HIT Consultant Insightful coverage of healthcare innovation
 

compliant

Results 76 - 100 of 186Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 21, 2016
Be more productive, collaborative, and get more done faster using Cisco WebEx Meeting Center — the proven industry leader in web and video conferencing. As a FedRAMPcompliant service, you can use Cisco WebEx to hold regular meetings with anyone — regardless of location. Manage projects, host meetings, and make faster, more informed decisions by keeping everyone on the same page with meetings that allow everyone to see, hear, and view the same information at the same time. And host engaging and creative sessions with colleagues, internal teams and other agencies.
Tags : 
    
Cisco
Published By: Adobe     Published Date: Jun 26, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. Key topics that you’ll read more about in this year’s report: • Optimising customer experience and delivering personalised experiences in real time. • Using data better for smarter audience segmentation and targeting. • Be wary of walled gardens. Control and own the data, and always be compliant. • Automation is the future. Understand the benefits, learn how to use it.
Tags : 
    
Adobe
Published By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : 
cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
    
CradlePoint
Published By: SAP     Published Date: Mar 17, 2016
- Supply Chains are already complex as they are – why on earth would we want to extend them? Because it’s an end-consumer driven economy. We expect to purchase products and services through multiple channels and of course we want to have these products delivered the same day. Of course the product is individualized based on my specific requirements, and yes, it goes without saying, that the products need to be compliant to regulations and standards.
Tags : 
sap, ted talk, supply chain, digital
    
SAP
Published By: HotSchedules     Published Date: Apr 25, 2018
It’s no secret the restaurant industry is highly populated by teenagers. So what are the best tactics to engage your Gen Z employees while keeping your restaurant compliant with today’s labor laws? Research has found Gen Z to be very different than their older millennial brothers and sisters, meaning operators need to find a whole new approach to engage them. In this guide we’ll highlight the engagement and compliance challenges restaurants face with this group of workers. And then we’ll walk you through best practices we’ve seen work using mobile scheduling apps and digital communication tools.
Tags : 
    
HotSchedules
Published By: Zebra Technologies     Published Date: May 02, 2018
By 2022, only 12 percent of warehouse operations will use pen and paper, according to a recent Zebra study. Why are manual processes vanishing? Because automation and connectivity enable the modern warehouse to stay compliant, deliver on time and ensure more overall customer satisfaction, every single time. You can create a more efficient, compliant and profitable warehouse. Learn how with our free eBook, 6 Steps to Flawless Fulfillment. You’ll discover actionable strategies to: Deploy industrial wireless solutions to optimize team productivity and workflow. Improve staff communications and management to maximize on-the-job efficiency and effectiveness. Streamline order picking processes to cut costs and save time. Create advanced inventory and storage capabilities to improve efficiency and accuracy. Upgrade inbound handling operations to process more shipments, more accurately. Turnaround outbound performance to deliver the ‘last mile’ in flawless fulfillment.
Tags : 
warehouse, operations, zebra, study, automation, customer
    
Zebra Technologies
Published By: Veeam '18     Published Date: Dec 04, 2018
"The new EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 22 years and it will have a profound impact on every organization that relies on the storage and processing of personal data of EU citizens. Starting May 25, 2018, the penalties begin for noncompliance, with GDPR fines of up to 4% of annual global revenue or 20 million euros - whichever is greater. As this new regulation also impacts Veeam®, we wanted to share our insights on our road to compliancy. In a new executive brief, GDPR: 5 Lessons Learned, Veeam Compliance Experience Shared, we walk through these lessons and share how our software played a critical role within data management and protection strategies to ensure we remain compliant while delivering Availability for the Always On Enterprise™."
Tags : 
    
Veeam '18
Published By: Apstra     Published Date: Feb 21, 2019
Customers and partners, and recently investors ask the question “How is one Intent-Based Networking (IBN) offering different than the others?” And more often than not I hear answers that sound subjective, descriptive, and subject to interpretation. What is needed are tangible, fact-based nomenclature that can help you reason about the maturity of IBN solutions. Using this nomenclature, we should be able to map IBN solutions to an IBN maturity level, starting with Level 0 (low maturity/incomplete) and going up to Level 3 which enables a fully compliant IBN solution (mature/complete).
Tags : 
ibn, saas
    
Apstra
Published By: MuleSoft     Published Date: Jun 27, 2019
MuleSoft’s Government Cloud is an industry-leading FedRAMP-compliant cloud environment for building and deploying APIs and integrations with Anypoint Platform. MuleSoft’s US Federal Risk and Authorization Management Program (FedRAMP) compliant-solution enables government agencies to build and secure connections between their applications and citizen data. Download this whitepaper to learn: How MuleSoft’s Government Cloud enables agencies to increase project delivery speed by 3x. Why FedRAMP compliance reduces on-premises infrastructure costs. How government agencies can develop, deploy, manage, and monitor integrations and APIs in the cloud to rapidly expand cloud services.
Tags : 
    
MuleSoft
Published By: Symantec.cloud     Published Date: Sep 07, 2010
Drawing on the findings from multiple benchmark studies on best practices in email security and security software as a service, Aberdeen's analysis shows that users of cloud-based email security had substantially better results than users of on-premise email security implementations in the critical areas of security, compliance, reliability and cost.
Tags : 
messagelabs hosted services, email security, cloud computing, audit, compliance
    
Symantec.cloud
Published By: Attachmate     Published Date: Mar 20, 2013
This whitepaper discusses the critical importance of finding a better alternative to email as a file-sharing mechanism. It also provides information on the sponsor of this white paper – Attachmate – and its relevant solutions.
Tags : 
download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security
    
Attachmate
Published By: NETIQ     Published Date: Dec 03, 2013
This white paper discusses how delegating Microsoft Active Directory administration using a directory management solution such as NetIQ® Directory and Resource Administrator™ can help you to achieve a more secure, efficient and compliant organization.
Tags : 
netiq, microsoft, active directory, complexity, security, identity management solution, directory management solutions, active directory administration
    
NETIQ
Published By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map
    
Intralinks
Published By: BlackLine     Published Date: Aug 23, 2019
Accounting and finance leaders are expected to deliver accurate, compliant, and real-time analysis of their organization’s financial performance at all times. But many institutions wrestle with outdated systems and processes that don’t meet the needs of today’s business. Leading organizations are transforming their finance operations to reduce compliance risks and gain greater efficiencies.
Tags : 
    
BlackLine
Published By: BlackLine     Published Date: Aug 23, 2019
As organizations in a rapidly changing, highly regulated industry, manufacturers must be able to deliver accurate, compliant, and real-time analysis of their financial performance at all times. Yet many manufacturers, while relying on modern technology for production, still wrestle with outdated systems and processes that don’t meet the needs of today’s business. At BlackLine, we help manufacturing companies transform their accounting and finance operations to increase visibility, gain efficiencies, and improve accuracy.
Tags : 
    
BlackLine
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Adobe     Published Date: Sep 23, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. 4 KEYPOINTS Key topics that you’ll read more about in this year’s report: • Optimising customer experience and delivering personalised experiences in real time. • Using data better for smarter audience segmentation and targeting. • Be wary of walled gardens. Control and own the data, and always be compliant. • Automation is the future. Understand the benefits, learn how to u
Tags : 
    
Adobe
Published By: IBM     Published Date: Mar 28, 2008
As the old adage says, "Information is power." The ability of an organization to best understand the behaviors and needs of its customers and partners, manage effective processes with timely insight, target new opportunities, and ensure that it is operating in a compliant and financially responsible manner on a day-to-day basis provides a foundation for innovation and success, let alone its survival.
Tags : 
    
IBM
Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection
    
Secure Computing
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management
    
Aveksa
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : 
pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware
    
NeoSpire Managed Hosting
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : 
cloud, security, cloud computing, security plan, enterprise security
    
Navisite- A Time Warner Cable Company
Published By: IBM     Published Date: Jul 24, 2012
Tax revenues have been declining recently and some of this loss is caused by fraud, tax evasion, and various forms of tax cheating. The ineffective recovery techniques can give government agencies poor results, which results in 20% of broad-approach audits ending in "no charge". By using IBM SPSS Predictive Analytics Solutions it is possible to maximize revenues, analyze the data you already collect, detect non-compliant accounts efficiently, and identify important differences in tax records. This program has tremendous power and features an easy to use interface that focuses investigations on case that yield large adjustments ensuring a successful ROI for clients.
Tags : 
tax revenues, fraud, ibm, business analytics, spss solutions, tax cheating, roi
    
IBM
Published By: IBM     Published Date: Nov 09, 2012
Many organizations today are introducing additional controls and accountability into management practices to improve governance and mitigate against risk. Read this white paper to learn more about Information governance and auditing with System Z.
Tags : 
ibm, system z, information governance audit, protection, data protection
    
IBM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.