HIT Consultant Insightful coverage of healthcare innovation
 

requirements

Results 476 - 500 of 1380Sort Results By: Published Date | Title | Company Name
Published By: Extreme Networks     Published Date: Feb 20, 2015
Download this whitepaper to learn key concepts for designing a standards-based data center fabric to meet the requirements of today and tomorrow.
Tags : 
data center networking, standards-based data center, vendor-specific training, it solutions
    
Extreme Networks
Published By: F5 Networks     Published Date: Mar 18, 2015
Read this whitepaper to learn how applications are driving new requirements for both businesses and networks that require disruptive, radical change.
Tags : 
f5 networks, sdn, network operations, cloud apps, server applications
    
F5 Networks
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Organizations are increasingly adopting a hybrid cloud computing strategy to realize the benefits without compromising on security and control. The integration at the network, infrastructure, and process layers that is required by hybrid models can be addressed by three new cloud-focused solution types: bridges, brokers, and gateways. This paper gives you the insight you need to better understand which architectural approach will meet your requirements and expectations.
Tags : 
cloud, data centers, cloud computing, bridges, brokers, gateways, network, infrastructure
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 20, 2014
Read this whitepaper to learn more about how SDNs can deliver the benefits at enterprise scale.
Tags : 
f5 networks, software-defined networking, sdn, application delivery, networking technology, deployment, operationalizing, enterprise requirements
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Nov 05, 2014
The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources-combined with increased mobility of apps migrating to the cloud and users across multiple devices. As an approach to operationalizing the network, SDN enables organizations to achieve greater economies of operational scale through the use of APIs to automate and orchestrate the network, as well as the application services that support applications. Read this whitepaper to learn how applications are driving new requirements for both businesses and networks that require disruptive, radical change.
Tags : 
sdn, network transformation, modern networks, application resources, cloud migration
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Dec 22, 2014
The new requirements for application delivery mean adopting the principles behind cloud, DevOps, and SDN, and enabling emerging security models. Now you must provision apps in minutes instead of months, and with significantly reduced operational costs. Read this whitepaper to learn how you can manage every delivery aspect of users, applications, systems and infrastructure with an elastic, dynamic infrastructure designed to support these requirements.
Tags : 
application delivery, cloud, devops, sdn, operational costs
    
F5 Networks Inc
Published By: FICO EMEA     Published Date: Jan 25, 2019
As telecom markets become more saturated and competitive, your customer decisions must become more precise. As regulatory oversight expands, they must be demonstrably fair to consumers and explainable to regulators. Across the credit lifecycle, these more targeted decisions should be aligned with regulatory requirements. Download the Product Sheet and help your company drive performance improvements by making predictably, consistently better decisions across your credit lifecycle.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA
Published By: First Advantage     Published Date: Apr 30, 2018
If you’re reading this ebook, you get it. Organizations like yours know that background screening is becoming a service without borders. You simply must screen the people who work for your organization, no matter where they’re from or where they work, or you risk the integrity and worldwide credibility of your company. Global screening can be very different from U.S. background screening. Availability of information, and the time and requirements to conduct the searches are different than what is standard in the U.S. That complexity is what drove the development of this eBook.
Tags : 
    
First Advantage
Published By: Fiserv     Published Date: Sep 14, 2017
Global anti-money laundering (AML) standards have long required that understanding beneficial ownership be a part of a financial institution’s AML program. Beneficial ownership outlines the identity of individuals with a controlling interest in a privately held company, enabling a financial institution to understand the ultimate beneficiary of a financial transaction. Identifying beneficial ownership can be a complex process, but it’s one that institutions must conquer if they are to remain in compliance with industry rules and legislation.
Tags : 
anti-money laundering, aml, aml software, anti-money laundering software, beneficial ownership, risk management, aml requirements, complex ownership structures
    
Fiserv
Published By: Fiserv     Published Date: Nov 06, 2017
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen.
Tags : 
automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for financial institutions and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : 
automated reconciliation, automated reconciliation for banks, automated certification, automated certification for banks, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : 
automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: Flexential     Published Date: Jul 17, 2019
The hybrid cloud has arrived for the enterprise, but it comes with a complication: the speed of light. Between the cloud and the end user (including IoT devices that count as ‘users’), there is an emerging need for an intermediate environment that can satisfy real-time compute requirements without incurring the latency of reaching all the way to the cloud. ‘Edge compute’ is the phrase used to describe what covers this middle ground, but the optimal location for edge compute resources remains open to question.
Tags : 
    
Flexential
Published By: Flexential     Published Date: Oct 11, 2019
Enterprises that put all of their workloads into a single infrastructure solution such as public clouds are realizing there are limitations. As requirements around security, compliance and cost management grow, businesses are “boomeranging” back to hybrid IT models.
Tags : 
    
Flexential
Published By: Forcepoint     Published Date: May 14, 2019
The EU General Data Protection Regulation (GDPR) is not in effect, requiring global organizations to significantly address how they process and protect the personal data of EU citizens. Yet, Gartner predicted, “Less than 50% of all organizations impacted will fully comply with GDPR.”* Confused about the requirements and what next steps to take? Read our GDPR eBook to learn about the regulation and its key requirements. *Gartner, GDPR Clarity: 19 Frequently Asked Questions Answered, by Bart Wilemsen, 29 August 2017
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Oct 02, 2019
Would you like a live demonstration of the Forcepoint product portfolio, tailored to your security questions and requirements? Our representatives can show you the capabilities of the most appropriate product(s) for your situation, answer your questions and provide additional material to support your research. If you would like a live demonstration, please fill in the form opposite and one of our representatives will contact you shortly to discuss your requirement.
Tags : 
    
Forcepoint
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
    
ForeScout
Published By: Fortinet     Published Date: Feb 04, 2014
Next Generation Firewall (NGFW). It seems every IT Security expert is talking about them, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final deployment.
Tags : 
ngfw, next generation firewall, fortinet
    
Fortinet
Published By: Fortinet, Inc     Published Date: Nov 14, 2013
This paper discusses the capacity of Fortinet’s high performance, high capacity data center solution with the ability to eliminate bottlenecks and meet unique requirements.
Tags : 
data center, asic, low latency, firewall, fortinet, palo alto networks, cisco, juniper
    
Fortinet, Inc
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
Tighter security requirements and ever-faster networks are placing extraordinary demands on UTM platforms. In order to accelerate network traffic while blocking new threats, enterprises must deploy specialized hardware/software security devices.
Tags : 
fortinet, utm platform, unified threat management, network security, ssl vpn, ipv6, network performance management, security content
    
Fortinet, Inc.
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : 
fortrust, compliance, pci compliance, hipaa
    
FORTRUST
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : 
fortrust, compliance, pci compliance, hipaa
    
FORTRUST
Published By: Frontier Communications     Published Date: Dec 22, 2016
When you choose Frontier as your partner, your bank or financial services firm can take advantage of this experience and our extensive portfolio of network and equipment solutions. We will work closely with your team to assess your current situation, determine future communications requirements, and select products and services that fit into your timeframe and budget. What’s more, Frontier backs everything up with local customer support.
Tags : 
    
Frontier Communications
Published By: Frontier Communications     Published Date: May 01, 2017
When you choose Frontier as your partner, your bank or financial services firm can take advantage of this experience and our extensive portfolio of network and equipment solutions. We will work closely with your team to assess your current situation, determine future communications requirements, and select products and services that fit into your timeframe and budget. What’s more, Frontier backs everything up with local customer support.
Tags : 
    
Frontier Communications
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.