HIT Consultant Insightful coverage of healthcare innovation
 

issues

Results 676 - 700 of 943Sort Results By: Published Date | Title | Company Name
Published By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : 
logrhythm, sans, cloudai, ueba
    
LogRhythm
Published By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
    
Tenable
Published By: Qualys     Published Date: Jun 02, 2015
Health care is often considered a lucrative business for those involved in waste, fraud and abuse. Today’s ever-accelerating technology changes make data related to health care, medical and financial issues even more attractive (and profitable) to cybercriminals who sell medical identities and siphon money from stolen financial records. Risks are exponentially increased because of organizations’ reliance on electronic systems for mission-critical functions. According to 61% of respondents to the SANS 2014 State of Cybersecurity in Health Care Organizations survey, medical/health record systems are considered the most at-risk information asset among the 224 health care-related organizations represented in the survey.
Tags : 
health care, state of cyber security, increase risks, improved practices, sans
    
Qualys
Published By: SAS     Published Date: Sep 09, 2010
This white paper identifies the key issues that must be addressed and provides a clear strategy for solving them.
Tags : 
sas, business analytics, productivity, operational application, data integration, reporting
    
SAS
Published By: SAS     Published Date: Aug 28, 2018
With the amount of information in the digital universe doubling every two years, big data governance issues will continue to inflate. This backdrop calls for organizations to ramp up efforts to establish a broad data governance program that formulates, monitors and enforces policies related to big data. Find out how a comprehensive platform from SAS supports multiple facets of big data governance, management and analytics in this white paper by Sunil Soares of Information Asset.
Tags : 
    
SAS
Published By: GFI Software     Published Date: Apr 05, 2011
GFI MailArchiver is an email archiving and management solution that addresses storage issues, allows access to archived email at any time and facilitates compliance/eDiscovery requests. Why Choose GFI MailArchiver? Download this free trial to experience the benefits!
Tags : 
gfi software, mailarchiver, free trial, exchange, server email archiving, compliance
    
GFI Software
Published By: GFI Software     Published Date: Apr 05, 2011
GFI MailArchiver is an email archiving and management solution that addresses storage issues, allows access to archived email at any time and facilitates compliance/eDiscovery requests. Why Choose GFI MailArchiver? Download this free trial to experience the benefits!
Tags : 
gfi software, mailarchiver, 64 bit, free trial, exchange, server email archiving, compliance
    
GFI Software
Published By: Frontier Communications     Published Date: Dec 29, 2017
It can be hard for today’s businesses to create a truly integrated work environment. Having an infrastructure built on outdated technologies can further complicate the situation, resulting in a variety of business challenges that fall under four distinct categories: • Managing Multisite Locations • Connectivity Issues • Bring Your Own Device (BYOD) Integration • Decreased Employee Collaboration In this eBook, we’ll examine connectivity solutions that can address these issues and provide work groups with the tools they need to be more productive, helping businesses run more efficiently.
Tags : 
    
Frontier Communications
Published By: CyrusOne     Published Date: Jan 19, 2012
This paper explores issues that arise when planning for growth of Information Technology infrastructure and explains how colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
colocation, cloud, infrastructure, data centers, data center planning, cyrusone, cyrus one, data center
    
CyrusOne
Published By: Coupa Software     Published Date: Oct 05, 2015
As executive teams look toward an IPO, there are high expectations for accuracy in financial reporting. In order to meet these requirements, companies need to extend their ERP systems to ensure real-time visibility and control over all the company's spend. This paper looks at the issues and possible solutions.
Tags : 
ipo, pre-ipo, coupa, erp, visibility, accounts payable
    
Coupa Software
Published By: Coupa     Published Date: Mar 07, 2016
As executive teams look toward an IPO, there are high expectations for accuracy in financial reporting. In order to meet these requirements, companies need to extend their ERP systems to ensure real-time visibility and control over all the company's spend. This paper looks at the issues and possible solutions.
Tags : 
    
Coupa
Published By: Akamai Technologies     Published Date: Jul 02, 2019
Loyalty and rewards programs are powerful tools for brands to boost member engagement, acquisition, and retention. Learn why leading brands are turning to modern customer identity and access management (CIAM) solutions to scale their loyalty programs, improve user experience, and maximize ROI. In this paper, we identify the challenges associated with transforming, expanding, and scaling customer loyalty and rewards programs and related membership initiatives, and present solutions based on real-world case studies from four industries. We explore the requirements for an enterprise-grade CIAM solution and address related issues such as build vs. buy and CIAM vs. IAM. By examining four diverse case studies — and the resulting identity management solutions that were implemented by the respective companies — this paper provides valuable insight for any enterprise wishing to expand or uplift its customer loyalty program to meet membership needs in the age of the consumer.
Tags : 
    
Akamai Technologies
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
    
Fortinet EMEA
Published By: Medium Blue     Published Date: Jan 29, 2007
Search engine marketing services need to be able to stay on top of all of the latest industry developments and to be aware of the trends that are sure to shape the industry’s future. Learn more about the issues that search engine marketing firms will be contending with as the SEO industry continues to change on a regular basis.
Tags : 
search marketing, search engine optimization, medium blue, outsource, outsourcing, seo firm, seo firms, seo company
    
Medium Blue
Published By: Citrix Systems and Wyse     Published Date: Jun 07, 2011
View this webinar to learn how Seattle Children's Hospital was able to successfully deal with compliance issues, security requirements, budget constraints and more, all while ensuring a high quality user experience with Citrix XenDesktop and Wyse Xenith.
Tags : 
citrix, wyse, thin client, desktop virtualization, zero client, xendesktop, healthcare
    
Citrix Systems and Wyse
Published By: Kaseya     Published Date: Mar 12, 2015
As an IT professional, you know that when you have many users to support, every second counts! Slow remote desktop connection times and poor, unreliable connection performance can add up to significant time wasted when extended over days, weeks and months of remote control sessions.
Tags : 
desktop management, virtual system administrator
    
Kaseya
Published By: Kaseya     Published Date: May 13, 2015
As an IT professional, you know that when you have many users to support, every second count. Your remote connection speed and reliability are critical to your ability to resolve issues quickly, maximizing IT efficiency and ensuring a happy and productive end user.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data
    
Kaseya
Published By: Lenovo     Published Date: Sep 16, 2014
Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OS’s that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.
Tags : 
agency it, workforce mobility, mobile productivity, cloud computing
    
Lenovo
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell & Microsoft
Published By: Dell     Published Date: Sep 12, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell
Published By: Webroot     Published Date: Nov 02, 2012
This paper looks at this problem and how Webroot, by going back to the drawing board on counering malware threats, is revolutionizing endpoint protection and solving the issues that hinder existing endpoint security solutions.
Tags : 
antivirus protection, endpoint protection, endpoint security, malware
    
Webroot
Published By: SPAN Systems     Published Date: Aug 30, 2013
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags : 
securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes
    
SPAN Systems
Published By: Blue Coat     Published Date: Mar 11, 2016
The cloud creates new risks and compliance issues for organizations already struggling with traditional threats. Get Blue Coat’s new E-Book, “Securing Cloud Applications & Services.”
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application
    
Blue Coat
Published By: Tellabs     Published Date: Mar 23, 2012
Tellabs' white paper explains how IPsec addresses the security issues inherent in LTE networks. It also reviews the end-to-end protection solutions available in the IETF IPsec standard.
Tags : 
deploy, tellabs, network migration, migration, synchronization, ethernet, backhaul, backhaul network
    
Tellabs
Published By: Entrust Datacard     Published Date: Jul 30, 2008
This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.
Tags : 
entrust identityguard, versatile authentication platform, entrust, authentication, password management, identity management, iam, internet security
    
Entrust Datacard
Start   Previous    21 22 23 24 25 26 27 28 29 30 31 32 33 34 35    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.