a copy to its cloud-based service.
By Jessica Davis | 12:07 pm | July 08, 2016
The firm listed 10 digital technologies that are helping people live healthier lives and, in turn, hold promise to reduce the amount spent on healthcare.
By Tom Sullivan | 11:09 am | July 08, 2016
The latest wrinkle in the DoD’s mammoth EHR modernization project concerns EHR maker Cerner hosting patient data and applying analytics to it. 
Analytics
By Jack McCarthy | 08:37 am | July 08, 2016
Early stage investments have already climbed close to $4 billion this year, according to a report published by StartUp Health, which is fostering an ecosystem of emerging companies in the healthcare sector. 
By Diana Manos | 08:18 am | July 07, 2016
Doctors are required by law to allow patients to view, download and transmit data and that new reality is giving rise to many hesitations. Here’s a look at pressing issues to understand before proceeding.