HIT Consultant Insightful coverage of healthcare innovation
 

firms

Results 226 - 250 of 346Sort Results By: Published Date | Title | Company Name
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Magento     Published Date: Mar 28, 2018
It’s official. Magento Commerce is one of the “leaders” of B2B eCommerce. Don’t believe us? Check out this new report, “The Forrester Wave™: B2B Commerce Suites for Midsize Organizations, Q3 2017.” Forrester, one of the most influential research and advisory firms in the world, has just revealed their multiple-criteria evaluation of B2B commerce suite providers. Now you can see how Magento Commerce stacks up, with your FREE copy of the report.
Tags : 
b2b, commerce, organizations, vendors, providers
    
Magento
Published By: Globality     Published Date: Apr 05, 2018
Frustration with high legal fees and demand for local regulatory knowledge may give boutique law firms an edge with larger clients.
Tags : 
globality, legal, compliance, regulations, local regulations
    
Globality
Published By: Globality     Published Date: Apr 05, 2018
This report shows how a growing demand for digital skills and specialist capabilities is creating opportunities for multinationals to shake up their portfolio of incumbent service providers and consider smaller, niche suppliers and new tech-savvy firms.
Tags : 
globality, consulting, multinational, outsourcing
    
Globality
Published By: Oracle     Published Date: Aug 19, 2016
Research conducted by the Economist Intelligence Unit shows how firms can improve data security. Certain firms consistently demonstrate success in reducing breaches across all major forms of cyber-attack. 32% of companies named their top security priority as adopting a proactive data defense strategy. Discover eight steps to reduce vulnerability to cyber-attack.
Tags : 
    
Oracle
Published By: IBM     Published Date: Apr 23, 2008
When you need to add IT capacity yesterday, but there's no more space and no more budget, what can you do? This IBM white paper has the answer: a new concept known as scalable, modular data centers. You'll learn how and where they work, the substantial cost benefits they deliver, and how eight different firms are using them to meet various business challenges.
Tags : 
network, networking, datacenter, data center, ibm, opt it, ibm opt it, modular
    
IBM
Published By: Microsoft Office     Published Date: Nov 24, 2008
This white paper highlights key challenges facing the professional services industry and discusses how the 2007 Microsoft® Office system can help professional services firms enhance business performance by maximizing employee contributions. It also offers examples of firms realizing business impact from their early use of the 2007 Office system, which provides innovative and powerful enterprise-scale capabilities that extend far beyond improving personal productivity.
Tags : 
2007 microsoft office system, microsoft office project 2007, infopath foams services
    
Microsoft Office
Published By: Microsoft Dynamics CRM     Published Date: Mar 30, 2010
This report reveals how Best-in-Class firms distinguish themselves from all others by routinely benchmarking and measuring their service performance; implementing effective measuring, monitoring and tracking systems; integrating service KPIs with company-wide CRM or ERP systems, wherever possible; and establishing a formal process for automatically collecting and disseminating data.
Tags : 
microsoft dynamic crm, service benchmarking, metrics, customer satisfaction, data management, mttr, kpi, metrics measuring program, performance data analysis
    
Microsoft Dynamics CRM
Published By: GoToMeeting     Published Date: Oct 08, 2013
The traditional drivers of growth are no longer enough. That's why top-performing companies are working with their own customers to find new ways to grow. Firms will need to co-create new sources of revenue by understanding, leveraging, aligning, and executing together with customers and partners along their value chain. This Summit Group brief explores what leading companies are doing differently to build profitable relationships, counter commoditization and accelerate growth.
Tags : 
horizontal value creation, the summit group, co-innovation, innovation, co-innovation, strategy, growth
    
GoToMeeting
Published By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: IBM     Published Date: Nov 09, 2012
IT organizations everywhere are looking for more easier and more cost-effective ways to accelerate and simplify end-to-end work load management across complex infrastructures. With IBM System Z, workload automation offers plenty benefits to IT firms
Tags : 
ibm, trivoli workload automation, it delivery, automation, workload automation
    
IBM
Published By: SAP     Published Date: Sep 12, 2012
The impact of new mobile technology can be dramatic for small and midsize firms, and there is clear opportunity for improving worker efficiency while ensuring network security. Read the questions posed by SAP to Raymond Boggs, vice president of IDC's Small/Medium Business Research practice, on behalf of SAP's customers.
Tags : 
mobile resources, mobile solutions, sme, mobile devices
    
SAP
Published By: Quinstreet - Netapp     Published Date: Jun 11, 2012
For midsized firms, the benefits of reduced IT infrastructure complexity, lower power and cooling costs, and space savings are all attractive, but the real long-term benefits are related to operational efficiency. Download this paper to learn more.
Tags : 
netapp, network storage, cloud computing, virtualization, storage efficiency, data storage, information management, nas
    
Quinstreet - Netapp
Published By: Quinstreet - Netapp     Published Date: Jun 11, 2012
On the surface, the move to consolidate IT resources and virtualize infrastructure might seem to be a straightforward exercise, but IDC found the process to be as challenging as any other high-reward project. Download this paper to learn more.
Tags : 
netapp, network storage, cloud computing, virtualization, storage efficiency, data storage, information management, nas
    
Quinstreet - Netapp
Published By: GuideSpark     Published Date: Aug 01, 2018
IDG surveyed 1,500 HR decision makers, managers, and employees, and this is what they found: 88 percent of employees at firms with informal processes say they’re more satisfied with their jobs. Discover more of the latest trends in our white paper.
Tags : 
employee communication, employee engagement, employee experience, performance management, performance reviews, continuous performance management, informal conversations, informal performance management, millennial performance management, annual reviews, check-ins, continuous feedback, coaching, employee development, talent management, employee training, constant feedback
    
GuideSpark
Published By: Polycom     Published Date: Jun 29, 2017
Law firms are under increasing pressure to respond quickly – often within hours – to client demands. Failure to increase agility can result in costly client churn, but law firms are often ill-equipped to be so nimble. As a result, it may be time to consider a technology that has been proven integral to law firms around the world - video collaboration. In under 30 minutes, we'll explain: Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of practicing law The types of solutions deployed - if you think an expensive, wall-mounted, on premise solution is your only option, you may be surprised by what's available From the meeting room to the courtroom - hear how a this technology is proliferating the courtroom and how the best lawyers will be equipped to take full advantage
Tags : 
video collaboration, law technology, client satisfaction, response time
    
Polycom
Published By: DocuSign     Published Date: Mar 23, 2016
In today’s digital world, paper documents are an obstacle to doing business. Implementing a Digital Transaction Management (DTM) system can help, but financial services firms need solutions that offer bank-level security, regulatory compliance, operational efficiency, and a positive end-user experience. Read the report and discover the top 10 reasons why Financial Services firms choose DocuSign for their Digital Transaction Management and esignature solution.
Tags : 
    
DocuSign
Published By: Qlik     Published Date: Jun 24, 2016
This paper outlines the benefits of a distributed model, and includes insights and case studies from leading executives.
Tags : 
qlik, data, business data, business intelligence, distributed model
    
Qlik
Published By: ThousandEyes     Published Date: Nov 17, 2016
The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services has increased the complexity application delivery. Online Operations and Site Reliability teams in firms of all types are now responsible for many parts of the application delivery chain. When things go wrong, no matter where, they’re expected to react quickly to minimize the impact on their customers. The challenge for application providers is that users may often experience service degradation when the application stack seems to be working perfectly fine, making troubleshooting extremely difficult. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: Zebra Technologies     Published Date: Aug 09, 2018
The exponential growth of omnichannel shopping and ever-burgeoning demand for faster merchandise deliveries is redefining the supply chain’s distribution of consumer products goods. A seminal shift in how shoppers increasingly buy via multiple touch points — online from desktop computers, mobile devices and in-store — has created the need for the “smarter” warehouse to serve today’s connected consumer. As retailers look to merge their brick-and-mortar and online operations to cut costs and boost efficiency, warehouse management systems must keep pace. For this report, Zebra Technologies analyzed the state of the warehousing marketplace among firms in the US and Canada with at least $15 million in annual revenues. The online survey asked IT and operations personnel in the manufacturing, retail, transportation and wholesale market segments to share their insights and business plans over the next five years, in light of a rapidly changing industry.
Tags : 
fulfillment, vision, study, technology, manufacturer
    
Zebra Technologies
Published By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : 
mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks. Among the key points: • 50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012. • 90% of respondents agree that managing the security of remote users is challenging • 50% of firms with remote workers had a website compromised
Tags : 
security, mobile device, mobile threats, mobile browsing, cybercriminals, data, protection
    
Webroot
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.