HIT Consultant Insightful coverage of healthcare innovation
 

it policy

Results 326 - 349 of 349Sort Results By: Published Date | Title | Company Name
Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy
    
Qualys
Published By: Integrated Research     Published Date: Apr 13, 2011
"How to be a Sustainable IT Hero: Building a Business Case for PC Power Management" explains the benefits of implementing a PC Power Management solution, and shows how to avoid the common pitfalls along the way.
Tags : 
energy management software, power management, pc power management, power management software, computer power management, green technology, how to save electricity, save power
    
Integrated Research
Published By: Accusytem     Published Date: Apr 13, 2011
Banks that have successfully implemented document imaging applications, developed comprehensive polices and diligently follow consistent procedures reap the benefits of efficiencies in loan portfolio management (even more efficiencies if the bank does enterprise-wide imaging), increased productivity, diminished loan policy and document exceptions and streamlined audit and examination processes.
Tags : 
document imaging, banking software system, bank imaging, document management, bank document management
    
Accusytem
Published By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
    
IBM Corporation
Published By: Bloomberg     Published Date: Dec 28, 2011
No other source puts so much data in one place, allowing you to be more efficient and effective in your job. Once you've experienced BGOV, you'll wonder how you ever worked without it.
Tags : 
bloomberg government insider, bgov, demo, free trial, policy analysis, data breakdowns, editorial expertise, news aggregator
    
Bloomberg
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
Courion
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
Courion
Published By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
Courion
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Enterprise Strategy Group whitepaper reviews HP 3PAR Storage Adaptive Optimization software -- granular, automated, and policy-based service-level optimization and more. Learn how this combination is a thoughtful approach that can deliver.
Tags : 
hp 3par, optimization, io service levels, optimizing
    
Sponsored by HP and Intel® Xeon® processors
Published By: Cisco     Published Date: Aug 27, 2015
Learn more about the advantages of each decision based on your own business and IT priorities to learn which communication deployment option works best
Tags : 
cloud computing, communication deployment, it priorities, collaboration solutions, collaboration capabilities, workforce management, cisco solutions, growth plans
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability
    
Cisco
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Historically in the enterprise, Macs have been managed separately from iOS devices in separate consoles, sometimes by different groups within IT. Traditional domain-joined management posed several problems for today’s modern enterprise. Nowadays, managing Macs like mobile devices means they can be configured over the air, without ever having to be domain-joined. That’s a major plus for global organizations, remote workers and companies who use contractors or freelancers. Unifying parallel device environments enables streamlined oversight, management and distribution of content across Macs and iOS devices. With AirWatch® Enterprise Mobility Management, IT can implement a BYOD program and policy for all device types, ensuring personal information remains private. IT has a consistent management experience for all device types and operating systems, enabling a single-pane-of-glass view of all endpoints in an enterprise.
Tags : 
vmware, emm, mac management, managing macs, airwatch
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Take a deeper look into how AirWatch enables Windows management to evolve from a rigid PC-centric approach to one offering a flexible and over-the-air configuration model. This session will delve into the specific configuration, security and OS patch management technologies that AirWatch introduces, as well as leveraging AirWatch alongside conventional Windows management tools that are in use today. • Leverage product provisioning and native configuration management features for policy management from the cloud • Integrate with the new Windows Update as a Service to flexibly manage OS updates and patches on or off the domain • Ensure endpoint security and data protection via advanced security features in the management platform and Windows 10
Tags : 
    
VMware AirWatch
Published By: AWS     Published Date: Oct 07, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data. Register for our webinar to learn how Pacific Dental leveraged McAfee’s CASB solution, McAfee MVISION Cloud, to address these challenges and fulfill their security responsibility.
Tags : 
    
AWS
Published By: IBM     Published Date: Apr 20, 2017
Enterprise mobility management suites enable organizations to integrate and manage mobile devices in their IT infrastructures. End-user computing leaders must act amid rapid market changes to reach both short-term and long-term enterprise mobility objectives. UEM is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as part of the IoT, will increasingly become included in UEM. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools. However, not all IoT objects will fall under the realm of EMM tools. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready.
Tags : 
auditing, enterprise data protection, mobile device management, mobile application management, mobile identity, policy enforcement, content optimization
    
IBM
Published By: Juniper Networks     Published Date: Jun 22, 2017
Hybrid cloud is your IT platform of the present. Juniper Unite Cloud helps you win the race to the hybrid cloud because it offers the flexibility of hybrid cloud and hybrid operations models while effectively confronting and addressing the overabundance of variables in hybrid IT technologies. Juniper’s product portfolio offers the ultimate flexibility, so that you can seamlessly integrate cloud stacks and unify policy in and across today’s and tomorrow’s private and public clouds. Contact your Juniper Networks representative to learn more about this hybrid cloud solution.
Tags : 
cloud computing, cloud mobility, cloud security, esignature, digital signature, transaction security, financal security
    
Juniper Networks
Published By: Oracle     Published Date: Sep 30, 2019
Email deliverability and privacy matters now more than ever. New and existing laws up the stakes for companies that don’t comply with standards and regulations. And today’s email marketers find it increasingly difficult to be heard. You need to master deliverability and privacy to tackle the noise generated by social media, other email marketers, and even word-of-mouth marketing. Your reputation as an email sender impacts your potential reach as a marketer. Here are some factors that can earn you a poor deliverability score and prevent emails from reaching your desired target: f Lack of adherence to an email privacy policy f Poor list management f Frequency and relevancy of sends f Complaints from recipients f Number of blocks f Spam trap hits f How people are engaging Getting your message delivered is vital to revenue performance. A slight increase at the top of the funnel can make a huge difference to your bottom line.
Tags : 
    
Oracle
Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Enterprises often treat information security technology as an insurance policy against the potentially devastating costs of not deploying it. From that perspective, your security technology’s ROI is determined by the time it takes for a breach—one with costs equal to or greater than your investment—to occur. Your ROI could be immediate. Or it could be longer term. With that in mind, it is hard to justify yet another security technology, but a move to the cloud suggests that you should.
Tags : 
    
Oracle Security Solutions
Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Oct 03, 2019
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. This webinar explores how companies should rethink data security, focusing on the following three principles: Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of context and user intent Learn more about how to embrace a risk-adaptive approach to data protection.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Oct 03, 2019
In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs. Understanding the location of all data, whether at-rest, in-use, or in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify their riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data. This webinar explores how companies should rethink data security. Protecting critical data and intellectual property requires a risk-adaptive, dynamic approach, including these three main components. Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of c
Tags : 
    
Forcepoint
Published By: Lenovo     Published Date: Sep 11, 2018
Three generations – Baby Boomers, Generation X, and Millennials – currently make up about 97% of the U.S. workforce, according to the U.S. Bureau of Labor Statistics. This white paper places a spotlight on Lenovo devices powered by Windows 10 Pro that allow such a diverse workforce to thrive. By completing this form, you have agreed to receive marketing communications from Lenovo and are providing express consent to receive these messages. You may unsubscribe at any time using the link included in each email message. To learn more about our privacy policy, visit the Lenovo Privacy page.
Tags : 
    
Lenovo
Published By: Asurint     Published Date: Aug 02, 2019
The majority of employers today perform background investigations of some type, according to the National Association of Professional Background Screeners (NAPBS). All background checks aren’t created equal, however. Whether you’re seeking to improve existing talent acquisition capabilities or are among the employers introducing a new background search policy, it’s vital to identify the right partner for background checks With so many options on the market, the quest for the best-fit background screening provider can seem overwhelming at first. To help cut through the clutter, we’ve compiled five basic questions, which home in on the central issues related to background checks and can help any organization identify the companies most capable of meeting their needs.
Tags : 
    
Asurint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.