HIT Consultant Insightful coverage of healthcare innovation
 

response

Results 226 - 250 of 560Sort Results By: Published Date | Title | Company Name
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
smart mobility, technology solutions, integrated management
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global
Published By: SAP Inc.     Published Date: Jul 28, 2009
Need to optimize your risk management program? Strategic risk management is crucial because of increased regulatory pressures, stakeholder pressures, the impact on capital costs, the personal effect of corporate risk, and the effect of the Internet of quickening the pace of dealing with risk factors.
Tags : 
risk, sap, risk intelligence, competitive advantage, strategic risk, risk management, deloitte, rewarded risk, value, creation, value protection, regulatory pressures, enterprise risk management, erm, business intelligence, stress-test, crisis response
    
SAP Inc.
Published By: apperian     Published Date: Apr 13, 2012
With more mobile workers using personal smartphones and tablets to conduct business, 2011 is being heralded as the year of mobile apps in the enterprise. The benefits of mobile apps initiatives will far outweigh the challenges of getting them into the enterprise, in the form of increased work productivity and customer response, analysts say.
Tags : 
apperian, technology, enterprise applications, mobile device, wireless communication, mobile management
    
apperian
Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management
    
Tripwire
Published By: Aspect Software     Published Date: Nov 06, 2014
Download Aspect’s newsletter, “Serving and Engaging the Digital Consumer - from Self-Service to Agent-Assisted” for insights on how the cloud, omni-channel communications and mobility are revitalizing customer self-service. Included is a complete copy of the latest Gartner Marketscope for IVR Systems and Enterprise Voice Portals, which provides insights on the state of the market and top vendors. Download to learn more!
Tags : 
aspect, digital consumer, self service, voice response market, it leads, ivr investments, omni channel, omnichannel, omni-channel, it management, ivr, marketscope, voice portal, self-service
    
Aspect Software
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
We are living in the most revolutionary era in human communication since the invention of the printing press. For the past few years, marketers have ‘woken up’ to consumers who have the power to express their views anytime and anywhere. ‘Social’ is hot, and if nothing else, a response to this awakening. Now, the lines between paid, owned and earned media have been blurred, if not erased. Social media crosses the barrier between the three. It’s fast-paced and chaotic. We partnered with the research firm Sentient Services and surveyed more than 200 consumers about their attitudes, opinions and beliefs about brands and social media integration. The respondents come from all over the country, with all different incomes, lifestyles, and social media habits. Universally, the data supports what we’ve already seen in action: consumers want to engage with brands that integrate social media, and they prefer to do business with social brands. Let's get started!
Tags : 
spredfast, social, social integration, paid media, owned media, earned media, social media
    
Spredfast, Inc.
Published By: Genesys     Published Date: Jun 11, 2018
When you can anticipate customer needs, you can provide a customer experience that reduces frustration, increases satisfaction and creates better business results. Genesys Altocloud uses live analytics, powered by machine learning, to give you real-time insight into the customer experience. You can anticipate customer behavior, personalize journeys and use feedback to continuously tune your analytics to achieve desired business outcomes. Download the white paper and learn how to make better use of your analytics: • Automate responses that optimize the journey • identify and engage with customers before they contact you • Use predictive analytics and machine learning to drive outcomes
Tags : 
customer needs, customer experience, customer behavior, customer journey
    
Genesys
Published By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
    
Kronos
Published By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
    
Incapsula
Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula
Published By: Forcepoint     Published Date: Jan 03, 2019
The EU General Data Protection Regulation (GDPR) is now in effect, requiring global organizations to significantly address how they process and protect the personal data of EU citizens. Confused about the requirements and what next steps to take? Read our GDPR eBook to learn about the regulation and its key requirements.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 03, 2019
Get a firsthand account of how Forcepoint’s CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
The EU General Data Protection Regulation (GDPR) is now in effect, requiring global organizations to significantly address how they process and protect the personal data of EU citizens. Confused about the requirements and what next steps to take? Read our GDPR eBook to learn about the regulation and its key requirements.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Get a firsthand account of how Forcepoint’s CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Jebbit     Published Date: Jun 12, 2018
In the retail and eCommerce world, data can be your differentiator...or your downfall. To stand out, marketers are increasingly turning to first-party declared data to fuel their strategies. Learn how retailers are using mobile attention to collect and activate declared data for: Qualified lead acquisition and direct response Relevant remarketing with custom audiences and retargeting 1-to-1 email personalization Audience building and profiling
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: AWS - ROI DNA     Published Date: Nov 19, 2018
"CrowdStrike® Falcon Discover™on Amazon Web Services (AWS) helps you ramp up to the speed of DevOps, delivering advance endpoint protection through automated real-time protection, visibility and control, and more. Watch our on-demand webinar. You’ll see how CrowdStrike Falcon Discover can help your security analysts implement more effective triage and response actions; set up strong baseline security policies for your team; and more. Along with these topics, the webinar covers: Learning about the shared responsibility model: Find out moreabout how this model helps everyone stay more secure and what steps you should take. Learning best practices for CrowdStrike Falcon Discover: Choose the right baseline configuration and environmental guidelines for your team."
Tags : 
    
AWS - ROI DNA
Published By: Motorola Solutions     Published Date: Nov 29, 2018
When it comes to worker safety, mitigating downtime, and boosting productivity, nothing is faster than right NOW. Organizations across various industry segments — construction, food and beverage, chemical and industrial, and transportation equipment manufacturers — are juggling a mix of communication devices, slowing response times. Gaps in coverage, poor battery life and aging equipment reduce your ability to safely and efficiently meet production deadlines. The power of NOW puts instant communications at your workers’ fingertips — because when communication slows, production slows. Manufacturers today are under immense pressure to produce goods safely, efficiently and profitably. Meeting these goals requires reliable, clear voice and data communications. So the production line is always moving. So well-executed logistics exceed expectations. So materials and operations are tracked to maintain efficiency. So your most valuable assets — your people — are safe and connected. Unified tea
Tags : 
    
Motorola Solutions
Published By: Zilliant     Published Date: Sep 27, 2018
Building Materials Manufacturer Improves Profitability and Quote Response Time with Price Optimization
Tags : 
    
Zilliant
Published By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the market’s (and Gartner’s) attention. Over the years, we’ve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. It’s clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
    
Trend Micro
Published By: Symantec     Published Date: Nov 19, 2014
This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.
Tags : 
the cost of a data breach, business costs of a data breach, responses to a data breach
    
Symantec
Published By: Return Path     Published Date: Jan 29, 2013
Measuring your data can be difficult, but knowing what to do next is even harder. Identify issues quickly with the “Email Metrics Troubleshooter” checklist, so you can focus less time on identifying problems and more time on reaching your goals.
Tags : 
email failure, high unsubscribe rate, low click-through rate, drop in open rate, low response rate, rise in traffic but not in conversion, email trends, email marketing trends, email marketing best practices
    
Return Path
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss)
    
TriGeo Network Security
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : 
trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance, proactive network security
    
TriGeo Network Security
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.