HIT Consultant Insightful coverage of healthcare innovation
 

issues

Results 551 - 575 of 953Sort Results By: Published Date | Title | Company Name
Published By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : 
technology, best practices, data, enterprise, business analytics, business intelligence, business management
    
Microsoft
Published By: Microsoft     Published Date: May 04, 2017
Read on to find out how predict demand, personalise your offer and pre-empt operational issues to stay ahead.
Tags : 
business analytics, business intelligence, data, marketing
    
Microsoft
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, the most common issue was the need for modern systems. The pain points most often cited were manual processes that cause mistakes and inefficiencies, integration problems with other systems (both internal and external), lack of operational insight, and legacy software support and customization issues. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to modernize your business processes and drive business success.
Tags : 
microsoft dynamics, crm, compliance
    
Microsoft Dynamics
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
    
Microsoft Office 365
Published By: Microsoft Surface     Published Date: Feb 14, 2017
Productivity remains one of the top issues facing small and medium-sized businesses (SMBs) today. And while there’s no doubting the importance of trying to get the most out of your talent, the approach many SMBs take actually has the reverse effect. This is the ‘productivity puzzle.
Tags : 
    
Microsoft Surface
Published By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI. Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills. Read the report for a full list of enterprise challenges and tips on how to address them.
Tags : 
    
MicroStrategy
Published By: MicroStrategy     Published Date: Nov 08, 2019
Gartner’s annual Predicts report is out for 2019—and it includes recommended solutions to issues like incorporating analytics into corporate strategy, measuring the value of data assets, the rapidly increasing volume of data, the lack of data literacy, and more. Some of the valuable findings include: Today, fewer than 50% of documented corporate strategies mention data and analytics as key components for delivering enterprise value, per Gartner’s “How Infosavvy Are You? Study." Organizations that fail to develop and enforce such codes of conduct are at a greater risk of liability and misuse of data science and AI. Few organizations have implemented continuous intelligence capabilities, spanning multiple applications and business functions, because they lack the relevant skills.
Tags : 
    
MicroStrategy
Published By: Microworld     Published Date: Dec 12, 2007
The Small and Medium Businesses contribute to around 68% of the world economy while making up for 80% of the employment. The security needs, issues and priorities of SMBs are different in many ways from that of large Business Houses.
Tags : 
smb, smbs, small business, soho, internet security, email security, spam, spamming, anti-spam, phishing, pharming, malware, trojan, trojans, anti-virus, virus, anti virus, spyware, anti-spyware, anti spyware
    
Microworld
Published By: Mimecast     Published Date: Sep 25, 2008
Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.
Tags : 
mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Mimecast     Published Date: Feb 05, 2010
Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg
    
Mimecast
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security
    
Mimecast
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365, extensive use of email, primary file transport, content management systems, reduced employee productivity, extended productivity loss, it disruption, security management risks, content management risks
    
Mimecast
Published By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : 
microsoft office 365, offline emails, cloud backup, email security, data in the cloud, cyber attacks
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Learn Office 365™ Migration Risks and How to Avoid a SaaS Monoculture. When considering a move to Office 365, organizations must be aware of several significant risks to their email infrastructure. The cloud may seem like a simple, cost-effective alternative to on-premises email, but continuity and security issues cannot be overlooked. Download the E-book to learn more about how to avoid cloud email headaches."
Tags : 
office 365, email security, cloud, cloud security, email infrastructure
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Although many organizations are switching email accounts to Microsoft Office 365, they may well be exposing themselves to a wide range of security risks, data loss, and business continuity issues. This white paper explores how to use Microsoft Office 365 while protecting organizations from various security risks. Discover: • What to look for in third-party solutions • How to protect archived data • How to ensure business continuity
Tags : 
office 365, security, email security, archived data
    
Mimecast
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: May 31, 2018
Not all email security systems perform the same. Lots of false negatives get through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of email security systems to uncover the number, type and severity of threats getting into organizations. - TOTAL CAUGHT SPAM: 14,277,163 - TOTAL CAUGHT DANGEROUS FILE TYPES: 9,992 - TOTAL CAUGHT MALWARE ATTACHMENTS: 12,502 Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Oct 02, 2019
By any measure, Office 365 is a success as millions of Microsoft seats transition from on-premises Exchange to a cloud-based email service as part of Office 365. While Microsoft has been offering hosted email solutions for more than 20 years, they have hit their stride with Office 365, the third major iteration of the company’s foray into hosted/cloud-based email and collaboration. This white paper discusses the key issues that decision makers need to consider as they evaluate the email, security, and resilience capabilities of Office 365. After reading this analyst perspective completed by Michael Osterman of Osterman Research, we believe you will better understand: Special considerations related to hybrid Exchange and Office 365 email deployments The importance of programmatic security efficacy rather than simple functionality How to ensure business messaging continuity in the context of Office 365 outages Whether third-party backup/recovery is critical for protecting your infrastr
Tags : 
    
Mimecast
Published By: Modis     Published Date: Mar 09, 2015
In the wake of the recent Sony data breach, customer and company privacy issues have become a hot topic in the media and the tech sector. The Sony incident and other widely covered consumer-facing data breaches experienced by Target, Home Depot, JPMorgan Chase and others have had a significant financial impact on these companies. Experts are projecting that both the number of incidents and the cost of dealing with data breaches will increase in 2015. To combat these attacks, businesses must respond with a heightened awareness of cybersecurity as well as increased spending on enterprise security as needed. Designating high level executives to lead security and hiring certified security experts are among the best practices for stronger IT security in 2015 and beyond. Download to learn more!
Tags : 
modis, security challenges, it spending, privacy concerns, cybersecurity, security experts, data breaches, consumer facing breaches
    
Modis
Published By: Motorola     Published Date: Feb 06, 2008
This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project. It then outlines how the Good™ Mobile Messaging solution addresses those key issues. Also included are includes two case studies of recent Good Technology customer deployments.
Tags : 
motorola, motorola good, mobile messaging, wireless messaging, mobile applications, wireless applications, productivity, wireless, mobile
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
Maintaining security while providing mobile workers with access to the information they need, when and where they need it, is complex. This white paper helps you understand the risks associated with mobile applications, handhelds and wireless networks—then shows you how Good Mobile Messaging helps you address these issues.
Tags : 
wireless, mobile, wireless security, mobile messaging, motorola, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
With over 13,000 employees and a large sales force spread around the world, the Gates Corporation is continuously evaluating the effectiveness of its technology services on employee productivity. In preparation for a strategic, company-wide technology initiative, the corporation's Worldwide IT Group found several issues related to mobile communications.
Tags : 
motorola, case study, motorola good
    
Motorola
Published By: Motorola Solutions     Published Date: Apr 26, 2019
The stadium had been using two-way radios to support daily operations for more than a decade — an analog-based system that was nearing end of life. The radios and the repeaters were starting to fail, creating communications gaps for employees. Being fully focused on the task at hand became challenging for employees that were concerned about the effectiveness of their radios on which they readily relied on for collaborating with other team members and addressing issues swiftly. The original system treated them well for a long time, but it came time to retire the equipment and make the move to digital.
Tags : 
    
Motorola Solutions
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.