HIT Consultant Insightful coverage of healthcare innovation
 

sun

Results 276 - 300 of 401Sort Results By: Published Date | Title | Company Name
Published By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : 
leveraging, visualization, optimizing, processes, technology, optimizing, server utlization
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Whether your business is involved with it yet or not, cloud computing will play a significant role in the future of IT: it has already been enthusiastically embraced by small and medium sized businesses and its potential is also being accepted and exploited by larger enterprises.
Tags : 
services, cloud, infrastructure, cloud computing, significant, enthusiastically, benefits, environments
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Unicous marketing improves reliability and flexibility, reduces costs, and increases performance with SunGard Enterprise Cloud Services.
Tags : 
unicous marketing, sungrad, cloud, services, improve performance, efficiency
    
SunGard
Published By: New Relic     Published Date: Jun 05, 2014
Configuration management (CM) tools like Puppet and Chef are really useful for keeping your systems in line, but what about your infrastructure? The Really Awesome New Cisco confIg Differ—or RANCID for short—is the first step in tackling this problem. Download to learn more!
Tags : 
new relic, devops, configuration management, rancid
    
New Relic
Published By: Dell EMC     Published Date: May 12, 2016
XtremIO transforms the way you deliver VDI. Whether you are rolling out 100 or 100,000 desktops, whether your users are call-center employees or sophisticated CAD designers, whether you are an 8 to 6 organization or you follow the sun with 24x7 operations, XtremIO delivers an incredibly cost effective, agile VDI storage platform with an amazingly consistent user experience. Here are the top 10 reasons why our customers deploy virtual desktops on XtremIO.
Tags : 
vdi, xtremio, virtual desktops, all-flash array, operations, cost effective
    
Dell EMC
Published By: QuickPivot     Published Date: Jul 02, 2015
While it might feel crazy, complex and cobbled together, the marketing data and technology at your feet are pillars on which to build your brand. The modern marketer will not lurk in dark shadows, doomed to a life of misunderstanding, but will rise up and harness the tools at his fingertips to forever shift the brand/consumer relationship.
Tags : 
quickpivot, modern marketing, consumer relationships, brand awareness, marketing solutions, data analytics
    
QuickPivot
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike
Published By: Fitbit     Published Date: Mar 21, 2017
"Have you ever caught yourself assuming that all Millennials are active athletes and all Baby Boomers are more sedentary? By making generalizations about employee health goals based on age groups, you risk misunderstanding your employees and their wellness goals. View this webinar and see how you can: * Manage your wellness program by defining your workforce according to personas * Motivate each employee based on fitness goals - regardless of their generation * Increase engagement with targeted communication and attractive incentives
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Mar 16, 2017
Have you ever caught yourself assuming that all Millennials are active athletes and all Baby Boomers are more sedentary? By making generalizations about employee health goals based on age groups, you risk misunderstanding your employees and their wellness goals. Instead, try managing your wellness program by defining your workforce according to personas.
Tags : 
    
Fitbit
Published By: Emarsys     Published Date: Mar 14, 2018
Gibt es immer noch eine Lücke zwischen den Möglichkeiten von AI Marketing-Lösungen für erfolgreiche B2C-Marketingkampagnen und der Bereitschaft von Marketern und Entscheidungsträgern, diese Technologien auch zu nutzen? Emarsys hat das Marktforschungsinstitut Forrester mit einer Studie zum Thema AI-Marketing im Retail und E-Commerce beauftragt. Die Studie steht zum kostenlosen Download für Sie bereit. Ergebnisse der Studie: Nur 52% aller Unternehmen glauben, dass Sie Echtzeit-Kundeninteraktionen umsetzen können. 86% der Befragten sind davon überzeugt, dass sie mit Hilfe von AI ihr Marketing effizienter und effektiver gestalten können. 78% geben an, innerhalb der nächsten 12 Monate ihr Budget für AI Marketing Technologien um mind. 5% erhöhen zu wollen. Untersuchte Länder: USA (42%), UK (15%), Deutschland (14%), Frankreich (14%), Australien (15%)
Tags : 
    
Emarsys
Published By: ExpertVoice     Published Date: Jun 17, 2019
Sunwarrior, a leading naturals brand, partnered with ExpertVoice to build product advocacy with influential experts to drive full-price consumer sales. Since 2015, they’ve been working with ExpertVoice to empower industry professionals — sales associates at Fresh Thyme, Sprouts, GNC, Vitamin Shoppe and more — with compelling behind-the-scenes content and exclusive product access to elevate their recommendations — and impact Sunwarrior’s bottom line.
Tags : 
    
ExpertVoice
Published By: TDi Technologies     Published Date: Aug 16, 2011
Configuration ports on critical and non-critical cyber assets are often misunderstood and overlooked in the overall cyber security strategy.
Tags : 
    
TDi Technologies
Published By: VMware AirWatch     Published Date: May 18, 2016
In this paper, we discuss why a bring-your-own-device (BYOD) approach to workforce mobility can be a compromise-free approach, and then how the combined capabilities of Samsung KNOX and Enterprise Mobility Management from AirWatch by VMware turn this compromise-free approach into reality.
Tags : 
mobile management, mobile devices, enterprise management, information technology, best practices, business optimization
    
VMware AirWatch
Published By: GFI Software     Published Date: Feb 24, 2011
Read the results of a survey focused on enterprise antivirus users and discover why customers love VIPRE Antivirus Business.
Tags : 
gfi software, sunbelt, vipre business, antivirus solution, security, enterprise antivirus survey
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper, sponsored by GFI Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Antivirus Business, an integrated platform that provides high performance, integrated endpoint protection capabilities.
Tags : 
gfi software, sunbelt, malware protection, system management, threats, endpoint infrastructure, viruses, worms, spyware
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper discusses the risks to business operations that are created as a result of this performance degradation.
Tags : 
gfi software, sunbelt, performance degradation, enterprise antimalware software
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
The goal of this guide is to raise awareness in organizations of the importance of security and how they can deal with the threats.
Tags : 
gfi software, sunbelt, security consideration, small and medium-sized enterprises, threats, security
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data.
Tags : 
gfi software, sunbelt, social networking, security risk, personal information, company data, data protection
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper contains 12 PCI DSS requirements that have been organized into six (6) logically related groups.
Tags : 
gfi software, sunbelt, pci-dss compliance, data security, american express, discover financial services, jcb international, mastercard worldwide, visa
    
GFI Software
Published By: GFI Software     Published Date: Mar 31, 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.
Tags : 
gfi, sunbelt, messaging, web security best practices, threats
    
GFI Software
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, vulnerability life cycle
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, sungard, log management, automated log management, pci, hipaa, glba, log data
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : 
alert logic, sungard, pci, dss, compliance
    
Alert Logic and Sungard Availability Services
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.