HIT Consultant Insightful coverage of healthcare innovation
 

information age

Results 151 - 175 of 1204Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
    
CA Technologies
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications
    
Absolute Software
Published By: The TriZetto Group     Published Date: Aug 01, 2011
Learn how to maximize efficiencies through greater system integration and automation, enable seamless interactions with providers, members and other constituents, and drive increased healthcare value with automated, value-based programs.
Tags : 
trizetto, trizeto, healthcare reform for payers, payers and healthcare reform, reform and payers, compliance with reform, administrative efficiency, technology
    
The TriZetto Group
Published By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : 
ibm, technology, information technology, it management, data management, data center
    
IBM
Published By: Adobe     Published Date: Feb 20, 2014
As a valued customer, Adobe understands that your enterprise takes extensive advantage of our software, with anywhere from hundreds to thousands of licenses for a variety of Adobe solutions. With the Adobe Enterprise Term License Agreement (ETLA), we are now making the management and procurement of your Adobe software simpler, more flexible, and predictable.
Tags : 
adobe, adobe software, enterprise term licensing, etla, adobe solutions, software management, software compliance, tco
    
Adobe
Published By: Mimecast     Published Date: Oct 29, 2013
Don’t just store information. Use it. Mimecast makes your email archiving work harder for business advantage.
Tags : 
mimecast, email, interactive archive, email archiving, interaction platforms, email platforms, ediscovery, data loss prevention
    
Mimecast
Published By: Riverbed     Published Date: Jul 17, 2013
As a network manager, application manager or security manager, you need systems in place that can collect data across your WAN, continuously analyze the data to discover problems, and allow you to troubleshoot issues as soon as they occur. A packet capture and analysis solution is an essential part of your toolset, since it provides the most granular level of information and can help troubleshoot the toughest problems. Riverbed Cascade has fundamentally changed the economics of network performance management. Learn more..
Tags : 
network, troubleshooting, wan, network manager, network performance management
    
Riverbed
Published By: Avaya     Published Date: Jan 23, 2015
This paper provides information about solving the engagement challenge. When workers have flexibility in terms of tools, apps and devices, they can stay nimble, innovative and creative. In turn, they keep your company nimble, innovative and creative. To make it work you need to give workers the Unified Communications tools, apps and devices that allows them to better serve both internal and external customers. But that’s not as simple as it sounds. Organizations face enormous challenges in deciding whether and how to support consumer devices.
Tags : 
solving the engagement challenge, byod, byoa
    
Avaya
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper helps outline some of the ways to control BYOD risks and outlines other factors that influence your decision to establish a BYOD policy. Like Cloud-based software delivery, BYOD presents such compelling advantages over the traditional approach that its emergence as the dominant mobile strategy appears to be a question of “when” rather than “if.”
Tags : 
workforce software, byod, enterprise applications, mobile strategy, mobile devices
    
Workforce Software
Published By: Document Cloud for Enterprise     Published Date: Apr 23, 2015
This white paper provides information on the Adobe Extended Service customer care and the advantages of using it for achieving business success.
Tags : 
esign, adobe extended service offering, adobe document cloud esign, digital sign, adobe solution, e-signatures, customer engagement, customer care
    
Document Cloud for Enterprise
Published By: EMC     Published Date: Oct 13, 2015
MG Group explains their adoption of EMC Documentum Capital Projects to streamline information control and effective management in the world’s largest PET production plant
Tags : 
emc documentum capital projects, document management, share information, share documents
    
EMC
Published By: SolidFire_NetApp     Published Date: May 10, 2016
This document includes general information about the Pure Storage architecture as it compares to SolidFire. Not intended to be exhaustive, it covers architectural elements where the solutions differ and impact overall suitability for the needs of the Next Generation Data Center (NGDC).
Tags : 
data management, business practices, data center. data application, enterprise applications, business intelligence
    
SolidFire_NetApp
Published By: Microsoft     Published Date: Mar 23, 2018
Die Zukunft für den Serviceaußendienst Kevin Ashton, Technologieexperte aus Großbritannien, begründete am Massachusetts Institute of Technology (MIT) das Auto-ID Lab, in dem Pionierarbeit auf dem Gebiet der RadioFrequency Identification (RFID) und anderen Sensoren geleistet wurde. Im Zuge seiner Tätigkeit prägte Ashton im Jahr 1999 erstmals den Begriff des „Internet of Things”, kurz IoT, um die Vernetzung alltäglicher Gegenstände und Geräte sowie deren Übermittlung von Daten und Informationen zu beschreiben. Kevin Ashton gilt deshalb heute als „Vater” des IoT-Konzepts. Ende des Jahres 2015 war Kevin Ashton als Referent auf einem europäischen Kongress zum Thema Kundenservice geladen. Seine These: Das Servicemanagement im Außendienst sei die erste Branche, die mit dem Internet of Things eine grundlegende Transformation durchlaufe.
Tags : 
    
Microsoft
Published By: Schneider Electric     Published Date: Mar 28, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Read how Real-time Compression can impact your environment in the ESG Lab Validation Report.
Tags : 
ibm uk, real-time compression, compression, nas, storage efficiency, deduplication, netapp, n series
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG Lab report examines an innovative high speed data compression appliance from IBM.
Tags : 
ibm uk, real-time compression, compression, nas, storage efficiency, deduplication, netapp, n series
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Take a look at this flier for additional information regarding archiving and retention solutions from IBM.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG whitepaper reviews challenges introduced by data growth and focuses on IBM data protection and retention products/technologies that address storage efficiency.
Tags : 
ibm uk, esg, data growth, data protection, information systems, information management, business continuity, business resiliency
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This whitepaper explores the latest challenges and innovations in data protection and retention.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Browse the data-sheet for additional information regarding archiving and retention solutions from IBM.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Browse this summary for additional information about performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers.
Tags : 
ibm uk, ibm, storwize v7000, storage, management, consolidation, virtualization, tiering
    
Ogilvy - IBM UK
Published By: Senn Delaney     Published Date: Aug 21, 2008
Through a collaborative, groundbreaking study with three prominent U.S. business schools, Senn Delaney has discovered that people who operate from a unique set of three core principles consistently perform at the top 10 percent of performance ratings. The joint study and subsequent research and surveys led to creation of our new, evidence-based, practical performance model that can be taught, practiced, reinforced, applied and measured.
Tags : 
senn delaney, global information, customer focused, brand management, customer-centric, employee management, employee engagement
    
Senn Delaney
Published By: Savvis UK Limited     Published Date: Sep 06, 2012
Information technology is an essential vehicle for the delivery of well-organised, cost-effective public services that respond to the needs of citizens and business.
Tags : 
iaas, infrastructure-as-a-service, government, it solutions, information technology, colocation, managed hosting, dedicated cloud
    
Savvis UK Limited
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.