HIT Consultant Insightful coverage of healthcare innovation
 

it policy

Results 301 - 325 of 328Sort Results By: Published Date | Title | Company Name
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
    
IBM ILOG.
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce.
Tags : 
messagelabs symantec hosted services, wireless workforce, mobile data security, data and services, business practices, security, management policy
    
Symantec.cloud
Published By: ScriptLogic     Published Date: Jan 11, 2012
In this whitepaper, we will discuss the challenges of managing delegation with native tools and how you can end the delegation nightmare with Active Administrator from ScriptLogic.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator, secure copy, service explorer, security explorer, enterprise security reporter, scripting, drive mapping, printer deployment, roaming profiles, outlook profiles, group policy management, server management, ntfs permissions
    
ScriptLogic
Published By: Secure Passage     Published Date: Sep 29, 2010
Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity
Tags : 
firewall, firewall management, network security management, firewall migration, compliance, it security
    
Secure Passage
Published By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : 
byod, okta, mobility, safety, dad, mobility management
    
Okta
Published By: Virgin Pulse     Published Date: Jun 26, 2013
There’s discussion in the HR industry today about companies requiring employees to submit vital health statistics (weight, blood pressure, body fat) or pay a fine, usually seen as an increase in health premium payments. Some say it's "technology-enhanced discrimination on steroids," while others say it's a great incentive for employees to take their health seriously. Virgin HealthMiles wanted to know what healthcare buyers think about the policy, and here’s what you said in a March 2013 survey:
Tags : 
corporate wellness, heathcare, healthcare reform, benefits, vital health statistics, employee incentives
    
Virgin Pulse
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips, mission critical systems, system av, patch management, policy management, layered security, end user security awareness training, strong policies, audited procedures
    
Perimeter E-Security
Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas
    
Qualys
Published By: Integrated Research     Published Date: Apr 13, 2011
"How to be a Sustainable IT Hero: Building a Business Case for PC Power Management" explains the benefits of implementing a PC Power Management solution, and shows how to avoid the common pitfalls along the way.
Tags : 
energy management software, power management, pc power management, power management software, computer power management, green technology, how to save electricity, save power, electricity saving tips, desktop power management, sustainable business practices, saving electricity, reduce carbon emissions, reduce electricity consumption, powerminder, energy management systems, verdiem, power saving software, energy efficiency, nightwatchman
    
Integrated Research
Published By: Accusytem     Published Date: Apr 13, 2011
Banks that have successfully implemented document imaging applications, developed comprehensive polices and diligently follow consistent procedures reap the benefits of efficiencies in loan portfolio management (even more efficiencies if the bank does enterprise-wide imaging), increased productivity, diminished loan policy and document exceptions and streamlined audit and examination processes.
Tags : 
document imaging, banking software system, bank imaging, document management, bank document management
    
Accusytem
Published By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring, logging, encryption, policy-based enforcement
    
IBM Corporation
Published By: Bloomberg     Published Date: Dec 28, 2011
No other source puts so much data in one place, allowing you to be more efficient and effective in your job. Once you've experienced BGOV, you'll wonder how you ever worked without it.
Tags : 
bloomberg government insider, bgov, demo, free trial, policy analysis, data breakdowns, editorial expertise, news aggregator, policy research, government contract database, congressional staff database
    
Bloomberg
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding
    
Courion
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding
    
Courion
Published By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding
    
Courion
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Enterprise Strategy Group whitepaper reviews HP 3PAR Storage Adaptive Optimization software -- granular, automated, and policy-based service-level optimization and more. Learn how this combination is a thoughtful approach that can deliver.
Tags : 
hp 3par, optimization, io service levels, optimizing
    
Sponsored by HP and Intel® Xeon® processors
Published By: Cisco     Published Date: Aug 27, 2015
Learn more about the advantages of each decision based on your own business and IT priorities to learn which communication deployment option works best
Tags : 
cloud computing, communication deployment, it priorities, collaboration solutions, collaboration capabilities, workforce management, cisco solutions, growth plans, cloud service, byod policy, bring your own device
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability
    
Cisco
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Historically in the enterprise, Macs have been managed separately from iOS devices in separate consoles, sometimes by different groups within IT. Traditional domain-joined management posed several problems for today’s modern enterprise. Nowadays, managing Macs like mobile devices means they can be configured over the air, without ever having to be domain-joined. That’s a major plus for global organizations, remote workers and companies who use contractors or freelancers. Unifying parallel device environments enables streamlined oversight, management and distribution of content across Macs and iOS devices. With AirWatch® Enterprise Mobility Management, IT can implement a BYOD program and policy for all device types, ensuring personal information remains private. IT has a consistent management experience for all device types and operating systems, enabling a single-pane-of-glass view of all endpoints in an enterprise.
Tags : 
vmware, emm, mac management, managing macs, airwatch
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Take a deeper look into how AirWatch enables Windows management to evolve from a rigid PC-centric approach to one offering a flexible and over-the-air configuration model. This session will delve into the specific configuration, security and OS patch management technologies that AirWatch introduces, as well as leveraging AirWatch alongside conventional Windows management tools that are in use today. • Leverage product provisioning and native configuration management features for policy management from the cloud • Integrate with the new Windows Update as a Service to flexibly manage OS updates and patches on or off the domain • Ensure endpoint security and data protection via advanced security features in the management platform and Windows 10
Tags : 
    
VMware AirWatch
Published By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : 
auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.