HIT Consultant Insightful coverage of healthcare innovation
 

file management

Results 1 - 25 of 154Sort Results By: Published Date | Title | Company Name
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
    
123Together
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management, email security
    
Aberdeen - youSENDit
Published By: Adobe     Published Date: Feb 20, 2014
San Diego County District Attorney’s Office accelerates Juvenile Court proceedings using Adobe® Acrobat® Pro in Microsoft SharePoint environment.
Tags : 
adobe, adobe acrobat pro, file management, software, data management, electronic documentation, paperless processing, pdf documents
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
The City of Almere in the Netherlands uses Adobe® Acrobat® Pro to enhance collaboration among officials and improve the delivery of government services to citizens.
Tags : 
adobe, adobe acrobat pro, software, collaboration, streamlining, productivity, file management, document management
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
Gain more efficient ways of working with documents and collaborating with others on them.
Tags : 
adobe, adobe acrobat pro, microsoft applications, collaboration, merging documents, editing documents, pdf to office format, file formatting
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
Award-winning design practice advances architecture, interior design, and planning excellence by standardizing on Adobe Creative Cloud and Adobe Acrobat® Pro.
Tags : 
adobe, adobe creative cloud, software, software deployment, enterprise agreement, license management, document security, compliance
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.
Tags : 
adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment
    
Adobe
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: Attachmate     Published Date: Mar 20, 2013
This whitepaper discusses the critical importance of finding a better alternative to email as a file-sharing mechanism. It also provides information on the sponsor of this white paper – Attachmate – and its relevant solutions.
Tags : 
download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security
    
Attachmate
Published By: Attachmate     Published Date: Jul 09, 2013
Is your file transfer system keeping up with growing trading-partner requirements? Can it accommodate multiple platforms, protocols, and security standards? Can it successfully deliver large files, to the right person, on time? If uncertainty is part of your daily routine, you need to see this video.
Tags : 
download ftp program, secure ftp, secure large file transfer, managed file transfer, ftp automation, managed ftp reflection ftp client, file transfer software, file transfer management
    
Attachmate
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management
    
Attachmate
Published By: Availity     Published Date: Aug 08, 2013
Asheville Anesthesia Associates faced a growing accounts receivable file and a payment collection process that was too slow. Learn how they used RealMed (now known as Availity Revenue Cycle Management) to reduce time-to-payment by 75 percent, and reduce their average days in A/R by 62.5 percent.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield
    
Availity
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security
    
Avalere
Published By: BambooHR - HR Software     Published Date: May 28, 2013
HR’s role varies from cheerleader to counselor to Chief Culture Officer- we get it! Tracking employee data in spreadsheets is a headache you don’t have time for, we make it simple- to free you up for more meaningful work. Watch the webinar!
Tags : 
hris, human resources, employee data, talent management, pto, time off management, hr software, employee management
    
BambooHR - HR Software
Published By: BeyondTrust     Published Date: Sep 24, 2019
HOW TO USE THIS BUYER’S GUIDE Today, privileges are built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, robotic automation processes, and more. Cybercriminals covet privileges/privileged access because it can expedite access to an organization’s most sensitive targets. With privileged credentials and access in their clutches, a cyberattacker or piece of malware essentially becomes an “insider”.
Tags : 
    
BeyondTrust
Published By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : 
bitgravity, video delivery, legacy cdns, network architecture, internet video, file management, total cost ownership, proxy cache
    
BitGravity
Published By: BlackBerry     Published Date: Oct 03, 2012
Many businesses are tasked with the challenge of getting the most current collateral to their mobile workforce, efficiently and securely. That's why Box Inc. developed Box for the BlackBerry PlayBook tablet (Box App).
Tags : 
file management, blackberry, tablet, cloud computing, mobile computing, application development, cloud based content management system, cms
    
BlackBerry
Published By: BMC     Published Date: Sep 11, 2012
Industrializing IT Workload Automation," Forrester Consulting and BMC Software analyze the results of a comprehensive survey that addressed job scheduling on the ground today.
Tags : 
job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
    
BMC
Published By: BMC     Published Date: Sep 11, 2012
Hear VPs from Forrester Research and BMC Software discuss the results of our 2012 job scheduling survey in "Workload Automation Survey Results: Peer Insights and Expert Analysis.
Tags : 
job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
    
BMC
Published By: BMC     Published Date: Sep 11, 2012
Visit the IDC iView interactive library to get the analyst's take on how self service for workload automation can contain costs and improve service.
Tags : 
job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
    
BMC
Published By: Box     Published Date: May 30, 2012
This report analyzes the longer-term, five-year cost of ownership and value for cloud applications across four categories: CRM, ERP, collaboration (including email), and IT service management.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools
    
Box
Published By: Box     Published Date: May 31, 2012
Here's how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments - with the help of Box.
Tags : 
mobile, mobile worker, communication devices, free online storage, online storage, file sharing, online file storage, share files online
    
Box
Published By: Box     Published Date: May 31, 2012
Read how one company's continuing consolidation of file sharing technologies reaped benefits that any organization may derive by undertaking that effort.
Tags : 
sharing, dow, free online storage, online storage, file sharing, online file storage, share files online, store documents online
    
Box
Published By: Box     Published Date: May 31, 2012
This Gilbane Group Beacon examines how large-­scale trends are changing enterprise collaboration and content sharing expectations. It defines Cloud Content Management, an emerging set of content management practices.
Tags : 
cloud, content management, active control, collaboration, sharing, content sharing, free online storage, online storage
    
Box
Published By: Box     Published Date: May 31, 2012
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors, highlighting market information tailored to investment.
Tags : 
content, cloud, collboration, enterprises, free online storage, online storage, file sharing, online file storage
    
Box
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.