HIT Consultant Insightful coverage of healthcare innovation
 

business risks

Results 151 - 175 of 265Sort Results By: Published Date | Title | Company Name
Published By: Symantec.cloud     Published Date: Aug 10, 2010
With 75% of business intellectual property contained in email, efficiently managing this data can pose a major challenge. Learn how hosted email archiving reduces legal risks while improving employee productivity.
Tags : 
messagelabs, symantec hosted services, email archiving, employee productivity, compliance
    
Symantec.cloud
Published By: RackSpace Hosting     Published Date: Apr 16, 2010
The business demands a solution which maximizes return while investing enough to mitigate perceived business risks, which requires technologies that align with the business's goals and objectives.
Tags : 
rackspace hosting, e-commerce strategy, risk mitigation
    
RackSpace Hosting
Published By: Success Factors     Published Date: Oct 07, 2014
Few things matter more to business success than human capital. The right mix of people, skills, and culture can create competitive advantage for companies, reshape industries, and drive prosperity across regions. As a new generation joins the labor market and employment options evolve in an increasingly global and knowledge-based economy, effective workforce management is a strategic imperative. Opportunities abound in this new environment, for both employers and employees—but so do risks.
Tags : 
successfactors, talent, human capital, labor market, employment, employees, employers, knowledge based economy
    
Success Factors
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
See how a video system can benefit your business by both preventing security risks and providing evidence if a safety event does occur.
Tags : 
video surveillance, exposure to liability
    
Tyco Integrated Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : 
threattrack, security, threat, track, information, admins, best, practices
    
ThreatTrack Security
Published By: BlackLine     Published Date: Aug 23, 2019
Accounting and finance leaders are expected to deliver accurate, compliant, and real-time analysis of their organization’s financial performance at all times. But many institutions wrestle with outdated systems and processes that don’t meet the needs of today’s business. Leading organizations are transforming their finance operations to reduce compliance risks and gain greater efficiencies.
Tags : 
    
BlackLine
Published By: 8x8 Inc.     Published Date: Jun 22, 2017
Are you still using your legacy PBX? Reduce business risks when you move to the cloud. Read the whitepaper for more information.
Tags : 
pbx, private branch exchange, communications, cloud, telecommunications
    
8x8 Inc.
Published By: IBM     Published Date: Oct 13, 2017
Analytics is game-changing and can produce valuable insights from the ever-growing volume, velocity and variety of data. Business Intelligence (BI) provides the foundation for many types of Analytics. It enables companies to deliver exceptional customer experience, enhance marketing effectiveness, increase operational efficiencies, reduce financial risks, improve product quality and reliability, and so on. But businesses are also challenged to generate timecritical actionable insights and make a compelling financial business case for BI investments.
Tags : 
ibm, cognos analytics, business intelligence, customer experience, marketing
    
IBM
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
    
IBM
Published By: Stratus Technologies     Published Date: Sep 11, 2009
New concerns arise as IT executives look at the next wave of applications in the queue for virtualization. If you or your business is among those evaluating ROI and the risks associated with virtualizing your production applications, this five-chapter ebook offers some practical advice.
Tags : 
stratus, virtualization, server virtualization, x86, roi, power, cooling, high availability
    
Stratus Technologies
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations
    
HP Service Management
Published By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : 
ibm, technology, predictive operational analytics, spss
    
IBM
Published By: Sage     Published Date: Oct 14, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage
Published By: Sage     Published Date: Jan 30, 2015
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, interactive customer experience, hr perspective, intellectual property
    
Sage
Published By: RingCentral     Published Date: May 22, 2014
As a purchasing executive or vendor management professional, your goal is to balance business value, cost and associated risks when sourcing and managing technology vendors. Download this whitepaper and learn: • To identify internal drivers that shape sourcing strategies • Best practices for developing a new T&M sourcing strategy • 5 key sourcing and vendor management activities that strengthen your sourcing strategy
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: ARMA     Published Date: Nov 04, 2014
All organizations depend on information to manage day-to-day operations, comply with regulations, gauge financial performance, and monitor strategic initiatives. This critical information resides in the organization's business records. As internal auditors conduct their annual risk assessment, they should consider how well business records are managed and assess the degree to which the risks to this information are understood.
Tags : 
value proposition, financial performance, internal auditors, annual risk assessment
    
ARMA
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth
    
Trend Micro SaaS
Published By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql
    
Marathon Technologies
Published By: Mimecast     Published Date: Feb 05, 2010
Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points: • Phishing is the most prevalent web-borne cyber attack • 8 in 10 companies experienced one or more types of web-borne attacks in 2012 71% of companies say web-borne threats increased help desk time
Tags : 
web threats, phishing, cyber attack, security, malware, web security
    
Webroot
Published By: 5000fish, Inc     Published Date: May 13, 2012
5000fish, Inc., a cutting-edge provider of Business Intelligence software, aims to guide organizations on how they can manage their spreadsheet usage by presenting the benefits and risks of managing their business analytics using only spreadsheets.
Tags : 
    
5000fish, Inc
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance
    
Intralinks
Published By: Cisco     Published Date: Jan 16, 2014
With email at the heart of businesses, security is a top priority. Mass spam and malware campaigns are no longer the only email security concern. Today, they are one part of a complex picture that includes other inbound threats and outbound risks.
Tags : 
cisco, security, virus attacks, email security, malware
    
Cisco
Published By: Globalscape     Published Date: Aug 13, 2014
Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
Tags : 
globalscape, mobile, business, byod, security
    
Globalscape
Published By: Adobe     Published Date: Mar 16, 2016
While most business is digital, and business-to-business and business-to-consumer transactions – and the work that supports them -- are almost entirely digitized, most organizations still rely on paper for the “last foot” of the process – the sign-off. Continued reliance on paper-based signature is fraught with risks, including impeding productivity, reducing visibility, hampering compliance, and diminishing the customer experience. Electronic signatures (e-signatures), which are easily implemented from the cloud, help speed up the sales process by reducing errors and bottlenecks, while also ensuring greater security and mobility. Read this Forbes Insights piece to learn: • How an easy implementation of e-signatures can improve productivity and reduce busywork for your sales team • How improve customer experiences and ease of business with e-signatures increases the likelihood of renewal and retention • How e-signatures easily integrate into your existing sales tools, for seamless pr
Tags : 
sales performance, e-signatures, b2b, b2c
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.