HIT Consultant Insightful coverage of healthcare innovation
 

us government

Results 76 - 100 of 239Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: SAP     Published Date: Jul 18, 2016
After Minnesota rolled out a cloud-based set of productivity tools that included instant messaging and video, growth among state agency users quadrupled and the number of cross-agency messages and videos increased by nearly 350,000 in just 2 years. There is a large-scale shift underway across the country where hardware infrastructure, platforms and software are being unbundled and moved out of government’s traditional area of operation. Download the thought leadership paper to learn more about what this shift entails, the benefits it will bring and how CIOs can prepare for its impact.
Tags : 
    
SAP
Published By: NetSuite     Published Date: Feb 17, 2016
NetSuite recently joined forces with IDG Communications to gather together some of Australia’s leading CIO and CFO professionals to find out how their businesses are responding to disruption, the inherent opportunities it brings, the impact on their roles and what role cloud computing plays in this process. This white paper shares some of the key experiences of participating businesses from a wide range of industries within Australia, including retail, government, tourism and professional services.
Tags : 
disruption, netsuite, australia, underlying business models, disruption opportunities, cloud computing
    
NetSuite
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered.
Tags : 
palo alto, automated malware, security, cloud
    
Palo Alto Networks
Published By: Comcast Business     Published Date: Jul 10, 2017
The financial services industry is increasingly at a crossroads. Faced with mounting pressure from external forces, such a competition from FinTech companies and a more demanding client base, banks and financial services firms are working to become more customer-centric in their approach to business. However, the need to keep sensitive customer and business information secure and ensure compliance with government regulations can stymie those efforts. The proprietary hardware so prevalent in traditional networks can’t provide what financial institutions need; a growing number, therefore, are turning to software-defined networking (SDN).
Tags : 
financial services, sdn, increase efficiency, reducing complexity, next-generation technologies, financial benefits, security control, lower costs
    
Comcast Business
Published By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: Group M_IBM Q418     Published Date: Nov 13, 2018
Wherever an organization is in the world today, it relies on IT in its quest to drive revenues, improve profit margins, and service customers. Yet most small- to mid-sized businesses (SMBs) and government agencies select IT infrastructure solutions that drive higher costs and limit the business' ability to respond to changes in the marketplace. This is driven by perceptions that many IT executives running Linux and open source applications have regarding server platforms. Specifically, they erroneously believe that their best option is to execute the applications either on standalone or virtualized on x86 servers. RFG finds that there are 10 compelling reasons why an IBM LinuxONE solution is superior to an x86 one, including the fact that LinuxONE is a better, more economical choice.
Tags : 
    
Group M_IBM Q418
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
Local and regional governments around the world are using the cloud to transform services, improve their operations, and reach new horizons for citizen services. The Amazon Web Services (AWS) cloud enables data collection, analysis, and decision making for smarter cities. This whitepaper provides strategic considerations for local and regional governments to consider as they identify which IT systems and applications to move to the cloud. Real examples that show how cities can stop wasting money, move faster, and innovate.
Tags : 
    
Amazon Web Services EMEA
Published By: Group M_IBM Q119     Published Date: Jan 18, 2019
Wherever an organization is in the world today, it relies on IT in its quest to drive revenues, improve profit margins, and service customers. Yet most small- to mid-sized businesses (SMBs) and government agencies select IT infrastructure solutions that drive higher costs and limit the business' ability to respond to changes in the marketplace. This is driven by perceptions that many IT executives running Linux and open source applications have regarding server platforms.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Society simply must change the way it serves its most vulnerable members. Service delivery models are outdated and constrained by budgets, organizational structures and legislation. Citizens aren’t getting what they need to become more self-sufficient and recover from hard times or significant events such as disasters. Government isn’t keeping up with the demand generated by the complex times we live in and agencies are stressed to the breaking point by current service expectations. Something different must be done to generate better outcomes. This action requires better engagement between government and citizens which can lead to more self-reliant individuals and lower demands and costs on government. In California, one county is tackling this challenge head on and has found a better way to serve their citizens.
Tags : 
    
Group M_IBM Q3'19
Published By: Palo Alto Networks     Published Date: Jun 09, 2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. This attention is well-founded and marks a transition from information security being a concern primarily for businesses and governments to it being broadly acknowledged as an issue that impacts and requires the attention of everyone, from individual consumers to entire countries.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
Palo Alto Networks
Published By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
In this report 1,500 Australians describe how they currently use and rate digital public sector services across all levels of government, and what they expect from them today and into the future. The survey shows that Australians regularly engage with government through digital services, with half of respondents saying they do so on a quarterly basis, and 30 per cent accessing them fortnightly; but that the quality of the digital experience is paramount.
Tags : 
digital, experience, australia, public, sector, transition, hardware, software
    
Riverbed ANZ DWA IT Leads GTM
Published By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
What do Australians think? 1,500 Australians described how they use and rate digital public sector services across all levels of government and outlined current and future expectations for the platforms.
Tags : 
australians, confidence, experiences, public sector, improvement, government, digital
    
Riverbed ANZ DWA IT Leads GTM
Published By: BMC ESM     Published Date: Aug 19, 2009
The paper discusses the agility enabled by virtualization, the resulting control challenges, and a way to meet those challenges. It describes seven major requirements for success and reviews how the BMC/VMware approach helps IT ensure control over the virtualized data center and maintain compliance with corporate policies and government regulations.
Tags : 
bmc software, virtualization, vmware, virtualized data center
    
BMC ESM
Published By: OpenText GXS     Published Date: Apr 21, 2014
This white paper explains the role local tax compliance plays in successful supply chain management and e-business initiatives more broadly and how leading global brands and governments are addressing this need.
Tags : 
gxs, opentext, e-invoicing, invoicing, electronic invoicing, e-signatures, accounts payable, paper invoices
    
OpenText GXS
Published By: Lenovo     Published Date: Sep 16, 2014
Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OS’s that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.
Tags : 
agency it, workforce mobility, mobile productivity, cloud computing
    
Lenovo
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: Cisco     Published Date: Apr 03, 2014
The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.
Tags : 
cisco, security, firewall, global threat, trends, applications, cloud
    
Cisco
Published By: Cisco     Published Date: Apr 03, 2014
The 2014 Cisco® Annual Security Report highlights global threat trends based on real-world data, and provides insight and analysis that helps businesses and governments improve their security posturing for the future.
Tags : 
cisco, security, firewall, global threat, trends, applications, cloud
    
Cisco
Published By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : 
ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
    
NAVEX Global
Published By: Tripwire     Published Date: Feb 08, 2013
John Gilligan, former CIO of the U.S. Air Force and the U.S. Department of Energy, led the development of this document; it represents a consensus of government and nongovernment experts.
Tags : 
cyberdefender, security, federal, government, sans 20 sc, dhs, defense
    
Tripwire
Published By: Deltek - Nethawk     Published Date: Mar 05, 2013
Doing business with the government is vastly different from working in the commercial sector, this 30- minute webcast recording spells out these differences in detail.
Tags : 
government contracting, government contractors, cloud, how to
    
Deltek - Nethawk
Published By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
    
Tripp Lite
Published By: GrowthIntel     Published Date: Feb 16, 2016
Many B2B companies still select their prospects using static government data such as SIC codes, NAIC codes, and historical financial info. This is like playing Battleships with your sales and marketing budget, lobbing outbound approaches blindly over the wall in the hope of hitting potential buyers. There has to be a better way. Imagine if you could identify every business that could buy from you, and rank them by their likelihood to convert. This ebook shows you how.
Tags : 
b2b, intel, business practices, decision management
    
GrowthIntel
Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.