HIT Consultant Insightful coverage of healthcare innovation
 

intentional

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: Cherwell Software     Published Date: Apr 07, 2016
Curves® and Jenny Craig® operate 7,000 Curves clubs and franchises globally and 400 Jenny Craig locations supported by IT service desks in California, Texas, and Australia. The two organizations combined to form Curves Jenny Craig in November 2013. Outdated systems, known internally as “the black hole,” plagued Jenny Craig with inefficient processes and created a lack of accountability. For example, records could not be categorized or prioritized properly, tracked by date or owner, and they could be intentionally hidden in an ambiguous status. Without visibility, Jenny Craig had no way to quantify the impact of their customer service. Mary Carter, manager of IT service, summed it up, “We had no reporting prior Cherwell Service Management.” Curves was in even worse shape as they logged tickets in an Excel® spreadsheet.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Clicktale     Published Date: Sep 26, 2016
In this third paper of the Clicktale Psychology and Customer Experience Series, we examine how retailers can identify intentionality of shopper behavior and differentiate between goal-oriented buyers and casual browsers. Learn how to increase conversions by building diverse purchase paths for your diverse visitors.
Tags : 
clicktale, psychology, customer experience, shopper behavior, conversions, purchase paths
    
Clicktale
Published By: Concur     Published Date: Dec 06, 2012
A straightforward guide that covers what expenses fraud is, what it costs the UK, whether you should be concerned, and what you can do about it.
Tags : 
expenses, fraud, criminal, intentional
    
Concur
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
    
Microsoft Office 365
Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control
    
Netwrix
Published By: Oracle Social Cloud     Published Date: Feb 17, 2015
Last year's Super Bowl was disappointing on every level and simply could not live up to the hype. 2015 could not have provided a more opposite result. This was the year of the emotional rollercoaster. NBC is known for their heartfelt sports coverage and has mastered the art of storytelling, all on full display for Sunday's game. The network leveraged all their best tactics with outstanding results. The game was high drama at its best and kept the audience engaged to the very end. Brands had serious competition from the games itself this year, but brought their own flood of emotions with some familiar storylines that garnered significant social conversation volume to very unexpected commercials eliciting strong negative feedback. In this analysis we will examine how brands used social media to continue the conversation, leverage assets and advocates, and even create intentional mistakes to earn attention.
Tags : 
oracle, brand strategy, super bowl, social media strategy, engagement, continuing the conversation
    
Oracle Social Cloud
Published By: Red Hat     Published Date: Jan 02, 2018
Once upon a time, several generations ago (in technology years), IT departments were internal departments, focused on maintaining infrastructure and services within the company. Some companies may have had external-facing services, particularly web services, but this was still generally a narrow and restricted area. IT wasn’t a revenue-generating or strategic department; it was a supporting environment viewed as a cost center. One of the outcomes of an infrastructure-focused environment is that developers lost a sense of what their code was doing. Release cycles were long, and changes were slow. A developer would work on something and throw the code into testing or operations, and it would be released months later. Because of that long lead time, engineers lost the joy of being a developer—of creating something and seeing it work in real life. One of the great, powerful changes with digital transformation and related cultural and technology changes like DevOps is that it reintroduce
Tags : 
    
Red Hat
Published By: Resource     Published Date: Dec 04, 2018
What’s a common characteristic of the best talent? They all have jobs. In today’s marketplace, to get the best talent you have to convince them your opportunity is better than what they currently have. The good news: it can be done - and you can win consistently with a deliberate outbound process. The bad news: it requires an intentional approach which is challenging without the right tools and data. Your success depends on your ability to build a repeatable process to identify and recruit a steady volume of high quality applicants. The way to accelerate and scale your outbound process is to benchmark and refine it regularly using data. Below we’ll walk through the steps to building a data-driven recruiting process, based on.. you guessed it.. data.
Tags : 
    
Resource
Published By: Singularity University     Published Date: Oct 20, 2017
As the rate of business change continues to accelerate, organizations need new strategies to enable exponential growth and impact. Watch Patrick van der Pijl, one of the world’s leading experts on business model innovation, share how he has helped leaders at hundreds of organizations to become more strategic and intentional about their business models.
Tags : 
    
Singularity University
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Websense     Published Date: Apr 16, 2010
Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing, secure gateways
    
Websense
Search      

Add Research

Get your company's research in the hands of targeted business professionals.