HIT Consultant Insightful coverage of healthcare innovation
 

aps

Results 426 - 450 of 578Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Feb 14, 2013
HR is critical to a business' success. It's about find the best people at the lowest cost possible and the best possible performance. This new study conducted by HR.com explores what's working for organizations today and the biggest gaps to fill.
Tags : 
hr leadership, talent management role, core business strategy, filling in gaps, performance, cost, lowest cost
    
Oracle
Published By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : 
ibm, managed security services, hybrid it operations
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
This report maps out the vendor landscape for social collaboration technologies, to help you understand where you need to start, and what you should be looking for in a vendor to maximize success with your initiative.
Tags : 
ibm, enterprise social solutions, enterprise solutions, mwd advisors, social collaboration, vendors, vendor offerings, social collaboration technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Address budget shortages and skills gaps with cloud-based Security Intelligence & Analytics. Use a Software-as-a-Service solution to replace aging security technologies and deploy a market leading solution in only weeks. Read how you can focus on monitoring the environment rather than updating software, and replace up-front capital costs with a monthly operational fee.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: Hewlett-Packard     Published Date: Aug 02, 2013
If your organization is deploying a new server farm or cluster for any reason — a newly virtualized application or a growing business initiative, perhaps — this is the time to consider blade servers as a cost-effective alternative to traditional rack servers. In most use cases, you will find blade servers to be less expensive than rack servers for both the initial purchase as well as for long-term total cost of ownership (TCO). In addition, blades enable improvements in manageability, agility, scalability and power consumption.
Tags : 
blades, it costs, cost of ownership
    
Hewlett-Packard
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes. The companies represented in this study say their SAP platform has been breached an average of two times in the past 24 months.
Tags : 
cyber breach, data security, information theft, security risk, risk management
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
It is generally accepted that a hybrid approach to IT operations gives enterprises both financial and operational flexibility— allowing them to apply new technologies with little or no capital investment and tap expertise without hiring new personnel. But it is still an imperfect solution, and with sophisticated new attacks propagating at an accelerated rate, security has become a top concern. This is evidenced by the growing number of C-level security executives and by the intensive efforts of IT organizations to identify and address the gaps in their enterprise defenses and improve their ability to respond to those attacks. It is clear that security for hybrid IT environments is due for an advanced upgrade.
Tags : 
information technology, optimization, it security, data protection
    
IBM
Published By: IAG Consulting     Published Date: Aug 17, 2007
Before your company launches its next package selection, implementation or upgrade, make sure you don’t cripple the project from the start by failing to identify your requirements – the number one reason that projects spin out of control. This white paper summarizes some of the key lessons we have learned through our industry-leading requirements definition practice.
Tags : 
systems development, system development, sdlc, business requirements, project planning, defining, definition, define the problem, erp, enterprise resource planning, project management, iag, iag consulting, digital mosaic
    
IAG Consulting
Published By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how displaying McAfee SECURE™  trustmark showed positive results for Container & Packaging Supply, Inc. Learn more today!
Tags : 
container, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
    
McAfee, Inc.
Published By: Sage SalesLogix     Published Date: May 28, 2009
Before committing to a CRM purchase and implementation, it's good to know the experience of those who have already "been there, done that." It can save time and prevent costly missteps.
Tags : 
crm, customer relationship management, customer centric, customer-centric, customer service, service, retention, loyalty, growing, growth, profitable, profitability, sapservice, service, retention, loyalty, growing, saleslogix, sage, roi
    
Sage SalesLogix
Published By: Sage SalesLogix     Published Date: Oct 24, 2008
Did you know that most Americans believe companies should have a presence in social media?* That means most of your customers and prospects expect you to be involved in social media, and will be more likely to do business with you if you are. *Cone 2008 Business in Social Media Study
Tags : 
crm, customer relationship management, socially empower, social crm, sage, sales tools, blog, twitter, facebook, new media, social media, customer centric, customer-centric, customer service, service, retention, loyalty, growing, growth, profitable
    
Sage SalesLogix
Published By: Sage SalesLogix     Published Date: Feb 10, 2009
The economic downturn means that businesses must capitalize on every opportunity to gain revenue. With the right customer relationship management (CRM) solution, you can protect current revenue streams and unearth new customer revenue opportunities-despite the most challenging market conditions.
Tags : 
crm, customer relationship management, smb, customer centric, customer-centric, customer service, service, retention, loyalty, growing, growth, profitable, profitability, sapservice, service, retention, loyalty, growing, growth, profitable
    
Sage SalesLogix
Published By: Sage SalesLogix     Published Date: Apr 03, 2009
Workforce mobilization has become a key competitive requirement for most organizations. However, enabling mobility is more than just providing laptops and mobile phones to users and sending them out into the field. It's about selecting the appropriate technologies and developing the right user experience.
Tags : 
crm, customer relationship management, customer centric, saleslogix, user center design, mobile crm, customer-centric, customer service, service, retention, loyalty, growing, growth, profitable, profitability, sapservice, service, retention, loyalty, growing
    
Sage SalesLogix
Published By: Sage SalesLogix     Published Date: Sep 15, 2009
Your highest priority is to grow your business, and your business tools should help you achieve that goal. Sage SalesLogix provides a complete view of customer interactions across sales, marketing, customer service, and support so your teams can collaborate and respond promptly and knowledgeably to customer inquiries and opportunities.
Tags : 
crm, customer relationship management, sage, saleslogix, customer centric, customer-centric, customer service, service, retention, loyalty, growing, growth, profitable, profitability, sapservice, service, retention, loyalty, growing, growth
    
Sage SalesLogix
Published By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes how HP LeftHand SANs can help you deploy VMware Infrastructure 3 (VI3) software more effectively through volume snapshots, SmartClone volumes, volume migration, and high-availability features. With HP LeftHand SAN and VI3, organizations can reclaim valuable data center space and reduce their power and cooling requirements.
Tags : 
san, storage area networks, vmware, software, migration
    
HP Virtualization
Published By: SAS     Published Date: Aug 28, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues. As our corporate data stores have grown in both size and subject area diversity, it has become clear that a strategy to address data is necessary. Yet some still struggle with the idea that corporate data needs a comprehensive strategy. There’s no shortage of blue-sky thinking when it comes to organizations’ strategic plans and road maps. To many, such efforts are just a novelty. Indeed, organizations’ strategic plans often generate very few tangible results for organizations – only lots of meetings and documentation. A successful plan, on the other hand, will identify realistic goals along with a r
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic
    
Cisco
Published By: Esker     Published Date: Jun 23, 2015
Companies running ERPs/business systems already have an edge — yet critical gaps still exist. Learn how end-to-end automation of the order-to-cash (O2C) cycle can drive success.
Tags : 
    
Esker
Published By: BlackBerry     Published Date: Mar 11, 2013
FIPS, CAPS, AISEP, and many more — BlackBerry® has received certification from the most rigorous security testers in the world. In this insightful webinar, find out what they mean and why they matter to enterprises.
Tags : 
blackberry security, certifications, security tests, webinar, security tests
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
FIPS, CAPS, AISEP, and many more — BlackBerry® has received certification from the most rigorous security testers in the world. In this insightful webinar, find out what they mean and why they matter to enterprises.
Tags : 
blackberry security certifications, organization, blackberry 10, webinar, transition
    
Blackberry
Published By: Yext     Published Date: Apr 15, 2013
The paper will show every small business owner the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare
    
Yext
Published By: Yext     Published Date: May 21, 2013
The paper will show every dealership the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare
    
Yext
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.