HIT Consultant Insightful coverage of healthcare innovation
 

end use

Results 1 - 25 of 1861Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Sep 12, 2019
Applications are the modern lifeblood of the enterprise, and the desire to keep up with market demands has elevated most enterprise IT strategies from purely on-premises to hybrid and multi-cloud. But the desire to be even more agile and productive—and connect with end users in new and exciting ways—is pushing investments even further into new application environments, development processes, and management tools all leveraging cloud-native technology. In this executive brief, we home in on one component of the cloud-native movement, Kubernetes, and break down its role in achieving enterprise agility, experimentation, and innovation for competitive gain.
Tags : 
    
VMware
Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layer is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs). EMA recommends that today’s network operations teams modernize their approach with full application visibility. EMA research has found that network teams are increasingly focused on directly addressing security risk reduction, service quality, end-user experience, and application performance. All of these new network operations benchmarks will require deeper application-level visibility. For instance, a network team focused on service quality will want to take a top-down approach to perfo
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organization’s overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Security’s mos
Tags : 
    
Gigamon
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: HERE Technologies     Published Date: Sep 26, 2019
Whenever personal data related to us is anonymized, it has been manipulated in such a way that it can no longer be linked back to us, right? Think again. In the digital era, we do not always blend into the crowd. Location data is part of this equation because our mobility habits are unique to us. Techniques like anonymization offer service providers numerous ways to protect privacy while retaining enough data to be useful - the challenge is finding the right balance. By reading this eBook, you’ll discover critical ways public and private organizations can help protect users’ privacy: • Find out why de-identification does not always mean anonymity • Understand how privacy by design can be used for standards and product or service creation • Discover how gathering just data you need will minimize the privacy impact of collection • Find out about new and emerging privacy-enhancing technologies
Tags : 
    
HERE Technologies
Published By: KPMG     Published Date: Jun 06, 2019
What impact will the cloud-enabled workplace have on your cybersecurity strategy? This year’s research shows that organisations are navigating a myriad of both old and new cybersecurity challenges to bring the cloud into scope. Read this to discover: • how growing cloud dependency has created distinctive challenges around cyber security • what the biggest cyber challenges are for organisations in this context • how intelligent automation and machine learning is being used to overcome operational obstacles hampering cloud security • a set of cybersecurity considerations for modern IT environments.
Tags : 
    
KPMG
Published By: Nextgen     Published Date: Sep 25, 2019
It's a big undertaking to switch EHR vendors. That's why it's important to choose a vendor who can not only meet all your needs now, but who will be a partner alongside you as those needs evolve. Whether looking to buy your first EHR, seeking to replace your existing EHR, or consolidating EHRs to a single, integrated solution, this guide will help you in the process. Use these steps to find the best EHR for your billing, reporting, and patient care needs.
Tags : 
    
Nextgen
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Impact: -Substantially reduced administrative time -Accelerated response and remediation process -Increased performance of cloud applications -Reduced time to investigate"
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jul 22, 2019
Connected Intelligence in Insurance Insurance as we know it is transforming dramatically, thanks to capabilities brought about by new technologies such as machine learning and artificial intelligence (AI). Download this IDC Analyst Infobrief to learn about how the new breed of insurers are becoming more personalized, more predictive, and more real-time than ever. What you will learn: The insurance industry's global digital trends, supported by data and analysis What capabilities will make the insurers of the future become disruptors in their industry Notable leaders based on IDC Financial Insights research and their respective use cases Essential guidance from IDC
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
The Insurance industry continues to undergo significant transformation, with new technologies, business models, and competitors entering the market at an increasing rate. To be successful in attracting and retaining the most valuable customers, insurance companies must innovate and increase the speed at which they respond to customer demands. Traditionally, the insurance software market was dominated by a handful of specialist vendors with products that were initially expensive, difficult to deploy, costly to maintain, and did not provide the speed needed for today’s market. Now there has been a shift away from these “black box” applications to platforms that allow insurers to make their algorithmic IP available to business users, allowing much faster response to business demands. The algorithmic platform approach also comes at a fraction of the cost of black box solutions, while delivering advanced analytical techniques like Machine Learning and Artificial Intelligence (AI).
Tags : 
    
TIBCO Software
Published By: Workday APAC     Published Date: Oct 07, 2019
"Workday provides financial services organizations with the technology foundation they need to spend less time gathering data and more time creating real value. But don’t just take our word for it. Hear from our customers in the banking industry that have used Workday to: Make better business decisions Uncover new sources for growth Become a magnet for top talent "
Tags : 
    
Workday APAC
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Brands are seeing tremendous disruption in the areas of retail, consumer goods, and travel/ hospitality. To stay on pace with the changing needs and demands of these industries, you need to compete and thrive in new ways. Cognitive Enterprise is data-enabled, cloud-powered, transformational business. It doesn't see silos. It uses data to inform the next best step to improve processes spanning all areas of the business, including customer experience.
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
In Forrester's evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Für Geschäftsausfälle, oder zumindest für Rentabilitäts- und Gewinnverluste, wurden in den vergangenen 24 Monaten folgende Faktoren verantwortlich gemacht: Die digitale Disruption, wirtschaftliche Instabilität, politische Umwälzungen sowie ein anhaltender Fachkräftemangel. Vermutlich ist es keine große Überraschung, dass eine CEO-Umfrage von Gartner unter Geschäftsleuten ergab, dass das digitale Geschäft im nächsten Jahr oberste Priorität hat. Umfrageteilnehmer wurden gefragt, ob sie eine Management-Initiative oder ein TransformationsProgramm haben, um ihr Unternehmen digitaler zu machen. Die Mehrheit, 62 Prozent, sagte, sie hätten dies. 54 Prozent dieser Unternehmen gaben an, dass ihr digitales Geschäftsziel transformatorisch sei, während 46 Prozent angaben, das Ziel der Initiative sei die Optimierung. * Daher geht es für Unternehmen darum, zu lernen, sich zu entwickeln und agil zu sein. Zudem gilt es für sie, Technologien einzusetzen um effizienter zu konkurrieren und nicht der Trägh
Tags : 
    
Infinidat EMEA
Published By: Avetta     Published Date: Sep 17, 2019
In the beginning of 2019, a National Safety Council (NSC) study revealed that for the first time in US recorded history, the odds of dying from an opioid overdose (1:96) surpassed those of dying in an auto accident (1:103). As a result, opioid overdoses are now the number one cause of preventable injury deaths in the United States. The growing trend of opioid-related workplace incidents is a major concern for supply chains across the world. In fact, a recent study by Massachusetts Department of Public Health shows higher opioid overdose incidents occurring in industries that have a higher chance of worker-related injury. Among these, construction and manufacturing are the two industries most heavily affected. This whitepaper discusses tips for dealing with the opioid epidemic and gives clarity around OSHA drug testing regulations.
Tags : 
    
Avetta
Published By: Avetta     Published Date: Sep 17, 2019
A new NPR/Marist poll reveals that one in five jobs in the U.S. is held by a worker under contract. In fact, independent contractors could make up half of the entire workforce in the U.S. within the next decade. More and more organizations have begun to see contractors and suppliers as valuable business partners intrinsic to driving service and product innovation. For many companies, especially those operating in highly regulated industries, managing compliance in-house for all of these suppliers can be burdensome. But the cost of non-compliance — in the form of penalties, fines, productivity losses, settlement costs, and inefficiencies — is ruinous. This white paper will discuss: • The hidden costs of ignoring contractor management • Best practices towards holistic compliance and governance • The cost of different contractor management systems • How to get the highest ROI in your supply chain
Tags : 
    
Avetta
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Endpoint detection and response (EDR) tools are built to supplement endpoint security with increased detection, investigation, and response capabilities. However, the hype surrounding EDR tools can make it difficult to understand how exactly they can be used and why they are needed. Making matters worse, today’s EDR solutions often struggle to provide value for many organizations as they can be difficult to use, lack sufficient protection capabilities, and are resource intensive. Sophos Intercept X Advanced with EDR integrates intelligent EDR with the industry’s top-rated endpoint protection in a single solution, making it the easiest way for organizations to answer the tough questions about security incidents. Here are some additional reasons to consider an EDR solution.
Tags : 
    
Pine Cove Consulting
Published By: Jamf     Published Date: Aug 06, 2019
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Published By: Jamf     Published Date: Aug 06, 2019
As a new generation of employees hit the workforce, a user-centric technology trend has begun to take shape. The question is how does IT shift their practices to embrace the trend toward this modern technology experience? Download this e-book for answers and learn: • The origins of the user-centric trend • Apple's role in evolving IT practices • Ways to implement and benefit from this new IT model
Tags : 
    
Jamf
Published By: Anaplan     Published Date: Sep 10, 2019
Our annual benchmarking report, The State of Connected Planning, investigates how leading organizations accelerate business value through Connected Planning. We surveyed over 1,000 planning professionals across all business functions in 45 countries and 18 industries to uncover leading planning trends. This supply chain-focused brief contains: Key findings from supply chain professionals Challenges faced by supply chain professionals How they believe they can improve their planning processes
Tags : 
    
Anaplan
Published By: Panasonic     Published Date: Oct 01, 2019
From smartphones and cloud computing to ride-sharing services and electric cars, disruptive technology is changing the way we live – and nobody understands disruption better than startups. Whether they’re independent entities funded by VCs or emerging companies within the walls of a large corporation, startups recognize the power of technology to solve problems and improve lives, and they have been instrumental in challenging the status quo and shaping our society. But startups can’t be expected to do it all alone. Lean operating budgets and a need to move quickly demand that these organizations make efficient use of their limited resources – and that means not “reinventing the wheel” when it comes to their underlying tech. By working with the right partner who can provide the right resources and expertise at the right time, startups are free to focus on what matters most: bringing their innovation to market.
Tags : 
    
Panasonic
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.