HIT Consultant Insightful coverage of healthcare innovation
 

policy

Results 251 - 275 of 480Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management
    
Mimecast
Published By: Mimecast     Published Date: Oct 25, 2010
Understanding how much your current email system costs, and how that all adds up, is the key to making changes, and to providing a better service for your users.
Tags : 
mimecast, email system, policy management, email security, archiving, migration, data loss prevention, dlp
    
Mimecast
Published By: Code42     Published Date: Mar 31, 2017
Read the white paper today to learn how automatic endpoint backup eliminates the issues created by antiquated network drive backup.
Tags : 
    
Code42
Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Labís Top 10 Tips for Educating Employees about Cybersecurity to learn more.
Tags : 
kaspersky, cybersecurity, employee knowledge, internet safety, cybercrime, security policy, phish, threats
    
Kaspersky Lab
Published By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : 
byod, workforce mobility, enpoint protection, mobile devices, absolute software
    
Absolute Software
Published By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
EdgeWave
Published By: IBM     Published Date: Feb 25, 2008
Going green is becoming more than an altruistic aspiration to save the planet. A proactive corporate environmental policy is now an essential part of any company’s overall business strategy. Download this paper to find out how IBM can help you to support environmental initiatives while achieving your company's long-term business goals.
Tags : 
green, environment, environmental, compliance, cost, green strategy, ibm
    
IBM
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance
    
Aveksa
Published By: Proofpoint     Published Date: Apr 22, 2010
Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions.
Tags : 
proofpoint, enterprise data protection, email encryption, security, data loss prevention
    
Proofpoint
Published By: Microsoft Office     Published Date: Nov 07, 2008
To allow organizations and individuals the flexibility to address their specific challenges, Microsoft has a variety of Microsoft® Office suites to select from. This paper describes the commonalities and differences among the suites of the 2007 Microsoft Office system: Microsoft Office Standard 2007, Microsoft Office Professional Plus 2007, Microsoft Office Enterprise 2007, and Microsoft Office Ultimate 2007. Each suite provides the core Microsoft Office applications as well as features that support integrated content management, information rights and policy, and integrated electronic forms; however, they differ in the selection of included applications and the ways in which advanced features are implemented.
Tags : 
microsoft, office, office suites 2007
    
Microsoft Office
Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM.  It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files. Normal 0 false false false EN-US X-NONE X-NONE
Tags : 
pdf security, pdf passwords, pdf drm, adobe pdf security
    
LockLizard
Published By: Cisco     Published Date: Jan 28, 2009
A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.
Tags : 
cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy
    
Cisco
Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
    
Cisco
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire Enterprise combines real-time change detection, comprehensive configuration auditing, continuous policy compliance management, and rapid configuration remediation in a single solution. By integrating these Tripwire solutions, you can correlate all suspicious events with changes to take control of threats across all events and changes.
Tags : 
tripwire enterprise, log and event management, security, compliance, configuration audit, total cost of ownership, tco, siem
    
Tripwire, Inc
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy, risk management, vulnerability management
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
ibm, security, predictive analytics, security policy, risk management, internet security, security solutions
    
IBM Software
Published By: SAS     Published Date: Apr 25, 2017
Physicians and their patients, medical policy makers and licensing boards, pharmaceutical companies and pharmacies all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths. With so many players and data sources, todayís information is partial, fragmented, and often not actionable. We donít have the data to understand whatís happening, to adjust policy, and to motivate physicians and patients to change their behaviors. Better data and analytics can help develop better treatment protocols, both for pain in the first place and for remediation when patients are becoming dependent on the drugs.
Tags : 
    
SAS
Published By: ScriptLogic     Published Date: Aug 30, 2010
Managing the security and uptime of a Windows network requires you to master your Active Directory, the brain and heart of the network, with maximum efficiency. Active Administrator makes it simpler and faster than native Windows tools to exceed compliance regulations, tighten security, increase productivity, and improve business continuity.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore
    
ScriptLogic
Published By: ScriptLogic     Published Date: Jan 11, 2012
Active Administrator is an extensive Active Directory management solution that addresses the auditing, security, recovery and health of Active Directory from one integrated console. This centralizes the management of the most important aspects of Active Directory and Group Policy so that administrators save time and have the most control over their environment.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore
    
ScriptLogic
Published By: ScriptLogic     Published Date: Jan 25, 2012
Privilege Authority Professional is the lowest cost Windows privilege management solution that provides the core features IT administrators need to simply and quickly elevate and manage user rights.
Tags : 
privilege authority, privilege authority professional, scriptlogic, active administrator, active directory, security, productivity, security management
    
ScriptLogic
Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : 
compliance, security, policy, group policy
    
Lumension
Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication
    
Cisco
Published By: SAP     Published Date: Jul 17, 2012
As the "bring your own device" (BYOD) trend sweeps across the business world, it raises a huge management challenge for many companies. It changes who within an organization gets access to mobility. It also affects the way a business operates, with implications that go far beyond simply IT. BYOD presents new, fundamental questions about security, liability, and cost. Answers depend on two aspects of mobility management: device management policy and the technology used to fulfill and enforce a policy.
Tags : 
sap, mobile, managing, business, mobility, technology
    
SAP
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.