HIT Consultant Insightful coverage of healthcare innovation
 

internal

Results 101 - 125 of 616Sort Results By: Published Date | Title | Company Name
Published By: Monetate     Published Date: Sep 30, 2014
Interested in starting a testing program, but struggling to get internal support? We know, it’s crazy; but take some comfort in that fact that many marketers still face the same roadblocks as you. And that’s why we created this white paper. Inside, you’ll find a specific plan on how to convince your company’s leaders that website testing is essential to the overall business.
Tags : 
website testing, internal support, buy-in
    
Monetate
Published By: Dell     Published Date: Feb 02, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure.
Tags : 
    
Dell
Published By: Mimecast     Published Date: Mar 19, 2019
Human error, careless behavior and lack of security inspections on internally-generated email are putting organizations at risk. Basic, outside-in email security won’t provide the necessary protection for advanced tactics like the distribution of malware, malicious URLs or impersonation emails – all things that can quickly traverse an internal network with just one click. Check out this E-book to learn about the three riskiest internal threat actors and the key things you can do to combat internal threats.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast
Published By: Dell EMC     Published Date: Feb 07, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure. Intel®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: Silver Peak     Published Date: Feb 11, 2016
This case study reveals how Interroll, a leading provider of high-quality core products for internal logistics, became frustrated with the high cost and complexity of MPLS and turned to Silver Peak to build an SD-WAN.
Tags : 
wan, networking, broadband, sd-wan, cloud computing, cloud services, software defined wan, silver peak
    
Silver Peak
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies
Published By: Carbonite     Published Date: Oct 05, 2017
Not long ago, the biggest concern for IT decision makers considering moving workloads to the cloud was security. That’s no longer the case. Today, the main obstacle to cloud adoption is different but familiar: the pain of migrating data. Traditional data migration causes major headaches: • Hours or days of downtime while servers replicate and stakeholders verify functionality • Data loss and migration failures due to inadequate tools and inability to test • Key internal resources diverted from strategic initiatives
Tags : 
data migration, cloud security, carbonite, data security, cloud platform, cloud adoption
    
Carbonite
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
Whether they’re millennials born with technology in their DNA, or experienced workers who’ve become accustomed to highly connected digital experiences in all areas of their lives—digital employees are everywhere. According to Gartner, today, every employee is a digital employee. The flexible, digital, data-driven experiences they all receive as consumers have given them extremely high expectations of every service they engage with—including internal ones such as HR.
Tags : 
digital, digital transformation, human resources, data
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: Workday APAC     Published Date: Dec 18, 2018
Current and former finance practitioners share stories of how they met their daily challenges—from managing internal controls and the financial close to onboarding and reporting—with a single cloud-based system for finance. Watch the video.
Tags : 
    
Workday APAC
Published By: Rackspace     Published Date: Feb 12, 2019
The decision to move business workloads and applications to the cloud impacts all parts of the business and isn’t a decision isolated to the IT team. Our latest research study on the different motives, concerns and experiences of executive peers and business stakeholders when securing buy-in for a strategic IT move found 97% of C-level executives in ANZ suffered from migration regret during their first cloud migration. Packed with telling hindsight, over 200 c-suite executives shared their expectations and experiences during the cloud migration journey. They reveal what they would have done differently - namely enhanced communication and a clear plan of action - and offer practical advice to help others get buy-in internally and secure funding to support a move to the cloud.
Tags : 
    
Rackspace
Published By: Rackspace     Published Date: Feb 21, 2019
For some, having a Managed Service Provider (MSP) manage your workloads on cloud infrastructure requires strong justification internally and assistance around presenting an alternative view to a DIY approach. The physical costs are a bit easier to identify but what about the human costs - your 'hard to retain' IT talent that you want focused on evolving the business strategy rather than the heavy lifting a move to the cloud requires. To help you justify a MSP solution to your stakeholders and support your internal business case for the associated human cost of a move to the cloud, download our comparison tool that outlines: • Considerations - the motivations around a move to the cloud • Associated tasks/actions required to complete a move to the cloud - a comprehensive and direct comparative view of all tasks that IT are responsible for in a DIY v. MSP approach • Minimum Cost Savings - Re-platform and run costs compared as well as a comparison of the total IT department time required
Tags : 
    
Rackspace
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
After evaluating all the options on the market, one company chose Automation Anywhere RPA to start its digital transformation journey and automate its invoice processing, help desk, and internal financial reporting processes. The company achieved its initial goals—and more. It got the first initiative—automating accounts payable—up and running in less than 6 months, and increased the efficiency of the operation by 300%.
Tags : 
efficiency, rpa, roi, digital workforce, ocr
    
Automation Anywhere APAC
Published By: Rackspace     Published Date: May 09, 2019
Insights into avoiding migration regret amongst CxO’s: The decision to move business workloads and applications to the cloud impacts all parts of the business and isn’t a decision isolated to the IT team. Our latest research study on the different motives, concerns and experiences of executive peers and business stakeholders when securing buy-in for a strategic IT move found 97% of C-level executives in ANZ suffered from migration regret during their first cloud migration. Packed with telling hindsight, over 200 c-suite executives shared their expectations and experiences during the cloud migration journey. They reveal what they would have done differently - namely enhanced communication and a clear plan of action - and offer practical advice to help others get buy-in internally and secure funding to support a move to the cloud.
Tags : 
    
Rackspace
Published By: Google Apigee APAC     Published Date: Jun 10, 2019
How Six Companies Innovate with API Management Companies are hungry for ways to innovate in the digital age, and as enterprises have experimented with new technologies, it’s become clear that success requires expanding the reach of digital assets beyond a business’s internal talent. The connected experiences that customers demand occur across a range of channels, and the people building those experiences can be a developer building a mobile app in her garage just as easily as an IT engineer. Businesses need to make their digital assets leverageable to more developers so they can build more digital experiences across more channels, scalably and securely, to engage more customers. In this brief, we explore the diverse ways that innovation leaders have leveraged APIs to transform the way their companies do business. Download this brief to learn more about how to use the power of APIs to open new business channels for your company.
Tags : 
    
Google Apigee APAC
Published By: Red Hat APAC     Published Date: Jun 27, 2019
Forrester conducted a survey of global mid-sized companies about their software development initiatives and business performance. The study established a clear link between business performance and the use of agile integration. Forrester made several recommendations: blend agile integration with agile development, broaden integration strategy and architecture, center on business design, and blur the lines between internal and external integration. Red Hat can help organizations reach these agile integration goals.
Tags : 
    
Red Hat APAC
Published By: Netsuite     Published Date: Jul 24, 2017
As fast-growing companies achieve greater market penetration, gain more customers and their organization grows, they often run in to a wall where internal processes struggle to keep up with continued demand. The key challenge to supporting that growth is laying the groundwork to scale the business effectively and efficiently while maintaining customer service and support.
Tags : 
    
Netsuite
Published By: HP     Published Date: Aug 12, 2014
HP's Peter Mansell, reveals why HP decided to build CloudSystem around open standards and APIs, and Freeform Dynamics' Dale Vile, who explains how you can avoid building yourself into a silo.
Tags : 
cloudsystem, avoid building yourself into a silo, cloud migration, cloud administration
    
HP
Published By: Mimecast     Published Date: Aug 16, 2018
Email. You use it constantly. And it’s the number-one application to keep your organization functioning, lines of communication flowing, and productivity seamless. Organizations need email to stay up-and running all the time. After all, it’s supposed to just work, right? This is where trouble often sets in. Cybercriminals use email constantly, too. It’s the number-one vector used to initiate attacks like malware delivery (think ransomware), impersonations and phishing attacks. In fact, almost 90% of organizations* have seen the volume of phishing attacks either rise or stay the same over the past 12 months. Internal threats have also been on the rise: Most organizations have encountered internal threats driven by careless employees (88%), compromised accounts (80%) or malicious insiders (70%) over the last year.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Jan 16, 2019
Employees frequently become unwitting participants in attacks, aiding the lateral movement of threats through the distribution of malicious URLS and attachments or the exposure of sensitive data. In this E-book, we’ll take a closer look into several email-related activities that employees often engage in that contribute to the spread of these insider (“hidden”) threats and then discuss what measures your organization can take to protect itself from these “hidden” threats.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Oracle     Published Date: Apr 12, 2017
Brands are defined by the experiences they deliver. Customers are naturally self-interested, and a company’s internal workings and challenges are of little concern to them when assessing its products and services. All that matters is whether a brand is able to meet their needs as and when called upon to do so.
Tags : 
    
Oracle
Published By: VMware     Published Date: Jun 24, 2019
Management is demanding more efficiency and cost optimization from internal IT groups. Independent research data shows VMware’s HCI offering provides better economics than other solutions. Leveraging current IT skills, infrastructure and operational processes creates a foundation for both Capex and Opex savings that will continue for years to come, with increased operational simplicity that will allow IT to better respond to business demands.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.