HIT Consultant Insightful coverage of healthcare innovation
 

business risks

Results 1 - 25 of 265Sort Results By: Published Date | Title | Company Name
Published By: 5000fish, Inc     Published Date: May 13, 2012
5000fish, Inc., a cutting-edge provider of Business Intelligence software, aims to guide organizations on how they can manage their spreadsheet usage by presenting the benefits and risks of managing their business analytics using only spreadsheets.
Tags : 
    
5000fish, Inc
Published By: 8x8 Inc.     Published Date: Jun 22, 2017
Are you still using your legacy PBX? Reduce business risks when you move to the cloud. Read the whitepaper for more information.
Tags : 
pbx, private branch exchange, communications, cloud, telecommunications
    
8x8 Inc.
Published By: Accelerance     Published Date: Feb 01, 2008
Companies exploring offshore software development often find an overwhelming array of options. For example, is India the best choice? What about China, Russia or Brazil? Time, distance and language barriers also make it difficult to assess the quality of offshore developers. How can businesses reduce the risks of offshoring?
Tags : 
offshoring, vendor selection, offshore, outsource, outsourcing, india, development, developer, programming, programmer, accelerance
    
Accelerance
Published By: Aconex     Published Date: Jun 18, 2008
In the construction industry, as in business generally, risk management involves identifying risks, assessing them and then developing strategies to manage them. Organizations that manage risk well enjoy financial savings, greater productivity and service quality, improved success rates of new projects and better decision making. It is clear that, in today's complex business environment, risk factors are wide reaching, and are intrinsically linked to achieving organizational objectives.
Tags : 
risk management, collaboration, web collaboration, web-based collaboration, aconex
    
Aconex
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. Thatís because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countriesí borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : 
collaboration, social media risk and reward, retention regulations, data, business requirements
    
Actiance, Inc.
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Social Media Risks and Benefits for the Pharmaceuticals Industry Drug makers are just beginning to realize how social networks can improve business processes. Social media helps your organization share information and exchange ideas with your customers quickly, but doing so can involve considerable risk. Thatís because social media is subject to the scrutiny of regulators, legislators, and litigators. So, what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Not having technology in place to help manage these requirements and increasing risks, or doing so without careful planning, can be a costly mistake. Read this paper to gain an understanding of: What the regulatory landscape of the pharmaceuticals industry looks like What concerns you should be aware of f
Tags : 
social media, increased risks, business processes, regulatory requirements
    
Actiance, Inc.
Published By: Adobe     Published Date: Mar 21, 2017
While most business is digital, most organizations still rely on paper for the ďlast footĒ of the process: the sign-off. Continued reliance on paper-based signatures is fraught with risks, including impeding productivity, reducing visibility, hampering compliance?and diminishing the customer experience. Electronic signatures (e-signatures), which are easily implemented from the cloud, help speed up the sales process by reducing errors and bottlenecks, while also ensuring greater security and mobility.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2016
While most business is digital, and business-to-business and business-to-consumer transactions Ė and the work that supports them -- are almost entirely digitized, most organizations still rely on paper for the ďlast footĒ of the process Ė the sign-off. Continued reliance on paper-based signature is fraught with risks, including impeding productivity, reducing visibility, hampering compliance, and diminishing the customer experience. Electronic signatures (e-signatures), which are easily implemented from the cloud, help speed up the sales process by reducing errors and bottlenecks, while also ensuring greater security and mobility. Read this Forbes Insights piece to learn: ē How an easy implementation of e-signatures can improve productivity and reduce busywork for your sales team ē How improve customer experiences and ease of business with e-signatures increases the likelihood of renewal and retention ē How e-signatures easily integrate into your existing sales tools, for seamless pr
Tags : 
sales performance, e-signatures, b2b, b2c
    
Adobe
Published By: ADP     Published Date: May 02, 2018
Software, outsourcing, service bureau, ASO, PEOÖ itís little wonder the market for payroll solutions has a reputation for being confusing and hard to navigate. Where does one solution end and the other begin? And how do you know which one you need? This complexity is the reason weíve created a comparison guide. Businesses have a wide spectrum of payroll options to choose from, and there are big differences between them, so like-for-like comparisons arenít possible across categories. Before you start comparing vendors head-to-head, you need to decide which payroll style is best for you. And before you make that decision, you need to know what you want in return. Are you looking to save money? Save time? Eliminate errors? Do you want help minimizing tax compliance risks? There are plenty of options available, and they all come with different pros and cons.
Tags : 
    
ADP
Published By: ADP     Published Date: Aug 28, 2017
Many small businesses rely on owners and other employees to take on HR responsibilities in addition to their ďday jobs,Ē a role we call the ad hoc HR manager (aHRM). Although a common practice, using an aHRM can present unforeseen risks. Read the complete guide to risky ad hoc HR management to find out more.
Tags : 
    
ADP
Published By: ADP     Published Date: Oct 25, 2017
If your business relies on an owner or other employee to manage HR tasks, rather than employing a certified, dedicated HR expert, you might be experiencing some unforeseen risks, including wasted time and decreased morale. Check out the infographic to learn more about the risks of ad hoc HR management, as well as what you can do to free your company from this burden so you can focus on what you do best.
Tags : 
    
ADP
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models werenít built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency" "Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery plat
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business arenít also introducing security risks, impacting customer experience (CX), or costing more than anticipated? Thatís where Akamai comes in. This e-book explains how Akamaiís cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models werenít built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 04, 2019
Itís a bold claim; one that hasnít always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, itís that security-related incursions are inevitable. And itís news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, thereís no longer a choice. As a CIO, CISO, or other security or IT leader, you know itís your job to be the central agent stressing the connections between business and digital risk. Itís your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. Thatís up from 40% in 2018. Whether youír
Tags : 
    
Akamai Technologies
Published By: ARMA     Published Date: Nov 04, 2014
All organizations depend on information to manage day-to-day operations, comply with regulations, gauge financial performance, and monitor strategic initiatives. This critical information resides in the organization's business records. As internal auditors conduct their annual risk assessment, they should consider how well business records are managed and assess the degree to which the risks to this information are understood.
Tags : 
value proposition, financial performance, internal auditors, annual risk assessment
    
ARMA
Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust
Published By: BlackLine     Published Date: Aug 23, 2019
Accounting and finance leaders are expected to deliver accurate, compliant, and real-time analysis of their organizationís financial performance at all times. But many institutions wrestle with outdated systems and processes that donít meet the needs of todayís business. Leading organizations are transforming their finance operations to reduce compliance risks and gain greater efficiencies.
Tags : 
    
BlackLine
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
View this paper now to explore the top four security risks businesses face when using social networks. In addition, discover various ways to protect against and mitigate these risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
The report shows a link between greater autonomy and business performance. It also highlights the increasing alignment between IT and the business on the risks and benefits of providing greater technology choice for users. Highlighted findings include: ē The fastest growing companies in the world believe that greater technology choice can increase revenue and profits by more than 35 percent ē 84 percent of businesses worldwide believe that greater technology choice is crucial to driving efficiency in the future ē 72 percent of businesses see security as the biggest barrier to greater technology choice
Tags : 
technology, autonomy, business
    
Blue Coat Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.