HIT Consultant Insightful coverage of healthcare innovation
 

2015

Results 76 - 100 of 559Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2017
Reviewing a year of serious data breaches, major attacks and new vulnerabilities. The IBM X-Force 2016 Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide in 2015.
Tags : 
ibm, security, ibm x-force, cyber security intelligence index., cyber security, intelligence
    
IBM
Published By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
Published By: Cisco     Published Date: Dec 21, 2016
The 2015 Aragon Research Globe™ for web and video conferencing examines 22 major providers in the market. Emerging use cases make real-time collaboration a strategic imperative that requires proper planning and execution.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
The 2015 Aragon Research Globe™ for web and video conferencing examines 22 major providers in the market. Emerging use cases make real-time collaboration a strategic imperative that requires proper planning and execution.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Modern organizations are expanding mobility initiatives across virtually every business function. According to Cisco’s 2015 Mobility Landscape Survey, 72 percent of business leaders believe mobility is a strategic imperative for their organization’s success. In fact, in many businesses today, line-of-business (LoB) leaders are increasingly funding and making decisions about mobile applications and solutions.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Modern organizations are expanding mobility initiatives across virtually every business function. According to Cisco’s 2015 Mobility Landscape Survey, 72 percent of business leaders believe mobility is a strategic imperative for their organization’s success. In fact, in many businesses today, line-of-business (LoB) leaders are increasingly funding and making decisions about mobile applications and solutions.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Digital transformation has become a top mandate for almost every IT and business leader. The ZK Research 2015 IT Priorities Survey found that 79% of businesses currently have a digital transformation initiative in progress (Exhibit 1). In the digital era, competitive advantage is no longer determined by which company has the best products or even the best people. Market leadership is based on an organization’s ability to analyze information, gain insights and make fast decisions to capitalize on market transitions.
Tags : 
    
Cisco
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Microsoft® announced Windows Server® 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: Oblong     Published Date: Nov 18, 2016
Fujitsu created the Open Innovation Gateway (OIG) in the Silicon Valley as a platform dedicated to advancing the implementation of innovative practices in June 2015. The OIG spurs practical results and achieves goals based on collaboration throughout the organization from a wide range of fields. Fujitsu has been using the immersive Mezzanine solution as the collaborative heart of the OIG. Mezzanine allows remote teams to simultaneously share information on any device. Meeting participants can gesturally move and organize information across an immersive digital workspace. To achieve the same collaborative results as Fujitsu, schedule a demo at one of our locations and experience an immersive digital workspace first hand.
Tags : 
    
Oblong
Published By: goTransverse     Published Date: Nov 02, 2016
In this era of cloud computing, mobile devices, and the Internet of Things (IoT), firms are testing new product offerings that combine elements of content, software, services, and hardware together. Like the innovative products themselves, the rulebook on monetizing them is evolving. Firms are shifting from one-time perpetual sales or fixed monthly subscriptions to consumption models that blend onetime, subscription, and usage-based billing. Download this white paper to learn the eight subscription billing solution providers that matter most and how they stack up.
Tags : 
    
goTransverse
Published By: VMware AirWatch     Published Date: Oct 27, 2016
Hear how leading hospitals are using the Digital Clinical Workspace as a platform for innovation to improve the patient and provider experience, and enable the right device at the right time for the right task. The session will cover new key technologies to help protect patient data and cover the recent announcement of Target Platform for Epic 2015.
Tags : 
    
VMware AirWatch
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security
    
Veracode
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Every enterprise is aware of the need for digital transformation. A 2015 study conducted by KPMG found that their top four concerns moving forward were: (1) new entrants disrupting existing business models; (2) the ability to keep current with technology; (3) competitors leveraging digital business models to take share; and (4) products and services remaining relevant as the digital future unfolds.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s the new reality — and it is reshaping the enterprise. Gone are the days of employees tethered to desktop computers, and they’re no longer dependent on an Ethernet or wi-fi connection to work remotely. More and more enterprise employees are conducting daily work transactions on mobile devices. Mobility surged to 1.3 billion workers in 2015, continuing a 33 percent growth trend since 2010. These mobile workers aren’t limiting themselves to a single device, either. In just the last year, the number of devices managed by enterprises grew an incredible 72 percent.
Tags : 
    
Entrust Datacard
Published By: OC Tanner     Published Date: Oct 24, 2016
This white paper explores the O.C. Tanner Institute’s 2015 Great Work Index Study. What is great work? Who is currently doing great work? What can you do to encourage everyone in your organization to achieve great work?
Tags : 
rewards and recogntion, employee engagement, employee recognition, oc tanner, global engagement, global recognition
    
OC Tanner
Published By: Dell EMC     Published Date: Oct 13, 2016
In today’s mobile and digital world, IT speed and agility are essential. Which is why organizations are turning to converged infrastructure solutions to get the results they need to transform their business. A 2015 IDC white paper reveals how Dell EMC customers around the world are leveraging convergence to deliver faster business outcomes.
Tags : 
speed, innovation, data management, return on investment
    
Dell EMC
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems, ips, gartner
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Managed security services is a mature market with offerings from established service providers. This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements. publish date: December 2015
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services
    
IBM
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Microsoft® announced Windows Server® 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments.
Tags : 
palo alto, windows, technology, endpoint protection
    
Palo Alto Networks
Published By: Adobe     Published Date: Sep 28, 2016
As the digital landscape evolves, marketing channels become more complex. That means that personalizing advertising campaigns across every channel is becoming even more crucial. Read Cross Channel Advertising with AMO to learn how managing advertising campaigns programmatically lets you deliver unique customer experiences while giving you the control and insight you need. Download our report to learn more about: • Search marketing standards across the US and UK in 2015 • The recent shift of consumer transactions on mobile devices • The next big trend in ad spend
Tags : 
adobe, cross channel, cross channel advertising, advertising, marketing, marketing channels, digital
    
Adobe
Published By: Delta Risk     Published Date: Sep 21, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Xactly Corp     Published Date: Sep 16, 2016
Over 100 companies participated in Xactly’s inaugural Sales Compensation Administration Best Practices Survey and provided us with information around the processes, approaches, and technologies they use to design and administer their sales compensation programs. The primary focus of this study was to better understand how sales compensation programs are typically managed and to provide companies with information so that they can self-assess where they stand in relation to their peers.
Tags : 
sales compensation, sales commission, sales payout, sales technology, sales best practices, sales performance management, incentive compensation, compensation management
    
Xactly Corp
Published By: Cornerstone OnDemand     Published Date: Sep 13, 2016
You marry someone for who they are, not who you think they might become. So why do so many HR professionals not take the same approach with their recruiting initiatives? Why do they hire based on a candidate’s potential, rather than what they can offer right now? More importantly, who should they be engaging? Check out some findings from the 2015 Workforce Purpose Index1 and learn about “purpose-oriented workers,” and how recruiting them can lead to a stronger workforce.
Tags : 
    
Cornerstone OnDemand
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.