HIT Consultant Insightful coverage of healthcare innovation
 

vendor risk

Results 1 - 25 of 43Sort Results By: Published Date | Title | Company Name
Published By: Ahead     Published Date: Jun 06, 2018
I don’t think it’s too much at all. However, I would recommend including some bullets calling out key points from the paper and a distinct call-to-action. Something like this: At the start of every year, more than 80% of your annual IT spend is likely already committed – in the form of depreciation, maintenance, and support for infrastructure – inhibiting your ability to bring new capabilities to the business. Making matters worse, these dollars often lie hidden in the form of inefficient or ill-advised software license management. If you don’t have the luxury of a mature vendor management function, you probably struggle to see the full picture of your future maintenance costs. This guide will give you the tools to assess your IT spend by identifying potential blind spots and uncovering the benefits of ELAs and TLAs. Some blind spots may include: • Limited visibility • Productivity barriers • Risk exposures Download now to learn how to formulate a plan to yield savings--savings that fa
Tags : 
    
Ahead
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365
    
Commvault
Published By: Dell EMC     Published Date: Aug 17, 2017
In a market where compute and storage resources can be bought on demand with a credit card, vendors of on-premises hardware are seeking to tip the scales in their favor with ‘cloud-like’ pricing models that eliminate the need to commit capital to new platforms. At Dell EMC World in May, Dell Financial Services (DFS) rolled out Cloud Flex for HCI (hyperconverged infrastructure), part of the company’s push to evangelize the start-small-and-scale-up virtues of HCI technology. Cloud Flex lets customers acquire equipment on an all-opex basis, with no up-front product cost, steady monthly payments that reduce by up to 30% annually, and the ability to turn in equipment any time after 12 months without penalty. It’s part of a series of moves by Dell EMC meant to ease the financial risk of sticking with on-premises infrastructure in a cloud-enabled world
Tags : 
storage resources, hyperconverged appliance, hyperconverged infrastructure, cloud, cloud pricing model
    
Dell EMC
Published By: BitSight Technologies     Published Date: Aug 02, 2016
Organizations today aren’t just single entities—they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more vulnerable to exposure from bad actors. Because of this, vendor risk management (VRM) is a critical business practice.
Tags : 
    
BitSight Technologies
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST
Published By: Epicor Software Corporation     Published Date: Nov 03, 2016
Whatever your growth ambitions, the chances of achieving them are increased with effective planning. Download this eBook to learn about the five key factors that can help grow your business quickly, efficiently, and profitably.
Tags : 
erp, erp system, enterprise resource planning, manufacturing, growth, profitability, supply chain, scm, customer support, erp vendor, finance software, manufacturing software, make to order, mto, mrp, minimising risk, ebook
    
Epicor Software Corporation
Published By: NAVEX Global     Published Date: Jul 17, 2017
Screening your third party vendors and business partners for risk can be a challenging process. With so many different factors to consider, where do you even begin? We've developed our Anti-Bribery and Corruption Risk Assessment Checklist so you can streamline your compliance risk assessment processes and ensure each potential risk is addressed. Keep up with changing European laws and regulations with this checklist.
Tags : 
training, communication, culture, controls, oversight, policies, risk assessment
    
NAVEX Global
Published By: Pure Storage     Published Date: Mar 17, 2017
I&O leaders can no longer rely on the assumption that it is safer to buy from established storage vendors when compared to new suppliers. This research describes what I&O leaders must do to benefit from structural changes in the storage industry.
Tags : 
    
Pure Storage
Published By: KPMG     Published Date: Jul 12, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now
Tags : 
    
KPMG
Published By: NAVEX Global     Published Date: Jul 02, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions now business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
diligence systems, risk management solutions, integrated due diligence, compliance
    
NAVEX Global
Published By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
    
Delphix
Published By: Rimini Street, Inc.     Published Date: Oct 07, 2015
Cancelling the ERP vendor's maintenance agreement isn't right for everyone. The options for replacing the vendor's support need to be understood to ensure there is an independent support option that satisfies the enterprise's needs within a tolerable level of risk. However, cancelling can play an important role in enabling an enterprise to run current mature application releases more cost-effectively, shift funds to business growth initiatives, and position itself flexibly for the best-fit future application platform. Download this Gartner report to learn more about what to consider before cancelling your ERP Vendor's Maintenance Agreement and Switching to Third-Party Support.
Tags : 
    
Rimini Street, Inc.
Published By: NAVEX Global     Published Date: Mar 18, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
    
NAVEX Global
Published By: Red Hat     Published Date: Dec 27, 2012
Read this white paper to learn about selecting a suitable platform for server virtualization to critical to the overall success of any virtualization or private cloud project. In the past few years, new technologies and approaches enhanced business.
Tags : 
virtualization, success, dual vendor, de-risk, vendors, red hat
    
Red Hat
Published By: ADP     Published Date: May 02, 2018
Software, outsourcing, service bureau, ASO, PEO… it’s little wonder the market for payroll solutions has a reputation for being confusing and hard to navigate. Where does one solution end and the other begin? And how do you know which one you need? This complexity is the reason we’ve created a comparison guide. Businesses have a wide spectrum of payroll options to choose from, and there are big differences between them, so like-for-like comparisons aren’t possible across categories. Before you start comparing vendors head-to-head, you need to decide which payroll style is best for you. And before you make that decision, you need to know what you want in return. Are you looking to save money? Save time? Eliminate errors? Do you want help minimizing tax compliance risks? There are plenty of options available, and they all come with different pros and cons.
Tags : 
    
ADP
Published By: Rsam     Published Date: Apr 28, 2016
Healthcare enterprises are under more scrutiny than ever to demonstrate compliance. With more than 5,000 suppliers, this FORTUNE 50 company needed to automate and streamline their vendor risk management program. Learn why they selected Rsam and the results of their successful implementation.
Tags : 
rsam, fortune 500, vendor risk management, healthcare enterprise, compliance
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Join Rsam and Tom Garrubba, the Senior Director of Shared Assessments, as they discuss how to develop a game plan for vendor risk that aligns with OCC 2013-29.
Tags : 
rsam, occ, vendor risk, risk management
    
Rsam
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management, datacenter management, axeda, high availability, spend management
    
Axeda Corporation
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa
Published By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : 
mssps, managed security service, security challenges, security professionals
    
SilverSky
Published By: RingCentral     Published Date: May 22, 2014
As a purchasing executive or vendor management professional, your goal is to balance business value, cost and associated risks when sourcing and managing technology vendors. Download this whitepaper and learn: • To identify internal drivers that shape sourcing strategies • Best practices for developing a new T&M sourcing strategy • 5 key sourcing and vendor management activities that strengthen your sourcing strategy
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : 
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : 
    
BitSight Technologies
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.