HIT Consultant Insightful coverage of healthcare innovation
 

sun

Results 251 - 275 of 371Sort Results By: Published Date | Title | Company Name
Published By: SunGard     Published Date: Aug 13, 2012
Whether your business is involved with it yet or not, cloud computing will play a significant role in the future of IT: it has already been enthusiastically embraced by small and medium sized businesses and its potential is also being accepted and exploited by larger enterprises.
Tags : 
services, cloud, infrastructure, cloud computing, significant, enthusiastically, benefits, environments
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Unicous marketing improves reliability and flexibility, reduces costs, and increases performance with SunGard Enterprise Cloud Services.
Tags : 
unicous marketing, sungrad, cloud, services, improve performance, efficiency
    
SunGard
Published By: New Relic     Published Date: Jun 05, 2014
Configuration management (CM) tools like Puppet and Chef are really useful for keeping your systems in line, but what about your infrastructure? The Really Awesome New Cisco confIg Differ—or RANCID for short—is the first step in tackling this problem. Download to learn more!
Tags : 
new relic, devops, configuration management, rancid
    
New Relic
Published By: Dell EMC     Published Date: May 12, 2016
XtremIO transforms the way you deliver VDI. Whether you are rolling out 100 or 100,000 desktops, whether your users are call-center employees or sophisticated CAD designers, whether you are an 8 to 6 organization or you follow the sun with 24x7 operations, XtremIO delivers an incredibly cost effective, agile VDI storage platform with an amazingly consistent user experience. Here are the top 10 reasons why our customers deploy virtual desktops on XtremIO.
Tags : 
vdi, xtremio, virtual desktops, all-flash array, operations, cost effective
    
Dell EMC
Published By: QuickPivot     Published Date: Jul 02, 2015
While it might feel crazy, complex and cobbled together, the marketing data and technology at your feet are pillars on which to build your brand. The modern marketer will not lurk in dark shadows, doomed to a life of misunderstanding, but will rise up and harness the tools at his fingertips to forever shift the brand/consumer relationship.
Tags : 
quickpivot, modern marketing, consumer relationships, brand awareness, marketing solutions, data analytics
    
QuickPivot
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike
Published By: Fitbit     Published Date: Mar 21, 2017
"Have you ever caught yourself assuming that all Millennials are active athletes and all Baby Boomers are more sedentary? By making generalizations about employee health goals based on age groups, you risk misunderstanding your employees and their wellness goals. View this webinar and see how you can: * Manage your wellness program by defining your workforce according to personas * Motivate each employee based on fitness goals - regardless of their generation * Increase engagement with targeted communication and attractive incentives
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Mar 16, 2017
Have you ever caught yourself assuming that all Millennials are active athletes and all Baby Boomers are more sedentary? By making generalizations about employee health goals based on age groups, you risk misunderstanding your employees and their wellness goals. Instead, try managing your wellness program by defining your workforce according to personas.
Tags : 
    
Fitbit
Published By: Emarsys     Published Date: Mar 14, 2018
Gibt es immer noch eine Lücke zwischen den Möglichkeiten von AI Marketing-Lösungen für erfolgreiche B2C-Marketingkampagnen und der Bereitschaft von Marketern und Entscheidungsträgern, diese Technologien auch zu nutzen? Emarsys hat das Marktforschungsinstitut Forrester mit einer Studie zum Thema AI-Marketing im Retail und E-Commerce beauftragt. Die Studie steht zum kostenlosen Download für Sie bereit. Ergebnisse der Studie: Nur 52% aller Unternehmen glauben, dass Sie Echtzeit-Kundeninteraktionen umsetzen können. 86% der Befragten sind davon überzeugt, dass sie mit Hilfe von AI ihr Marketing effizienter und effektiver gestalten können. 78% geben an, innerhalb der nächsten 12 Monate ihr Budget für AI Marketing Technologien um mind. 5% erhöhen zu wollen. Untersuchte Länder: USA (42%), UK (15%), Deutschland (14%), Frankreich (14%), Australien (15%)
Tags : 
    
Emarsys
Published By: TDi Technologies     Published Date: Aug 16, 2011
Configuration ports on critical and non-critical cyber assets are often misunderstood and overlooked in the overall cyber security strategy.
Tags : 
    
TDi Technologies
Published By: VMware AirWatch     Published Date: May 18, 2016
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
mobile management, mobile devices, enterprise management, information technology, best practices, business optimization
    
VMware AirWatch
Published By: GFI Software     Published Date: Feb 24, 2011
Read the results of a survey focused on enterprise antivirus users and discover why customers love VIPRE Antivirus Business.
Tags : 
gfi software, sunbelt, vipre business, antivirus solution, security, enterprise antivirus survey
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper, sponsored by GFI Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Antivirus Business, an integrated platform that provides high performance, integrated endpoint protection capabilities.
Tags : 
gfi software, sunbelt, malware protection, system management, threats, endpoint infrastructure, viruses, worms, spyware
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper discusses the risks to business operations that are created as a result of this performance degradation.
Tags : 
gfi software, sunbelt, performance degradation, enterprise antimalware software
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
The goal of this guide is to raise awareness in organizations of the importance of security and how they can deal with the threats.
Tags : 
gfi software, sunbelt, security consideration, small and medium-sized enterprises, threats, security
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data.
Tags : 
gfi software, sunbelt, social networking, security risk, personal information, company data, data protection
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper contains 12 PCI DSS requirements that have been organized into six (6) logically related groups.
Tags : 
gfi software, sunbelt, pci-dss compliance, data security, american express, discover financial services, jcb international, mastercard worldwide, visa
    
GFI Software
Published By: GFI Software     Published Date: Mar 31, 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.
Tags : 
gfi, sunbelt, messaging, web security best practices, threats
    
GFI Software
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, vulnerability life cycle
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, sungard, log management, automated log management, pci, hipaa, glba, log data
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : 
alert logic, sungard, pci, dss, compliance
    
Alert Logic and Sungard Availability Services
Published By: HP     Published Date: Mar 31, 2015
When was the last time you thought about your disaster recovery plan? Natural disasters, such as earthquakes, tsunamis, hurricanes, fires, or floods can occur anytime and disable your data center, with little to no warning. Hacker activities like a denial of service attack can also take down your systems unexpectedly. Then you have the more mundane risks such as human error and hardware or software failures. The only predictable thing to say about these risks is that at some point, on some scale, you’ll have to recover your data center from downtime. When it comes to disaster readiness, proactive planning is the key to success. Every business, regardless of size, needs to have a well-tested disaster recovery plan in place. Every minute your systems are down, the financial implications grow. Take the assessment to see where your disaster recovery plan ranks. Then learn about next steps and more information.
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
    
HP
Published By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
    
HP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.