HIT Consultant Insightful coverage of healthcare innovation
 

hr technology

Results 326 - 350 of 660Sort Results By: Published Date | Title | Company Name
Published By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Published By: LogRhythm     Published Date: Aug 08, 2016
THE TIME HAS come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.
Tags : 
cyber threat, cyber risk, technology, best practices
    
LogRhythm
Published By: LogRhythm     Published Date: Aug 08, 2016
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Tags : 
cyber threat, cyber risk, technology, best practices, business management, business analytics
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 19, 2016
In this webinar Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Niemen Marcus, Sony and other breaches. By analyzing the available information about these recent data breaches, from the perspective of detection, the two have assembled an interesting list of security monitoring lessons and ideas. The list includes tips on how to eliminate double false positives, a number of generalized monitoring scenarios, as well as acknowledges the incredible power of monitoring for new executables running for the first time on your environment. If you are concerned about data breaches and you're involved in SIEM and other security monitoring, this is the webinar for you.
Tags : 
cyber threat, cyber risk, technology, best practices
    
LogRhythm
Published By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : 
idg, mobile workforce, analysis, technology, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : 
    
Lookout
Published By: Lumension     Published Date: Oct 17, 2008
Vulnerability management can be a powerful means toward reducing the threat surface within an enterprise IT environment. But because vulnerability management technology has been around in some form or another for so long there has been plenty of time for the din of marketing-speak from various vendors to confuse users about the true nature of vulnerability management tools and practices.
Tags : 
lumension, it environment
    
Lumension
Published By: Lumesse     Published Date: Feb 12, 2015
This white paper from Lumesse reveals the 5 key predictions and workforce trends for the HR world ahead.
Tags : 
hr predictions, hr trends, recruitment methods, talent disruption, job 3.0, 2015 hr trends
    
Lumesse
Published By: Lumesse     Published Date: Feb 13, 2015
This white paper from Lumesse reveals the 5 key predictions and workforce trends for the HR world ahead.
Tags : 
hr predictions, hr trends, recruitment methods, talent disruption, job 3.0, 2015 hr trends
    
Lumesse
Published By: Lumesse     Published Date: Feb 13, 2015
This White Paper illustrates the trends that increase the complexity of recruitment, causing talent acquisition managers and HR leaders significant concern: the emergence of new technology, changing demographics and recruiting across borders and increasing globalisation.
Tags : 
use of technology in recruitment, new recruitment methods, mobile jobseekers
    
Lumesse
Published By: Lumesse     Published Date: Mar 12, 2015
This white paper will help you find out: the drivers behind mobile talent management, the benefits of mobile Talent Management for you and your workforce and the five key steps on your journey to mobile talent management.
Tags : 
mobile talent management, benefits of mobile talent management, mobility, mobile workers, mobile, mobility trends, hr technology, go mobile
    
Lumesse
Published By: Lumesse     Published Date: Mar 13, 2015
This white paper will help you find out: the drivers behind mobile talent management, the benefits of mobile Talent Management for you and your workforce and the five key steps on your journey to mobile talent management.
Tags : 
mobile talent management, benefits of mobile talent management, mobility, mobile workers, mobile, mobility trends, hr technology, go mobile
    
Lumesse
Published By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : 
gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends, hr technology, recruitment, social media hr
    
Lumesse
Published By: Lumesse     Published Date: May 15, 2015
This White Paper explores how employer branding can be one of the most powerful recruitment tools.
Tags : 
employee, employer brand, hr technology, hr trends, human resources trends, empower employer brand, recruitment, social media hr, human resources
    
Lumesse
Published By: Lumesse     Published Date: May 15, 2015
This White Paper explores how employer branding can be one of the most powerful recruitment tools.
Tags : 
employee, employer brand, hr technology, hr trends, human resources trends, empower employer brand, recruitment, social media hr, human resources
    
Lumesse
Published By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : 
gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends, hr technology, recruitment, social media hr
    
Lumesse
Published By: Lumesse     Published Date: May 28, 2015
This report shows how building talent, leadership and agility advantages are the top three HR imperatives for businesses to create a sustained competitive edge.
Tags : 
hr trends, talent, leadership, agility, hr functions, digital, digital hr, lumesse, technology, hr technology, hr professionals, hr decision-makers
    
Lumesse
Published By: Lumesse     Published Date: May 28, 2015
This report shows how building talent, leadership and agility advantages are the top three HR imperatives for businesses to create a sustained competitive edge.
Tags : 
hr trends, talent, leadership, agility, hr functions, digital, digital hr, lumesse, technology, hr technology, hr professionals, hr decision-makers
    
Lumesse
Published By: Marketo     Published Date: Oct 17, 2016
As a marketer, you need to think across channels in your digital advertising. Through advanced digital advertising and marketing automation technology, like Marketo’s Ad Bridge, Real-Time Personalization, and more, you can easily listen and react from a variety of channels. Download to learn more.
Tags : 
digital advertising, cross-channel, multi media
    
Marketo
Published By: Marketo     Published Date: Feb 07, 2017
Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on lead management functionality, thriving partner ecosystem, and roadmap. Marketo's easy and powerful lead management capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 400 technology and service providers that offer best-of-breed solutions for today’s marketers. The full report includes: Market evaluation and analysis of 17 CRM lead management vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying lead management systems Download the report to learn about these topics and more.
Tags : 
gartner, crm lead management, marketo, crm, launchpoint, vendor selection
    
Marketo
Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring, memory based sensors
    
McAfee
Published By: McAfee EMEA     Published Date: Nov 15, 2017
As we have said through this paper, it is no longer an either/or choice between security analytics and SIEM. Or even between insourcing and outsourcing security monitoring. You need to establish a team with complimentary capabilities, skills, and resources; then leverage each part for what it does best. It is frustrating to use a technology for something it’s not built to do, and just as frustrating to expect a service provider to do things beyond their capability — regardless of their claims during the sales cycle. So don’t do that — build your security monitoring program to give all parties the best chance of success.
Tags : 
security, analytics, siem, monitoring, skills, capabilities, outsourcing
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: Medsphere     Published Date: Jun 26, 2013
Learn how a single comprehensive tool can be leveraged across the continuum of acute, ambulatory, and long-term care environments as well as in multi-facility, multi-specialty healthcare organizations.
Tags : 
medsphere, openvista, electronic health record, ehr, electronic medical record, emr, health information technology, health it, computerized provider order entry, cpoe, electronic health records, health information exchange (hei), workforce management, meaningful use
    
Medsphere
Published By: Medsphere     Published Date: Aug 21, 2013
Learn why the three major barriers to healthcare technology has slowed its adoption and see how to solve these issues to maximize the benefits from your Electronic Health Records.
Tags : 
medsphere, healthcare, health it adoption, health information technology, ehr, efficiency, information technology, practice management
    
Medsphere
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.