HIT Consultant Insightful coverage of healthcare innovation
 

policy

Results 351 - 375 of 480Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
In September 2012, the New York City Board of Health approved a measure to ban the sale of large sodas and other sugary drinks in restaurants, movie theaters, sports arenas and street carts in a first of its kind restriction in the US. At the forefront of this measure was Mayor Michael Bloomberg. The mayor noted that 6,000 New Yorkers die every year from obesity-related illness. Some ethnic groups in the city have rates of overweight and obesity approaching 70 percent of adults. African-American New Yorkers are three times as likely, and Hispanic New Yorkers twice as likely, as white New Yorkers to die from diabetes.1 Is this social policy run amuck? Is it, as some have suggested, an infringement on individual rights? Or is it simply recognition that health issues cannot be treated in isolation from the many other factors that affect an individual’s or a community’s health?
Tags : 
    
Group M_IBM Q119
Published By: IGLOO Software     Published Date: Jan 06, 2010
This case study describes how a business social software solution provides the researchers, students and institutions of PolicyNet with the ability to seek out, share insights and collaborate with their counterparts down the hallway, across the street and around the world.
Tags : 
igloo software, online community researcher, policynet, academic distribution, public policy, business social software
    
IGLOO Software
Published By: HP and Intel     Published Date: Aug 13, 2012
This Enterprise Strategy Group whitepaper reviews HP 3PAR Storage Adaptive Optimization software -- granular, automated, and policy-based service-level optimization -- and support of solid-state drives (SSDs). Learn how this combination is a thoughtful approach that can deliver significant value.
Tags : 
enterprise strategy group, hp 3par storage, optimizing i/o service levels, adaptive software, ssds, solid-state drives
    
HP and Intel
Published By: Egencia     Published Date: Jun 18, 2014
Learn the 10 best practices for implementing your corporate travel program and see how you can easily create a transition strategy, secure change management support, de-implement your incumbent travel management company, and shape a policy that meets your organizations unique travel needs.
Tags : 
corporate travel program, egencia, travel needs, business travel, travel expenses, traveler adoption and compliance, travel budget management
    
Egencia
Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
Foremost, you’ll learn the top-10 reasons why the Cisco Unified Computing System™ (Cisco UCS®) is the most effective platform for your Windows Server 2003 migration. You’ll understand how Cisco UCS can vastly improve the performance of your Windows Server 2003 applications while simultaneously providing improved availability and reliability for your business-critical workloads.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
Cost Savings And Business Benefits Enabled By Cisco’s Data Virtualization Solution
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability
    
Cisco
Published By: Cisco     Published Date: Sep 16, 2015
We’re experiencing a disruptive period of data transformation—and managing today’s database infrastructures during this disruptive period is not only critically important, but also more challenging than ever. An historic growth in data and cutting-edge technology trends, like the Internet of Everything, is causing an explosion in connections and data creation that is reshaping everything we do.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability
    
Cisco
Published By: McAfee     Published Date: Nov 06, 2013
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
mcafee, endpoint encryption, epolicy orchestrator, drive encryption
    
McAfee
Published By: McAfee     Published Date: Jul 10, 2013
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
mcafee, blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod
    
McAfee
Published By: Microsoft Office 365     Published Date: Sep 20, 2016
Data security isn’t just about data security. It’s about job security. And marketing. And finance. And company valuation. Download the new eBook to see what questions you need to ask about your organization’s security measures, why they matter, and what else you need to know. Here’s what you need to ask your team: 1. Do you feel limited by budget or staff size? 2. How often do you see unsanctioned cloud services in use? 3. Are you protecting yourself against insider threats? 4. Do you have a cybersecurity task force in place? 5. Is your "bring your own device" policy secure?
Tags : 
    
Microsoft Office 365
Published By: Lenovo     Published Date: Sep 12, 2018
Three generations – Baby Boomers, Generation X, and Millennials – currently make up about 97% of the U.S. workforce, according to the U.S. Bureau of Labor Statistics. This white paper places a spotlight on Lenovo devices that allow such a diverse workforce to thrive. By completing this form, you have agreed to receive marketing communications from Lenovo and are providing express consent to receive these messages. You may unsubscribe at any time using the link included in each email message. To learn more about our privacy policy, visit the Lenovo Privacy page.
Tags : 
    
Lenovo
    
Hotel Engine
Published By: IBM     Published Date: Nov 19, 2014
According to a recent survey by the Compliance, Governance and Oversight Council, almost 70% of the electronic content and information organizations retain has no business or legal value. It’s simply digital detritus, retained because 1) we think we might need it sometime, 2) we forget about it, or 3) we don’t have policies and software in place to get rid of it. Ultimately, though, this unnecessary accumulation of content can create real problems in terms of e-discovery, regulation, management and cost. Watch this video white paper to learn more about: - How to get started on an information management strategy - The right combination of software and policy for successful information governance - The business case for proactive management of an organization’s digital footprint
Tags : 
compliance, governance, oversight, digital debris, data cleanup, legacy data cleanup, information management, information management strategy, information governance
    
IBM
Published By: IBM     Published Date: Feb 26, 2016
"71% of consumers do some digital research before buying an insurance policy, and 26% of those surveyed had purchased their policies online. Insurance companies are investing in interactive websites, mobile apps, and analytics software to help them optimize their processes, increase sales, improve customer service, and boost their financial standing. But is this enough to keep up? As technology continues to advance, leading insurance companies are already looking ahead to the next big advance that will transform the industry: cognitive computing."
Tags : 
cognitive computing, analytics software, ibm, insurance, process automation
    
IBM
Published By: Cisco     Published Date: Sep 17, 2015
View this infographic to learn how Cisco's ACI can produce benefits throughout your company, from fully automating IT and standardizing policy to reducing costs across your departments.
Tags : 
datacenter, aci, enterprise, networking
    
Cisco
Published By: Cisco     Published Date: Apr 11, 2016
Cisco made Application Policy Infrastructure Controller Enterprise Module (APIC-EM) generally available on November 3rd, 2015. It is an SDN controller that supports apps that make WAN and access networks easier to deploy and manage. Cisco’s focus on a low-risk, incremental approach to adopting SDN will appeal to its user-base. Cisco needs to describe the policy control capabilities benefits of APIC-EM, and also highlight its power as a platform and its ability to distinguish apps from point solution offerings from many other companies with competitive features.
Tags : 
esg brief, cisco apic, sdn controller, wan, sdn
    
Cisco
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This whitepaper, written in collaboration with TAL Global (a leading security consulting and risk management firm), highlights five case studies to illustrate common legal and security issues associated with BYO.
Tags : 
citrix, security, mobile
    
Citrix Systems, Inc.
Published By: Juniper Networks     Published Date: Feb 18, 2015
The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.
Tags : 
firewall planning, network firewall, security policy, http, terminal server, network
    
Juniper Networks
Published By: ScriptLogic     Published Date: Aug 23, 2011
Since its introduction in 2000, Group Policy has been a hit. Tens of thousands of organizations worldwide use it to create more consistent desktops for their users, to deploy software packages, to secure their computers, and more.
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria
    
ScriptLogic
Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality
    
SpectorSoft
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.