HIT Consultant Insightful coverage of healthcare innovation
 

aps

Results 51 - 75 of 567Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Websense     Published Date: Apr 09, 2013
This report focuses on significant changes in the global threatscape during the year, offering insights from several perspectives. Our goal is to help security professionals improve the effectiveness of existing security solutions, and identify and prioritize security gaps that may require new approaches and more innovative strategies.
Tags : 
websense, 2013, threat report, cyber, websites, effectiveness, security, solutions, strategies
    
Websense
Published By: HERE Technologies     Published Date: Jan 08, 2019
Every day we use location apps on smartphone devices to get us where we need to go, and to find services and products we’re looking for. However, smartphone location apps aren’t just helping individuals navigate their way around. Forward-thinking businesses are using these apps to help them get their messages straight to the right audience, at the right time, too. It’s why the connected car and in-map location marketing is a growing area of opportunity—helping companies to meet KPIs whilst transforming the landscape of marketing at the same time. This on-demand webinar with experts from HERE and eMarketer discusses how to improve location-based audience segmentation and build a more accurate consumer profiles, as well as how real-time location targeting enables hyper-targeted marketing campaigns.
Tags : 
location data, ad tech, location targeting
    
HERE Technologies
Published By: SAS     Published Date: Nov 04, 2015
If you are working with massive amounts of data, one challenge is how to display results of data exploration and analysis in a way that is not overwhelming. You may need a new way to look at the data – one that collapses and condenses the results in an intuitive fashion but still displays graphs and charts that decision makers are accustomed to seeing. And, in today’s on-the-go society, you may also need to make the results available quickly via mobile devices, and provide users with the ability to easily explore data on their own in real time. SAS® Visual Analytics is a data visualization and business intelligence solution that uses intelligent autocharting to help business analysts and nontechnical users visualize data. It creates the best possible visual based on the data that is selected. The visualizations make it easy to see patterns and trends and identify opportunities for further analysis.
Tags : 
data visualization, sas, big data, visual analytics, data exploration, analysis
    
SAS
Published By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Microfocus     Published Date: Apr 11, 2012
The Micro Focus terminal emulation report evaluates the current state of this mature market - providing a snapshot of the industry to help customers make better decisions in their IT environments.
Tags : 
application modernization, application development, mainframe, mainframe migration, cobol, borland, testing tools, developer tools
    
Microfocus
Published By: Caristix     Published Date: May 03, 2013
Learn why scoping is critical when it comes to interoperability and HL7.
Tags : 
hl7, integration, interface, midical, heathcare, costs, risks, interfacing project, cio, hospital, integration, health analytics, business intelligence, network infrastructure
    
Caristix
Published By: Dell EMC     Published Date: Feb 23, 2017
In ESG research conducted shortly after the announced acquisition of EMC by Dell, 65% of the respondents indicated that they expected to benefit from more complete and innovative solutions from the combined company. That’s not surprising, given the complementary strength of their respective portfolios. Perhaps the most potential synergy is in the Converged Platforms and Solutions division, where servers, networking, storage and software come together.
Tags : 
    
Dell EMC
Published By: EMC Converged Platforms     Published Date: Sep 01, 2015
VCE Once Again Achieves High Marks in Vision, Ability to Execute Technology research firm Gartner recently released its second Magic Quadrant for Integrated Systems, a snapshot of the rapidly evolving converged and hyper-converged infrastructure industry space. A Gartner Magic Quadrant is a culmination of research in a specific market, providing a wide-angle view of the relative positions of the market's competitors. According to Gartner, no other company in the IT industry ranks higher than VCE in combined vision and ability to execute scores.
Tags : 
    
EMC Converged Platforms
Published By: Emerson Network Power     Published Date: Aug 19, 2010
While both IT and facilities organizations have invested heavily in technology resources (people, processes and tools) to manage the data center infrastructure, they have failed to achieve the promise and potential due to critical gaps between their data center facilities and IT infrastructure components. A new perspective on managing the critical infrastructure gaps is emerging. Read on for more.
Tags : 
emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud
    
Emerson Network Power
Published By: Emerson Network Power     Published Date: Mar 02, 2011
A new perspective on managing the critical infrastructure gaps is emerging. Read on for more.
Tags : 
emerson network power, avocent, data center, infrastructure management
    
Emerson Network Power
Published By: Verdasys     Published Date: Mar 28, 2012
In this whitepaper get the answers to the open gaps left in the WikiLeaks story and learn how you can prevent insider threats that are just as detrimental in your organization.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: Adobe     Published Date: Nov 07, 2013
SPAR Austria Information and Communication Services taps powerful content management and publishing capabilities in Adobe Experience Manager to enhance digital marketing strategies
Tags : 
adobe, spar, business services, integrated online experiences, spar austria, leading food retail, household consumer goods, multichannel marketing strategy, web content management, adobe experience manager, adobe marketing cloud, the cloud, ionteractive web experiences, creating engagement, store experience online, sap integration, product content management
    
Adobe
Published By: ServiceNow     Published Date: Sep 02, 2015
See why Gartner's 2015 Magic Quadrant recognizes ServiceNow as a leader for the second year in a row. Each year Gartner assesses the viability and competitive strength of vendors in the IT service support management (ITSSM) space. This valuable report helps users determine which solutions best fit their needs, based on the tool capabilities, the integration with IT Operations Management solutions and more than a dozen other factors. For the 2nd year in a row, ServiceNow is recognized as a Leader in this Gartner Magic Quadrant. Check out what makes us different. Get the full, complimentary report to: • Receive an assessment of key vendors • Get a snapshot of the overall market overview • Learn why ServiceNow remains a leader
Tags : 
    
ServiceNow
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: VMware     Published Date: Oct 05, 2015
Undoubtedly you are aware of network virtualization, but perhaps you’ve yet to hear a compelling case for it. If the extended network capabilities and simplified management enabled by network virtualization aren’t compelling enough reasons, data center security should be. To manage today’s coordinated and persistent security threats, which often come from within, data centers need to implement “Zero Trust” networking. Virtualization puts it within your reach. Discover why — download this free business case white paper now.
Tags : 
vmware, network virtualization, data center, data security, vmware nsx, zero trust, zero trust network
    
VMware
Published By: Dell     Published Date: Nov 12, 2018
In December 2017, Dell commissioned Forrester Consulting to conduct a study refresh to determine how enterprise organizations are structured from an IT departmental perspective. The study explored two types of IT: digital controllers and digital transformers; and the trends and challenges seen in PC provisioning. Digital controllers are often associated with top-down approach, linear structure, and emphasize security and accuracy. In contrast, digital transformers focus on innovation, employee-and customer-centricity, and prioritize speed and flexibility. By understanding the two groups, enterprises can overcome challenges that arise from PC life-cycle management. By investing in existing PC management tools and partnering with a company that specializes in PC deployment and management, firms can empower employees to better serve customers. Download this Forrester report to learn more about the approach and strategy differences in how these two groups address the dynamic digital demand
Tags : 
    
Dell
Published By: FireEye     Published Date: Feb 12, 2013
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate.
Tags : 
fireeye, critical it, effective defense, ema, fireeye technology, security technology
    
FireEye
Published By: BMC Software     Published Date: Jun 25, 2013
Large gaps and loss of productivity challenge the value, agility and cost of IT across the globe. “Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, productivity, it support, customer satisfaction, technology
    
BMC Software
Published By: Oracle     Published Date: Aug 09, 2013
This e-book draws on the insights of independent researchers, Oracle Human Capital Management (HCM) product and industry experts, and Oracle HCM customers. It aims to provide both inspiration and practical roadmaps to simplify workforce management, build the best talent, and help HR leadership make a major contribution to their companies’ overall success.
Tags : 
driving, hcm, oracle
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
This e-book draws on the insights of independent researchers, Oracle Human Capital Management (HCM) product and industry experts, and Oracle HCM customers. It aims to provide both inspiration and practical roadmaps to simplify workforce management, build the best talent, and help HR leadership make a major contribution to their companies’ overall success.
Tags : 
driving, hcm, oracle
    
Oracle
Published By: Venafi     Published Date: Mar 26, 2015
Lax SSH security and management can lead to significant gaps in security controls. Cybercriminals target these gaps to gain full access to sensitive, regulated, and valuable systems and data. Read the solution brief, Stop Unauthorized Privileged Access, to close these SSH security gaps and protect your business: • Learn about the top SSH vulnerabilities • Discover how to reduce risk of SSH key misuse • Develop a strategy to manage and secure SSH keys
Tags : 
ssh security, ssh management, security controls, ssh vulnerabilities
    
Venafi
Published By: LifeWorks     Published Date: Dec 04, 2018
Employee assistance programs (EAPs) are moving beyond the traditional idea of being a work-based intervention program solely aimed at resolving employees’ personal problems. Nowadays, EAPs are preventative by nature. They provide important work life resources like counselling, coaching, guidance, and financial and legal support for employees and family members. The focus has expanded from personal problems to overall well-being.
Tags : 
    
LifeWorks
Published By: Prophix     Published Date: Jun 03, 2016
Prophix and IMA hosted a webcast, titled “Overcoming Barriers to Implement CPM Methods”, featuring subject matter expert Gary Cokins, the CEO, at Analytics-Based Performance Management. The adoption rate of business analytics and corporate performance management (CPM) methods has been slowed by various barriers. Gary Cokins outlines the causes of this lag, as well as lessons learned about how to overcome obstacles, and obtain buy-in to manage and improve performance. He describes techniques such as strategy maps, balanced scorecards with key performance indicators (KPIs), channel and customer profitability reporting, and driver-based budgeting that can prevent failure when implementing CPM methods.
Tags : 
prophix, best practices, performance management, business analytics, productivity
    
Prophix
Published By: NAVEX Global     Published Date: Oct 18, 2016
This report aims to help you identify the compliance program you have in place, how to document your program elements and finally, develop and implement a work plan for addressing gaps.
Tags : 
    
NAVEX Global
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.