HIT Consultant Insightful coverage of healthcare innovation
 

policy

Results 301 - 325 of 480Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : 
mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
Mimecast
Published By: Mimecast     Published Date: May 20, 2009
Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.
Tags : 
mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara
    
Mimecast
Published By: Mimecast     Published Date: Dec 18, 2008
You can't afford to ignore email archiving, security, internal policy or regulatory requirements, but can you afford to keep paying for it as multiple systems on top of your email system? When you add up the full price tag for your email environment, from server to soft ware to risk management and staff costs, it becomes clear why running everything in-house can mean you spend far more of your budget on maintenance than innovation.
Tags : 
mimecast, saas, software as a service, uem, unified email management, email archive, medium-size business, esg
    
Mimecast
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.
Published By: Citrix Online     Published Date: Apr 08, 2009
There's no "one size fits all" when it comes to telecommuting. This new Forrester white paper explores how implementing best practices to create a telecommuting program and standardized policy significantly reduces operational costs and increases employee productivity - a winning combination in a tough economy.
Tags : 
telecommuting, citrix, forrester, telecommute, employee productivity, citrix, human resources, travel
    
Citrix Online
Published By: nCircle     Published Date: Aug 16, 2011
Get Compliance & Security Metrics for Benchmarking and Trending
Tags : 
vulnerability management, ip360, security risk management, vulnerability assessment, discriminant analysis, network security management, network vulnerability, vulnerabilities and exposures
    
nCircle
Published By: Datacastle     Published Date: Jul 09, 2010
How to address business continuity, information security, policy enforcement, and regulatory compliance challenges for your laptop users.
Tags : 
datacastle, business resiliency planning, mobile workforce, business continuity, information security, policy enforcement, regulatory compliance, backup and data protection
    
Datacastle
Published By: Okta     Published Date: May 12, 2017
This report describes how security and risk professionals (S&R pros) can apply risk concepts across the entire iAM process portfolio and use behavior-based trending methods to reduce security exposure, ease the burden of iAM policy management, and improve the user experience.
Tags : 
    
Okta
Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data.
Tags : 
    
AWS
Published By: Rosetta Stone     Published Date: Dec 07, 2017
In this informational webinar, we focus on identifying funding streams for K-12 ELL and world language programs. Hear perspectives and insights on funding streams in K-12 education from funding expert David DeSchryver, Senior Vice President of Education Policy at Whiteboard Advisors.
Tags : 
ell, language programs, k-12, rosetta stone, federal funding strategies
    
Rosetta Stone
Published By: VMware     Published Date: Feb 24, 2017
It’s important to understand that while security policy provides IT organizations with a platform to manage security, it doesn’t provide specific solutions. For that, we need to look at exactly what you ought to be protecting. Download this brief to learn more.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
It’s important to understand that while security policy provides IT organizations with a platform to manage security, it doesn’t provide specific solutions. For that, we need to look at exactly what you ought to be protecting. Download this brief to learn more.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
It’s important to understand that while security policy provides IT organizations with a platform to manage security, it doesn’t provide specific solutions. For that, we need to look at exactly what you ought to be protecting. Download this brief to learn more.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
It’s important to understand that while security policy provides IT organizations with a platform to manage security, it doesn’t provide specific solutions. For that, we need to look at exactly what you ought to be protecting. Download this brief to learn more.
Tags : 
    
VMware
Published By: SAP     Published Date: Apr 13, 2011
Find out what your company needs to do to maximize opportunities and limit risks in response to current and future energy emissions policies. Learn about policies in force in regions and countries around the world, and discover strategies to manage emissions to help benefit your organization.
Tags : 
climate policy, energy policy, sap, global greenhouse gas emissions, christopher l. weber, h. scott matthews, andreas vogel, supply chain
    
SAP
Published By: Centrify Corporation     Published Date: Nov 12, 2014
Centrify provides Red Hat Linux integration with Active Directory. The Centrify Suite centrally secures and manages Red Hat Linux systems — along with 450 other versions of Linux and Unix — by integrating them with your existing Microsoft Active Directory services. Centrify provides Active Directory Group Policy-based configuration to control the security settings of Red Hat systems and provides IT with the benefit of leveraging a familiar tool. Learn more about why you need Centrify for Red Hat.
Tags : 
security, management, integration, it benefits, configuration
    
Centrify Corporation
Published By: IBM     Published Date: May 27, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : 
ibm, big data, analytics, insurance, insurance industry, big data solutions, integration, risk assessment
    
IBM
Published By: IBM     Published Date: Apr 20, 2016
IBM Behavior Based Customer Insight for insurance: Build a more robust policyholder insight model
Tags : 
ibm, bbci, insurance, customer interaction, customer retention
    
IBM
Published By: SAS     Published Date: Apr 04, 2018
Opioid use grabs headlines when important celebrities overdose. Prince is sadly the most recent. But the problem is persistent and pervasive. The marginally good news is that the number of opioid prescriptions written started to decline last year. Overdose deaths, however, continued to rise. Also in the news have been lawsuits against pharmaceutical companies and distributors for helping to create the astounding oversupply of opioids, but the root causes go deeper. Physicians and their patients, medical policy makers and licensing boards, pharma companies and pharmacies all have played roles. And all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths.
Tags : 
    
SAS
Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management
    
Nemx Software Corporation
Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management
    
Nemx Software Corporation
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.