HIT Consultant Insightful coverage of healthcare innovation
 

requirements

Results 226 - 250 of 1351Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective
    
Centrify Corporation
Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"If you’re an online retailer, you’re already familiar with the selling power of Amazon. With more than 310 million active user accounts and 44% of all online retail sales in the US going through the marketplace, this e-commerce giant’s influential position continues to expand. But for brands and retailers that want to succeed on Amazon, simply listing your products on the site is not nearly enough. In addition to being proactive and up-to-date with Amazon’s ever-evolving trends and requirements, you must also to take steps to ensure your products and brand stay one step ahead of competitors. In this eBook, we’ll share some of the most important strategies that online retailers and manufacturing brands should employ to succeed on Amazon including how to optimize your search terms and listings, maximize your advertising options, keep your products competitive and more. "
Tags : 
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"If you’re an online retailer, you’re already familiar with the selling power of Amazon. With more than 310 million active user accounts and 44% of all online retail sales in the US going through the marketplace, this e-commerce giant’s influential position continues to expand. But for brands and retailers that want to succeed on Amazon, simply listing your products on the site is not nearly enough. In addition to being proactive and up-to-date with Amazon’s ever-evolving trends and requirements, you must also take steps to ensure your products and brand stay one step ahead of competitors. In this eBook, we’ll share some of the most important strategies that online retailers and manufacturing brands should employ to succeed on Amazon including how to optimize your search terms and listings, maximize your advertising options, keep your products competitive and more.
Tags : 
    
ChannelAdvisor
Published By: Cherwell Software     Published Date: Apr 07, 2016
Cherwell Service Management™ software empowers IT organizations to easily manage their infrastructure at a fraction of the cost and complexity associated with traditional, legacy IT service management software. Designed with a metadata-driven approach, the Cherwell Service Management platform can easily be configured to meet process and integration requirements without writing or touching a single line of code. Furthermore, configurations will never break during version upgrades.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Cherwell Software     Published Date: Jan 28, 2019
The Twelve ITSM Providers that Matter Most—and How they Stack Up Forward-thinking IT teams know that to maintain a seat at the table, their approach to service management must transcend traditional silos. In Forrester's report, you’ll receive valuable analyst insight into which of the twelve market-leading service management tools can best support not only your current ITSM requirements, but also your initiatives to extend and improve service delivery across the business.
Tags : 
    
Cherwell Software
Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream’s “Seven Key Requirements for Personalized Recommendation Services” white paper outlines e-commerce recommendation services and key capabilities that can improve sales revenue and customer engagement.  You’ll also receive a Recommendation Evaluation Scorecard to help you objectively summarize critical core requirements in order to maximize your return on investment.
Tags : 
choicestream, personalized recommendation services, quality recommendations, collaborative filtering, in-session click analysis, cohorts, cross-sells, cross-promotions, blacklists, seamless multi-channel support
    
ChoiceStream
Published By: CIC Plus     Published Date: Sep 23, 2014
Learn more about HR compliance under Section 6056 of the ACA, including: • New reporting requirements for 2015 • What those requirements mean for your business • What you can do to ensure compliance • Risks of noncompliance
Tags : 
aca, affordable healthcare act, aca compliance, obamacare, irs section 6056, hr compliance, online hr forms, onboarding, year-end benefits forms, online benefits forms, new-employee orientation, w-2, w-4, hr forms hosting
    
CIC Plus
Published By: Cisco     Published Date: Dec 15, 2010
This document discusses the requirements for job scheduling software in complex IT environments with multiple interconnected enterprise-class applications that touch every aspect of the organization.
Tags : 
cisco, enterprise-class job scheduling, delivery, business processes, automation software, data center, systems management, backup and recovery, network management, systems security, custom scripting
    
Cisco
Published By: Cisco     Published Date: Jul 01, 2011
Read this white paper to learn how IT organizations can implement an effective Service Catalog that will enable them to reap the full benefits of self-service in virtualized and cloud computing environments.
Tags : 
cisco, automization, service catalog, self-service, datacenter, virtualization, private cloud, infrastructure, newscale
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco
    
Cisco
Published By: Cisco     Published Date: Jul 27, 2011
Read this white paper to learn how IT organizations can implement an effective Service Catalog that will enable them to reap the full benefits of self-service in virtualized and cloud computing environments.
Tags : 
cisco, automization, service catalog, self-service, datacenter, virtualization, private cloud, infrastructure, newscale
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
This document is a Cisco Validated Design (CVD) for Cisco Bring Your Own Device (BYOD) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for deploying personal, corporate, and guest devices onto a network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a BYOD solution, this CVD will continue to evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution.
Tags : 
cisco, byod, wireless, bring your own device, cisco validated design, cvd
    
Cisco
Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security, visibility, management, support, migration, services, applications, improve, proactive, protection
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements. These solutions are typically comprised of both private and public cloud deployments, resulting in the creation of hybrid clouds that are designed to rapidly scale up and down in response to user demands, and they provide the advantages of elastic computing economics. In order to benefit from this environment, businesses need to connect with these hybrid clouds more easily from their heterogeneous bases, and balance the need for compliance and control against the need to rapidly innovate and the ability to scale as required. This presents a complex integration challenge for IT organizations. As a result, they increasingly find themselves brokering cloud services as opposed to creating an all-private cloud environment.
Tags : 
the cloud, cloud computing, transitioning
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2015
Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity. Why are these services needed? What impact do they have on the network, IT staff, and service provider? What is the best way to boost the branch-office network to optimum levels - both technically and tactfully - if the devices provided do not meet the new requirements? Read on to learn more.
Tags : 
application services, innovation, employee productivity, technically, devices, network
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : 
network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement, integrated actionable intelligence
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Today’s branch office requires the same level of rich application services as the company headquarters to ensure business innovation and employee productivity. Why are these services needed? What impact do they have on the network, IT staff, and service provider? What is the best way to boost the branch-office network to optimum levels - both technically and tactfully - if the devices provided do not meet the new requirements? Read on to learn more.
Tags : 
cisco, routers, wan, wlan, rich application services, wireless devices
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.
Tags : 
cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan, cmx
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases. There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
cisco, byod, wifi, wireless, wlan, productivity, productivity
    
Cisco
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.