HIT Consultant Insightful coverage of healthcare innovation
 

visa

Results 26 - 46 of 46Sort Results By: Published Date | Title | Company Name
Published By: Corvisa LLC     Published Date: Feb 13, 2015
Growing numbers of businesses are moving their contact center operations to the cloud. What do they know that you don’t? This whitepaper provides a practical guide to assist in the decision-making process. It offers a comparison of traditional on-premise systems versus current cloud-based solutions, responds to common cloud concerns and discusses the steps needed to begin your due diligence process.
Tags : 
cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics
    
Corvisa LLC
Published By: Corvisa LLC     Published Date: Feb 13, 2015
Are any of these dynamics driving you to the cloud?
Tags : 
cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics, cloud communications
    
Corvisa LLC
Published By: Corvisa LLC     Published Date: Feb 13, 2015
This whitepaper presents new study findings on current consumer hot buttons, identifies what’s still broken when it comes to customer service, and highlights the industries and businesses that know how to get it right.
Tags : 
customer interaction, contact center, customer service, customer satisfaction
    
Corvisa LLC
Published By: Corvisa LLC     Published Date: Feb 13, 2015
Is your contact center guilty?
Tags : 
contact centers, customer experience, vices, the cloud, cloud-based provider, customer interaction, engagement solutions
    
Corvisa LLC
Published By: VISANOW     Published Date: Jan 05, 2016
The talent gap is widening worldwide, and the H-1B and other work visas are increasingly critical to continued growth and innovation.
Tags : 
    
VISANOW
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : 
pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware
    
NeoSpire Managed Hosting
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper contains 12 PCI DSS requirements that have been organized into six (6) logically related groups.
Tags : 
gfi software, sunbelt, pci-dss compliance, data security, american express, discover financial services, jcb international, mastercard worldwide
    
GFI Software
Published By: Group M_IBM Q3'19     Published Date: Jul 30, 2019
Some technologies cause ripples, others cause waves of transformation. Artifical Intelligence (AI) is prehaps the most transformative of ur era. Read this paper to learn how AI can help you transform your business and B2B network so that you can build a business network for the future. Discover three ways you can apply AI--today--to build a modern, faster, more efficient B2B network: Access detailed, real-time transactional intelligence across your business Gain in-depth, real-time visability into supplier and partner performance Empower supply chain and LOB users with self-service
Tags : 
    
Group M_IBM Q3'19
Published By: SAS     Published Date: Apr 25, 2017
Are you a marketing leader on the path to modernizing your marketing organization? Are you a marketing analyst championing analytical transformation in your campaigns? If you answered yes to either question, this e-book is for you. It offers a practical account of how to create a new marketing culture that adds value through data and analytics. You’ll meet marketing leaders from Comerica, Lenovo, RCI, SAS and Visa – and read how they’re implementing analytics, redefining marketing strategies and transforming their cultures. By sharing their perspectives, we hope to provide a new set of best practices to guide your analytical transformation – and to help you reinvent your marketing organization for the digital age.
Tags : 
    
SAS
Published By: Symantec     Published Date: Nov 30, 2015
Que vous soyez un particulier ou une entreprise, vous devez envisager la sécurité des communications en ligne de la même manière que la sécurité physique de votre domicile ou de vos locaux. Non seulement vous vous sentirez plus en sécurité, mais vous protégerez les personnes qui visitent votre domicile, vos locaux, ou votre site Web. Il est essentiel que vous compreniez bien les risques potentiels, puis que vous vous assuriez que vous êtes intégralement protégé contre ceux-ci. Dans le monde en évolution rapide des technologies informatiques, il n'est pas toujours facile de se tenir au courant des toutes dernières avancées. Pour cette raison, il peut être sage de s'associer à une société de solutions de sécurité Internet possédant une solide réputation.
Tags : 
    
Symantec
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: European Medical Staffing     Published Date: Oct 27, 2010
A perspective on current visa options for international nurses
Tags : 
visa options for international nurses
    
European Medical Staffing
Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global
Published By: CA Technologies     Published Date: Aug 10, 2015
As organizações ágeis de hoje delegam às equipes de operações um tremendo desafio: implementar novas versões em produção imediatamente depois de completar o desenvolvimento e a prova. Para garantir a implementação exitosa dos aplicativos, se requer um processo automático e transparente. Este proceso é conhecido como Zero Touch Deployment™. Este white paper revisa os dois enfoques de Zero Touch Deployment: uma solução baseada em scripts e uma plataforma de automatização da implementação. O artigo explica como cada um pode resolver os principais desafios tecnológicos e organizacionais que enfrentam as organizações ágeis quando elas se dispõem a por em prática um sistema de implementação automática.
Tags : 
    
CA Technologies
Published By: VMware AirWatch     Published Date: Nov 13, 2015
Lors du discours d’ouverture du WWDC 2014, Craig Federighi, vice-président de l’ingénierie logicielle chez Apple a qualifié iOS de “succès majeur pour l’entreprise”, soulignant l’importance du développement des applications entreprise adaptées à iOS ainsi que des fonctionnalités de gestion d’entreprise ajoutées au système d’exploitation chaque année. Federighi a également évoqué les nouvelles fonctions de productivité qui feront de Mac OS X Yosemite une plateforme de gestion des ordinateurs de bureau efficace et attrayante pour les utilisateurs. Comme Federighi l’a indiqué, 98% des entreprises du Fortune 500 utilisent déjà iOS et Apple continue depuis ces dernières années de regrouper les fonctionnalités visant directement le marché d’entreprises pour les deux systèmes d’exploitation. Les dernières mises à jour des logiciels Apple, iOS 8 et Mac OS X Yosemite, ont présenté de nouvelles fonctionnalités qui simplifient à la fois la gestion et l’utilisation des terminaux dans l’entreprise.
Tags : 
vmware, emm, mac management, managing macs, airwatch
    
VMware AirWatch
Published By: VISANOW     Published Date: Feb 10, 2016
This paper explores why the visa immigration process is ripe for disruption and how integrating—not replacing—legal experience with technology can help human resources play a leading role in helping their companies innovate and grow.
Tags : 
    
VISANOW
Published By: Envoy Global     Published Date: Jan 11, 2018
xxx
Tags : 
    
Envoy Global
Published By: Workday France     Published Date: Mar 08, 2018
L'objet de ce livre blanc est de définir plus précisément les objectifs du modèle SaaS, son fonctionnement et ce qu’il importe d’évaluer lorsqu’on envisage d’adopter des solutions SaaS.
Tags : 
    
Workday France
Published By: PGi     Published Date: Jan 24, 2019
Vous n’envisageriez pas une conversation téléphonique cruciale avec un investisseur, un événement clients ou une réunion avec une partie prenante qui aurait lieu dans l’aire ouverte de votre bureau. Alors pourquoi organiseriez-vous un évènement virtuel important sur une plateforme dont les caractéristiques favorisent la collaboration et le travail en équipe pour un petit groupe ?
Tags : 
    
PGi
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.