HIT Consultant Insightful coverage of healthcare innovation
 

it risk management

Results 1 - 25 of 441Sort Results By: Published Date | Title | Company Name
Published By: Sage EMEA     Published Date: Jan 29, 2019
SagecommissionedForresterConsultingtoconducta TotalEconomicImpact™(TEI)studytoexaminethe potentialreturnoninvestment(ROI)organizationsmay realizebydeployingits Enterprise Management solutionas part of Sage Business Cloud.Thepurpose ofthisstudyistoprovidereaders withaframework to evaluatethepotentialfinancialimpactof Enterprise Managementwithintheir organizations. Tobetter understandthebenefits,costs,andrisks associatedwithaninvestmentinEnterprise Management,Forrester conducted in-depth interviews withtwoEnterprise Managementcustomers. For a brief description of each customer, see the Analysis section. According toSage,Enterprise Managementis an integratedand globalenterprise business management solution for purchasing, manufacturing, inventory, sales, customer service,and financial management. Formoredetails ontheEnterprise Management solution,seeAppendix A. For this TEI study, Forrester has created a compositeOrganizationto illustrate the quantifiable benefits and costs of investing i
Tags : 
    
Sage EMEA
Published By: Tenable     Published Date: Jan 25, 2019
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
    
Tenable
Published By: Infosys     Published Date: Feb 12, 2019
DevOps is fast assuming greater importance in deciding the agility of an enterprise. A robust DevOps setup is crucial for successful agile delivery and minimal risks. It greatly optimizes release management costs and team productivity, resulting in reduced time to market. At the same time, DevOps enables organizations to make rapid product releases with increased quality and manage customers' expectations. In this paper we explore various aspects of DevOps. We look at key success attributes, main processes, tools, and frameworks that play an elementary role in DevOps.
Tags : 
    
Infosys
Published By: Flexera     Published Date: Feb 19, 2019
SaaS adoption is growing quickly. It's easy to buy and deploy because of its relatively low overhead and up-front costs. But SaaS is designed to proliferate. About a third of the SaaS apps in most organizations don’t even get used. And the result? SaaS costs spin out of control. Are you able to manage the cost and security risks associated with your SaaS applications? Download the Essential SaaS Management Toolkit to learn about SaaS usage trends, understand the importance of SaaS management tools and discover how to take control of your SaaS applications. The Essential SaaS Management Toolkit was designed to provide everything you need to learn how to manage the cost and security risks of your SaaS applications. Get the Toolkit here.
Tags : 
    
Flexera
Published By: Coupa     Published Date: Dec 14, 2018
Financial services firms are turning to Business Spend Management (BSM) as a Strategic Solution Beset by competitors and burdened by ever-shifting regulatory requirements, financial services firms are turning to cloud-based technology to gain better control over—and visibility into—spending. In the process, they are becoming fiercer competitors. Download this ebook for insights into how you can improve your organization's financial health and how: A cloud complete-BSM solution can track and measure all purchasing activities, identifying patterns that provide opportunities for negotiating discounts, and better managing risk To increase savings across source-to-contract, procure-to-pay, travel & expense management, as well as risk and supplier management Modern technology enables the finance function to take cost-management to a deeper level—without investing in IT infrastructure
Tags : 
    
Coupa
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection, cifn, snap management, snapprotect
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365
    
Commvault
Published By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : 
security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit
    
Oracle
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle CX
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG
Published By: IFS     Published Date: Jun 25, 2014
EAM software delivers key benefits to an organization that relies on expensive and complex assets. It gives senior management visibility and control over the drivers of cost and productivity of those assets. And it offers real maintenance management and risk management benefits. Learn the 5 steps to realizing EAM software benefits today!
Tags : 
ifs, eam software, enterprise applications, mrp, cmms
    
IFS
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Complexity, globalization and digitalization are just some of the elements at play in the risk landscape—and data is becoming a core part of understanding and navigating risk. How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study: 1. The Enterprise Risk & Strategy Disconnect—Finance leaders are using data and managing risk programs, but over 65% of finance leaders say there’s missing link between risk and strategy. 2. The Risks of the Use and Misuse of Data—Up to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data. 3. Risky Relationships—Only 20% of finance leaders say the data they use to manage risk is fully integrated and shared. Download the study to learn how finance leaders are approaching data and enterprise risk management
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Navigating Uncertainty & Disruption in a Post-Brexit World Risk management and finance professionals are navigating an unprecedented period of uncertainty. In a post-Brexit world, how can business leaders best navigate disruption? Data has become the most valuable business commodity, but not all data is meaningful. Data that helps you uncover hidden associations with customers, partners and suppliers can be a true catalyst for business transformation and growth. In this ebook, we have mapped out the crucial steps in the journey towards operationalizing relationship data to: - Define Relationship Data - Use relationship data to unlock new opportunities - Apply relationship data across the organization to drive growth
Tags : 
    
Dun & Bradstreet
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Discover how your business can institute an effective management strategy to reduce costs, increase productivity and manage document related risks by outsourcing your document process management function.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management, document management services, managed print services, document processing center, document workflows, business management, business imaging
    
Canon Business Process Services
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Gain control of your organization’s records, proactively maintain regulatory compliance and, most importantly, protect your firm from legal risk and exposure by reading an important whitepaper on best practices for administering a successful program.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic records, electronic records management, document imaging, document imaging services, document management, document management services, business management, business imaging, business performance, document workflows, business outsourcing
    
Canon Business Process Services
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Properly managed, multi-server and wildcard certificates can provide increased flexibility. Since the consequences of a compromise can be more severe than they would be for a conventional certificate, supplemental safeguards should be employed. In the absence of these safeguards, we do not recommend the use of either multi-server or Wildcard certificates, due to both the security risks involved and the expanded scope of management issues in the wake of a compromise.
Tags : 
    
Entrust Datacard
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure
    
Blue Coat Systems
Published By: GE Healthcare     Published Date: Aug 27, 2015
Healthcare organizations are facing uncertain times, which are putting enormous strains on their revenue cycle management (RCM). Automation is proven to improve RCM measures, and even small improvements can significantly impact the bottom line. This whitepaper details how providers can embrace automation to help drive financial performance.
Tags : 
centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims, denials, cost to collect, patient accounting
    
GE Healthcare
Published By: GE Healthcare     Published Date: Aug 27, 2015
Children’s Mercy is not only one of the nation’s top pediatric medical centers, they have a strategy that improves organizational profitability in the face of constant change – all while delivering world-class care for their patients. Children’s Mercy accomplished what many have tried: integrating hospital and ambulatory revenue cycle activities with complete integration of all processes on a single IT platform.
Tags : 
centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims, denials, cost to collect, patient accounting
    
GE Healthcare
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.