HIT Consultant Insightful coverage of healthcare innovation
 

active management

Results 51 - 75 of 178Sort Results By: Published Date | Title | Company Name
Published By: Delta Risk     Published Date: Jun 07, 2016
Recent high profile, high impact cyber breaches at some of the largest financial institutions in the United States have highlighted the fact that boards of directors need to take an active role in the management of cyber risk. This Viewpoint offers the Delta Risk perspective on how boards should engage in the management of cyber security risks, stressing four priority activities.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: IBM     Published Date: Aug 30, 2010
Proactive Data Management Controls Data Growth. To take control, organizations must begin with the conscious decision not to let data growth proceed unexamined.
Tags : 
ibm, data growth, data management
    
IBM
Published By: IBM     Published Date: Aug 20, 2013
Decisions, decisions. They can make or break marketing success. Yet as customers and channels grow more complex, so does decision-making. As choices multiply, marketing becomes more challenging than ever. The days when marketers could rely strictly on good judgment and business acumen are past. Technology for decision and process automation gives marketers a decided edge in making spot-on decisions that match individual customers to the best message, on a scale of millions. The process of Decide builds on customer data collection and analysis, and positions your organization for profitable engagement with your Generation C connected customers. It plays an essential role in Enterprise Marketing Management (EMM) along with the processes of Collect, Analyze, Deliver and Manage.
Tags : 
enterprise marketing management, customer marketing, customer communication, interactive marketing, emm, process automation, marketing strategy, multi-channel marketing
    
IBM
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: NETIQ     Published Date: Dec 03, 2013
This white paper discusses how delegating Microsoft Active Directory administration using a directory management solution such as NetIQ® Directory and Resource Administrator™ can help you to achieve a more secure, efficient and compliant organization.
Tags : 
netiq, microsoft, active directory, complexity, security, identity management solution, directory management solutions, active directory administration
    
NETIQ
Published By: IBM     Published Date: Nov 19, 2014
According to a recent survey by the Compliance, Governance and Oversight Council, almost 70% of the electronic content and information organizations retain has no business or legal value. It’s simply digital detritus, retained because 1) we think we might need it sometime, 2) we forget about it, or 3) we don’t have policies and software in place to get rid of it. Ultimately, though, this unnecessary accumulation of content can create real problems in terms of e-discovery, regulation, management and cost. Watch this video white paper to learn more about: - How to get started on an information management strategy - The right combination of software and policy for successful information governance - The business case for proactive management of an organization’s digital footprint
Tags : 
compliance, governance, oversight, digital debris, data cleanup, legacy data cleanup, information management, information management strategy
    
IBM
Published By: ScriptLogic     Published Date: Jan 25, 2012
Privilege Authority Professional is the lowest cost Windows privilege management solution that provides the core features IT administrators need to simply and quickly elevate and manage user rights.
Tags : 
privilege authority, privilege authority professional, scriptlogic, active administrator, active directory, security, productivity, security management
    
ScriptLogic
Published By: ScriptLogic     Published Date: Aug 30, 2010
Managing the security and uptime of a Windows network requires you to master your Active Directory, the brain and heart of the network, with maximum efficiency. Active Administrator makes it simpler and faster than native Windows tools to exceed compliance regulations, tighten security, increase productivity, and improve business continuity.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore
    
ScriptLogic
Published By: ScriptLogic     Published Date: Jan 11, 2012
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore
    
ScriptLogic
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Learn how Citrix Workspace enables a flexible workplace that helps your organization become productive, innovative, and attractive to top talent. In this eBook, you will learn how to: - Empower employees and teams anywhere, on any device - Simplify and improve both security and endpoint management - Adopt new technologies more quickly and effectively"
Tags : 
    
Citrix Systems
Published By: Applix     Published Date: Mar 13, 2007
This whitepaper will help organizations understand how driver based planning and control activities can be transformed into the proactive management function that add greater value through faster decision making.
Tags : 
productivity, best practices, business process management, bpm, business management, erp, enterprise resource planning, applix
    
Applix
Published By: Indicative Software     Published Date: Aug 24, 2007
Learn about agent-based versus agentless monitoring approaches to enterprise management, and how a combination of data collection technologies can realize the benefits of both.
Tags : 
enterprise management, enterprise monitoring, data collection, data collection engines, agent-based monitoring, agentless monitoring, performance monitoring, application performance
    
Indicative Software
Published By: SAS     Published Date: Jun 27, 2019
The health care world is changing. And data has a role to play in that change. Traditional health care systems are becoming more accessible and convenient, while also offering lower priced options. Proactive care — rather than reactive — is expected, including a shift from disease management to disease prevention. Likewise, a greater emphasis on personalized delivery, including understanding populations, has led to increased precision in holistic care management. Combining conventional data sources with data from previously untapped data sources — such as electronic health records, wearables, social determinants, social media, genetics and diagnostics — creates new possibilities for understanding the patterns, relationships, and predictors of wellness and health. Keep reading this e-book to discover how health care leaders are generating new opportunities for innovation and transforming how care is delivered.
Tags : 
    
SAS
Published By: IBM     Published Date: Aug 21, 2013
Enterprise Marketing Management, or EMM, is a software technology solution for marketing organizations that provides a comprehensive marketing platform for managing customer and prospect interactions throughout the customer lifecycle. Before introducing the IBM® Enterprise Marketing Management suite, here are some recent observations about today’s marketing environment that set the context in which IBM is seeking to meet the needs of marketers. The practice of marketing is challenging these days because of the rise of the “empowered customer.” Today’s customers are well-informed, use other people as their primary information source, interact with companies through multiple channels, touch points and media, and want (but rarely get) a superior customer experience—and have outlets for venting frustration when they don’t get what they want.
Tags : 
marketing, enterprise marketing management, interactive marketing, marketing channels, emm, ibm, customer relationship management, marketing environment
    
IBM
Published By: IBM     Published Date: Jan 22, 2009
This white paper explains the IBM Tivoli® Netcool® customer experience management solution which offers the ability to monitor all aspects of the customer experience, to help increase satisfaction, reduce service calls, monitor the performance of new and existing services and device types — and help operations identify which issues have the greatest impact on valuable enterprise customers.
Tags : 
ibm, tivoli netcool, enterprise customers
    
IBM
Published By: IBM     Published Date: Nov 13, 2008
This white paper discusses how The IBM Tivoli® Netcool® customer experience management solution offers the ability to monitor all aspects of the customer experience, to help increase satisfaction, reduce service calls, monitor the performance of new and existing services and device types — and help operations identify which issues have the greatest impact on valuable enterprise customers. It delivers the visibility you need to improve the customer experience as they interact with different aspects of your business — to help increase loyalty and drive new revenue opportunities.
Tags : 
ibm, tivoli, service quality management, service level agreement
    
IBM
Published By: Cornerstone OnDemand     Published Date: Feb 22, 2016
For many small to medium size companies, finding the time to proactively manage employee performance is difficult. The emphasis is more often on increasing revenues and achieving stability, especially in the early days. However, as businesses grow, the need for improving staff engagement, productivity and loyalty becomes increasingly important. It is at this critical stage that Performance Management can mean the difference between businesses that experience sustained growth and those whose momentum falters. Even when organisations are aware of the importance of Performance Management, the tendency is to carry it out in an ad hoc manner. Such methods work with a low headcount, but as this increases, more formal processes are needed. 6 Steps to Performance Management Best Practice offers a practical guide for small and medium enterprises (SMEs) that have identified Performance Management as part of their long term growth strategy. Drawing on industry research, client case studies and
Tags : 
management, productivity, performance, growth, employee
    
Cornerstone OnDemand
Published By: ClickSquared     Published Date: Jul 07, 2009
With interactive relationship marketing, businesses can build relationships that captivate and motivate prospects and customers across an entire buying lifecycle, while providing measurable results. The digital platform these programs run on should support a long-term vision for the role of IRM, encompassing a complete range of services and facilities in an integrated management and communication systems. Learn more today!
Tags : 
clicksquared, digital marketing, interactive relationship marketing, irm, lifecycle, marketing intelligence, it foundation, web 2.0
    
ClickSquared
Published By: IBM     Published Date: Nov 19, 2014
Risk Management: Algo Collateral: Evolution for efficiency - Active Collateral Management
Tags : 
ibm, efficiency, collateral management, risk management, financial landscape, financial transactions, otc market, financial regulation
    
IBM
Published By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
To manage IT like a business, you need tools to proactively ensure IT service reliability while simultaneously boosting operational agility. This requires a new approach to IT infrastructure management, including the selection of an infrastructure management vendor that can meet modern IT and business requirements.
Tags : 
    
CA Technologies
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications
    
Riverbed
Published By: ExtraHop     Published Date: Apr 03, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : 
it operational intelligence, application performance management, application performance monitoring, application monitoring, network performance management, network performance monitoring, network monitoring, infrastructure performance monitoring
    
ExtraHop
Published By: Radiant Logic, Inc     Published Date: Mar 21, 2011
How Virtualization Addresses the Challenges of Authentication and Authorization Across Disparate User Directories.
Tags : 
access control, active directory, authentication, directory services, ldap, security policies, sso, systems management
    
Radiant Logic, Inc
Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.