|
Blog
|
Data
|
Page
|
5

Advancing Health IT Security and Interoperability: 3 Targets

Arraya Insights| December 30, 2014

Our recent posts on the U.S. Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology’s “Federal Health IT Strategic Plan 2015-2020” have covered the scope of the plan and gone in depth on one of its top goals, namely, expanding the adoption of health IT. In this post, we’re […]

Read More >

Missed Upgrade Leads to JPMorgan Chase Cyber Attack

Arraya Insights| December 29, 2014

Your network security has been breached and your company’s sensitive data is in the hands of cyber crooks. That in and of itself is a bad enough spot to be in, but the salt in the wound? Hearing security experts say that a simple fix could have prevented the attack in the first place. It’s […]

Read More >

3 Ways the Feds are Hoping to Increase Healthcare IT Use

Arraya Insights| December 23, 2014

In our previous post on the U.S. Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology’s “Federal Health IT Strategic Plan 2015-2020” we laid out the basics of the report and what it could mean for the future of healthcare IT. This time around, we’re going to focus on […]

Read More >

Punishing Test Casts Doubt on Long-held SSD Beliefs

Arraya Insights| December 15, 2014

One of the knocks against solid-state drives (SSDs) was that, despite the higher level of performance they offered, they weren’t as durable as their counterparts, hard disk drive (HDD). As a result, the opinion prevailed that they just couldn’t be counted on. At least not for the long haul, anyway. There was always the fear […]

Read More >

How the Cloud Could Change the Face of Company Data Centers

Arraya Insights| December 3, 2014

Experts are predicting data centers everywhere are about to be hit with a massive increase in the amount of work they’re expected to handle. Is yours going to be ready to manage all of that extra traffic? By 2018, global data center IP traffic is estimated to almost triple from where it stood back in […]

Read More >

New, Highly Advanced Digital Security Threat Uncovered

Arraya Insights| December 2, 2014

It’s been called “groundbreaking” and “almost peerless,” and it’s been lurking in the wilds of the cyber landscape undetected since at least 2008. It’s a piece of malware known as “Regin,” and it has thoroughly impressed – and baffled – hardened security experts since its recent discovery. The malware, which was first made public by […]

Read More >

Cisco Unveils New App for Easier, Safer Remote Collaboration

Arraya Insights| November 26, 2014

It’s one of the most fundamental challenges facing IT teams right now: Providing a secure and efficient way for users to collaborate with each other, even as those same users become more mobile and less tied to one specific type of workstation. At the Collaboration Summit 2014, Cisco announced a new business application which would […]

Read More >

Cut Cost and Risk with VMware's Free vSphere Optimization Assessment

Arraya Insights| November 24, 2014

Faster problem resolution, a more-streamlined IT environment. Those are the kinds of things that make all IT leaders stand up and take notice. Something else that’s bound to catch their eye, especially in today’s world of tight budgets, the word free. Industry-leading cloud and virtualization provider VMware is putting its money where its mouth is and […]

Read More >

Making the Business Case for an Enterprise Mobility Management Suite

Arraya Insights| October 30, 2014

The dividing line between “work computer” and “personal computer” is getting harder and harder to spot. That’s because the ability to work anywhere, anytime is something that’s less of a novelty and more of an expectation these days. And not only do employees want to be able to access their work data from any location, […]

Read More >

Companies Paying Even More to Resolve Cyber Attacks

Arraya Insights| October 28, 2014

Businesses are having to work harder and spend more time trying to effectively contain and then resolve cyber-attacks, and that effort is starting to take a toll on their bottom lines. On average this year it’s taken companies 31 days to contain a cyber-attack.  They’ve spent an estimated $639,462 during that 31-day period while they […]

Read More >