HIT Consultant Insightful coverage of healthcare innovation
 

iti

Results 14326 - 14350 of 14606Sort Results By: Published Date | Title | Company Name
Published By: Pure Storage     Published Date: Jul 03, 2019
Tapping into the power of big data can be daunting. So we’ve looked at the strategic areas your organization can focus on. Our overview of emerging trends revealed three challenges of big data, and opportunities therein:
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 03, 2019
Financial services businesses face unprecedented market challenges. Disruption from Fintech firms, increased local and international regulation, geo- political upheavals and wavering customer loyalty. The need to fully understand the market, to innovate, to reduce costs and be more competitive has never been greater, and this is where AI can help. According to one fintech research company, by 2030 the financial services sector could reduce operational costs using AI, by as much as 22%. It suggests that will equate to around $1 trillion in efficiencies. So, from a purely operational point of view, doing nothing is not really an option for companies that want to remain competitive. Today, financial services firms across the board need to rejuvenate customer experience to protect against client attrition, and protect those customers against risk. While data analysis and visualization are key to making sense of data, the fundamental challenge for all businesses is building an infrastructur
Tags : 
    
Pure Storage
Published By: Q2 eBanking     Published Date: Sep 06, 2017
Get the details on Q2's adaptable mobile architecture. Financial institutions now can close the mobile expectation gap and stay ahead of competitive pressures. Provides native integration with iOS and Android.
Tags : 
    
Q2 eBanking
Published By: Google     Published Date: Dec 03, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Durante los últimos años, la gestión de accesos con privilegios (un conjunto de funciones de control, monitorización y auditoría cuyo fin es mitigar los riesgos asociados a los usuarios, las cuentas y las credenciales con privilegios) se ha convertido en una de las principales prioridades para cualquier tipo de organización.
Tags : 
prevención de fugas de datos, gestión de las amenazas internas, auditoría y conformidad con normativas, infraestructura de ti híbrida
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
OAuth permet à l’utilisateur de déléguer ses droits d’accès à une API, permettant ainsi à un service d’être intégré à un autre pour le compte de cet utilisateur. Ce sont les mêmes fournisseurs du Web social qui ont popularisé le schéma d’exposition d’une API afin de permettre à des développeurs tiers d’enrichir leurs plates-formes qui ont été les premiers à avoir appliqué ces mécanismes de délégation des autorisations. Créé en 2006, le protocole OAuth a permis de standardiser les mécanismes de ce type.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Dans un contexte où les entreprises se tournent de plus en plus vers les équipements mobiles, les services Cloud, leurs partenaires et les développeurs tiers, les API sont devenues incontournables. La passerelle d’API de CA Technologies, CA API Gateway, offre une solution unique, capable de prendre en charge les initiatives API internes. Elle offre ainsi aux entreprises la possibilité d’explorer de nouvelles voies novatrices d’exploitation des données tout en répondant aux attentes de leurs clients et en augmentant leur efficacité. CA API Gateway allie la gestion des règles à la mise en œuvre de règles d’exécution pour garantir la centralisation de l’application des règles entre l’entreprise et l’utilisateur final, indépendamment de leur localisation.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Comme ces chiffres le montrent, tout tourne autour des applications. Les entreprises souhaitent plus que tout se différencier de la concurrence en offrant aux consommateurs des expériences mobiles riches et des services mettant l’accent sur le côté pratique ; quant aux employeurs, ils n’attendent que de pouvoir tirer parti des gains de productivité offerts par les initiatives mobiles améliorées de type BYOD.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Encore à l’heure actuelle, l’une des priorités pour les entreprises, quelle que soit leur taille, est de protéger les accès à forts privilèges et d’empêcher les violations de sécurité. Les attaquants font appel à des méthodes toujours plus variées et sophistiquées pour infiltrer les systèmes vulnérables. Et bien que les attaques ayant une origine extérieure fassent souvent la une, les entreprises doivent également pouvoir se défendre contre les menaces internes. Il est clair aujourd’hui que, du fait de la généralisation de l’externalisation et de la sous-traitance pour des fonctions clés, davantage d’utilisateurs bénéficient d’un accès à forts privilèges aux systèmes critiques de l’entreprise. En outre, il est essentiel que les administrateurs système actuels comprennent comment les systèmes sont utilisés, qui les utilisent et dans quelles conditions. Malheureusement, les solutions de sécurité standard ne parviennent pas à sécuriser efficacement les accès internes/à forts privilèges ;
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
The APM market is one of the largest subsegments of the IT operations management market, with 2016 revenue of approximately $3.7 billion and a growth rate exceeding 18% over the prior year. Given these statistics, it is no surprise that Gartner observes continuing investment. Interestingly, while Gartner has observed many new startups appearing on the radar screen, we've also seen large software organizations such as CA Technologies, IBM, Oracle and Microsoft (re)investing at the same time. Other non-APM companies are also expressing potential interest in the market — almost all of the current APM suite providers expect to see companies like Google and Amazon boost their primarily infrastructure monitoring capabilities with increased support for application visibility. Yet these (and other large) cloud companies will pose another challenge for the traditional APM players — the battle for talent acquisition. There is some concern within the APM market that highly skilled individuals may
Tags : 
ca technologies, monitoring, programs, applications
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
CA Project & Portfolio Management is a comprehensive solution for ensuring your business strategy is on target through planning, execution, and insights. CA PPM enables your organization to plan and prioritize investments in alignment with business strategies, track project execution, and shift funding and resources to ensure success and meet changing priorities.
Tags : 
project, portfolio, management, calculator, execution
    
CA Technologies EMEA
Published By: Quick Base     Published Date: Aug 07, 2017
Many financial leaders struggle to find enough time to do everything needed because they must deal with manual processes and clunky spreadsheets. If you're concerned about wasting time by manually collecting financial data, find out how to conquer spreadsheets with the power of automation. You'll learn key trends and insights backed by research and hear real-world examples and best practices for financial automation. You'll come away with the practical tips and inspiration you need to improve team performance, mitigate financial risk, and increase business impact.
Tags : 
    
Quick Base
Published By: Skytap     Published Date: Aug 23, 2017
Cloud migration has exploded in popularity since General Electric’s (GE’s) flashy keynote at Amazon Web Service’s (AWS’s) re:Invent in September 2015. GE claims to be migrating all workloads not containing secret information. Enterprises are revisiting public cloud and exploring whether existing or systems-of-record applications have a place in that world. Infrastructure and operations (I&O) professionals on this path should avoid a one-size-fits-all approach to outsourcing and migration plans, opting instead for an app-by-app assessment.
Tags : 
    
Skytap
Published By: Adobe     Published Date: Sep 21, 2017
"Download our Email Comes of Age guide so you can make every conversation engaging — including awkward ones. You’ll learn how to transition from pushing products to pushing the customer’s needs first — so that you’ll always give them the content they crave. Read our guide to learn how you can: --Know your customers better by integrating more data --Ensure every email reaches the inbox --Delight customers with personalized experiences"
Tags : 
    
Adobe
Published By: Adobe     Published Date: Sep 21, 2017
"Email has proven itself as a revenue-driving workhorse of any marketing strategy. And yet, two-thirds of marketers are still less than satisfied with their email marketing efforts. We joined forces with Email on Acid to shed a light on the most effective email campaigns. Read The Art of the Click to learn helpful email insights, like: --The four critical qualities of all great email experiences --Subscriber open and read behaviors throughout the day --Why all clicks aren’t created equal"
Tags : 
    
Adobe
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: UBM Technology     Published Date: Sep 05, 2017
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for improved management tools and methods.
Tags : 
    
UBM Technology
Published By: VMware     Published Date: Sep 13, 2017
Download this infographic to learn how VMware Workspace™ ONE™ helps more organizations compete in the mobile cloud era by providing productivity-enhancing capabilities that are simply better. Tailored to uniquely provide both end-user mobility and IT control, VMware mobile-cloud architecture addresses the needs of today’s organizations more effectively than Citrix.
Tags : 
vmware, workspace one, mobile
    
VMware
Published By: OKTA     Published Date: Oct 11, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA
Published By: IBM Watson Health     Published Date: Dec 11, 2017
mation that’s consistent and comes from a single source, and information that’s easy to find and access. Additionally, the tool should provide access from multiple types of devices and the vendor should offer ongoing training and support. The best vendors will provide not only initial
Tags : 
clinical solutions, clinical decision support solution, clinical decision tool, technical support, optimized care, evidence-based recommendations, clinical solution vendor, drug reference
    
IBM Watson Health
Published By: Vindicia     Published Date: Oct 04, 2017
The move to subscription and recurring revenue business models is sweeping both business-to-business (B2B) and business-to-consumer (B2C) sectors. There are striking similarities in why— and how—subscription models lead to success for companies targeting businesses or consumers as customers. But there are also differences, and those differences show themselves clearly the impact of billing on customer acquisition and retention success.
Tags : 
    
Vindicia
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle Marketing Cloud
Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Leveraging cloud technology enables your enterprise to be more agile and competitive while significantly reducing costs. However, there are risks associated with these benefits. Getting new capabilities quickly is worth far less if it means exposing vulnerabilities that result in regulatory compliance violations and fees, loss of intellectual property (IP), loss of customer data, or damage to your reputation, brand, and future business.
Tags : 
    
Oracle Security Solutions
Start   Previous    567 568 569 570 571 572 573 574 575 576 577 578 579 580 581    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.