HIT Consultant Insightful coverage of healthcare innovation
 

act

Results 501 - 525 of 14342Sort Results By: Published Date | Title | Company Name
Published By: CrowdTwist     Published Date: Sep 07, 2016
Explore 45 loyalty marketing ideas that will keep customers connected to and engaged with your brand beyond transactions.
Tags : 
crowdtwist, loyalty, loyalty marketing, marketing, customer engagement, loyalty programs
    
CrowdTwist
Published By: NetApp     Published Date: Mar 06, 2018
The company’s recently unveiled HCI platform leverages SolidFire’s all-flash scale-out architecture and performance management capabilities to support enterprise environments. Will it help NetApp make up ground against its fast-growing rivals?
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Amazon Web Services     Published Date: Jun 02, 2017
451 Research est une société de recherche et de conseil de premier rang spécialisée dans le domaine informatique. L'innovation technologique et les perturbations du marché sont au cœur de notre activité, ce qui nous permet d'offrir des lectures de données primordiales aux leaders de l'économie numérique. Plus de 100 analystes et consultants proposent cette lecture à plus de 1 000 organisations clientes situées en Amérique du Nord, en Europe et dans le monde entier, par le biais de services de recherche et de conseil syndiqués et d'événements en direct. Fondée en 2000 et établie à New York, 451 Research est une division de The 451 Group.
Tags : 
cloud, cloud platform, amazon, aws, microsoft
    
Amazon Web Services
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
    
Centrify Corporation
Published By: Stripe     Published Date: Aug 06, 2019
Payments is an increasingly strategic area of focus for enterprises, impacting market expansion, customer experience, business model evolution and, ultimately, revenue growth. As the role of payments in business strategy continues to expand, enterprises need secure, reliable and scalable infrastructure to underpin their transaction acceptance and processing capabilities. Stripe commissioned 451 Research to understand how large enterprise-scale merchants are thinking through their online payments infrastructure requirements. 451 Research surveyed 800 merchants across 8 countries, including a mix of business decision-makers from payments to finance to IT. KEY FINDINGS • 87% of mid- and large-sized businesses surveyed use the cloud as their dominant payments environment. • Nearly two-thirds of respondents using the public cloud for payments have seen improvements in security, innovation and uptime, while nearly three in five cited improved scalability. • Respondents using public-cloud-
Tags : 
payment security, platform as a service (paas), foreign currency transactions, fraud protection, payment solutions
    
Stripe
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"IT needs to reach beyond the traditional data center and the public cloud to form and manage a hybrid connected system stretching from the edge to the cloud, wherever the cloud may be. We believe this is leading to a new period of disruption and development that will require organizations to rethink and modernize their infrastructure more comprehensively than they have in the past. Hybrid cloud and hybrid cloud management will be the key pillars of this next wave of digital transformation – which is on its way much sooner than many have so far predicted. They have an important role to play as part of a deliberate and proactive cloud strategy, and are essential if the full benefits of moving over to a cloud model are to be fully realized."
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"Customers in the midst of digital transformation look first to the public cloud when seeking dramatic simplification, cost, utilization and flexibility advantages for their new application workloads. But using public cloud comes with its own challenges. It’s not always possible or practical for enterprises to retire their traditional, on-premises enterprise system still running the company’s most mission- critical workloads. Hybrid IT – a balanced combination of traditional infrastructure, private cloud and public cloud – is the answer. But a true hybrid IT deployment must go well beyond the current generation of hybrid cloud systems, where the on-premises and off-premises worlds have largely remained siloed and still have to be independently managed. This paper seeks to answer how to bring those siloes together by identifying eight essentials that must be met to achieve the ideal hybrid IT implementation."
Tags : 
    
Hewlett Packard Enterprise
Published By: Esker     Published Date: Dec 08, 2014
Discover the inspiring stories of five companies who successfully automated their manual order processing methods with Esker — and have the results to prove it. Esker has been referred to as a game-changer. Read the customer stories for yourself and envision your launch into optimized business processes. Download now!
Tags : 
business transaction, csr, processing, sales orders, faxes, fax machine, data, sap, application, print, email
    
Esker
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Tenable     Published Date: Jan 25, 2019
"Web application attacks are the top source of data breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization’s application security posture. Not surprisingly, about the same number consider their application security strategies immature.Applications play a critical role in supporting key business processes, but organizations are struggling to keep them safe. This eBook examines the 5 best practices for application security. Read this ebook now to understand: -Which types of apps present the highest security risk -Best practices for reducing security risks associates with web applications -Steps you can take now to secure web applications "
Tags : 
    
Tenable
Published By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : 
defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
    
Entrust Datacard
Published By: Social Text     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : 
social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging, twitter, facebook, adoption rate, adoption, ldap, email integration, mobile, budget
    
Social Text
Published By: Social Text.     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : 
social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging, twitter, facebook, adoption rate, adoption, ldap, email integration, mobile, budget
    
Social Text.
Published By: Great Bay Software     Published Date: Apr 12, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Kaseya     Published Date: Jan 14, 2013
Like 62% of your peers*, do you lack an easy way to discover and manage devices both on and off your network? One thing that won’t change in 2013 for IT Pros is the daily onslaught of challenges. Learn about 5 best practices for network discovery
Tags : 
kaseya, it automation, discovery & management, free webinar, increasing security, 5 best practices for network discovery
    
Kaseya
Published By: Wildfire Interactive     Published Date: Jun 14, 2012
With the debut of Timeline for brands on February 29th, brands and marketers everywhere wondered whether the major changes to fan page functionality would cause noticeable differences in engagement activity. We decided to find out. We ran the stats for 43 brands ranging from 20K to 40MM fans and tracked every engagement metric 21 days prior to and 21 days after the Timeline change. We'd like to share the results.
Tags : 
facebook, marketing, social media, social media campaigns, advertising, timeline, social advertising
    
Wildfire Interactive
Published By: Gomez IT     Published Date: May 24, 2011
In a recent global survey of 474 business and IT decision makers, conducted by IDC on behalf of Compuware, respondents offered insights about their needs for effective operation of Internet-enabled business activities.
Tags : 
gomez, compuware, web performance management, idc, slas, service level agreements, end-user experience, multi-device, multi-browser
    
Gomez IT
Published By: ShieldX     Published Date: Apr 17, 2019
ShieldX customers Alaska Air and IDT are moving aggressively toward 100 percent cloud adoption for all IT operations. Discover how they have identified and resolved the security issues associated with going all in on the cloud.
Tags : 
    
ShieldX
Published By: Virgin Pulse     Published Date: Oct 03, 2013
This paper draws on a wealth of experience, external research, and Virgin Pulse's robust analysis of client data to outline the key factors within your organization that can drive your employees to enroll in, and stay engaged with, your workplace wellness programs.
Tags : 
employee wellness, sustained engagement, employee wellness initiatives, employee wellness programs
    
Virgin Pulse
Published By: Hippo     Published Date: Jun 24, 2014
Five best practices for getting your team ready to select a tool to engage customers, deliver personalized experiences, and manage customer experience effectively
Tags : 
hippo, web content management syestems, wcm, getting ready for wcm, top tips for wcm
    
Hippo
Published By: join.me     Published Date: Jul 10, 2015
This e-book examines the five practices that you can implement today to ensure meeting or exceeding your sales goals in 2015.
Tags : 
optimize sales revenue, how to exceed your sales goals, virtual sales, virtual selling, sales processes, social selling, sales revenues
    
join.me
Published By: Anaplan     Published Date: Apr 02, 2019
5 best practices for world-class zero-based budgeting A traditional budgeting process based on extrapolating the previous year’s spend fails to provide the detailed insight needed to achieve a material change in the cost base, particularly when line item expenses are already high-aggregated. But zero-based budgeting (ZBB) can—and that’s what’s driving its increasing adoption in these volatile economic times. Download this white paper to discover: • Benefits of implementing a ZBB process at your organization • 5 best-practice approaches to implementing ZBB • Tips for leveraging ZBB in your organization in today’s volatile economy
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Apr 09, 2019
5 best practices for world-class zero-based budgeting A traditional budgeting process based on extrapolating the previous year’s spend fails to provide the detailed insight needed to achieve a material change in the cost base, particularly when line item expenses are already high-aggregated. But zero-based budgeting (ZBB) can—and that’s what’s driving its increasing adoption in these volatile economic times. Download this white paper to discover: • Benefits of implementing a ZBB process at your organization • 5 best-practice approaches to implementing ZBB • Tips for leveraging ZBB in your organization in today’s volatile economy
Tags : 
    
Anaplan
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.