HIT Consultant Insightful coverage of healthcare innovation
 

industry standard

Results 101 - 125 of 145Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: Automation Anywhere     Published Date: Feb 21, 2019
Robotic Process Automation was born with the vision of empowering business users to create software bots that could interact with enterprise systems just like humans. Its benefits include substantial time and cost savings, improved customer satisfaction, increased workforce morale, and the ability to build a competitive advantage over competitors. But to fully realize all these benefits, it’s important for businesses to select a solution with a robust RPA security architecture that supports core principles, such as least privileges and separation of duties while delivering end-to-end protection for the critical apps and sensitive data involved. This paper provides an overview of the industry’s highest standard for enterprise-grade security as demonstrated by the market’s leading Digital Workforce platform, Automation Anywhere Enterprise.
Tags : 
    
Automation Anywhere
Published By: Lucidchart     Published Date: May 16, 2019
The sales industry has changed dramatically. Because prospects are more informed and more people (6.8, on average) have to sign off on a single purchase, sales reps have may find it difficult to close deals on their own. Cue the deal review. When executed correctly, deal reviews give sales reps that support they need—these meetings bring cross-functional teams together and leverage everyone’s experience and connections to move the account forward and shorten the sales cycle. When executed poorly, deal reviews reveal no new insights and waste time better spent on revenue-generating activities. In this e-book, you’ll learn how to standardize your deal reviews so they are efficient and insightful every time. Apply these strategies to: Quickly bring everyone up to speed on a deal’s status. Ensure that sales reps consistently provide the right information. Make sales reps more accountable for action items agreed upon in the deal review. Leverage executive connections.
Tags : 
    
Lucidchart
Published By: AlienVault     Published Date: Oct 21, 2014
The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.
Tags : 
communication, government, reducing cost, digital, network, public sector, logical, industry, standards, performance, security, management, unified, solution
    
AlienVault
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking
    
Quocirca
Published By: Cisco     Published Date: Jul 11, 2016
Customer Name: Stanley Black & Decker, Inc. Industry: Manufacturing Location: Reynosa, Mexico Number of Employees: 52,000 worldwide Challenges: • Transparency of real-time production to schedule • Actual labor costs exceeding standard costs • Understanding effects of shift changes and resource shifts from line to line • Visibility to real-time overall equipment effectiveness and line productivity and reducing production line change over time
Tags : 
    
Cisco
Published By: distilnetworks     Published Date: Jun 13, 2014
In the 2014 Annual Bad Bot Report, Distil Networks identifies the trends and changes of bad bot activity over the past year. This report serves as the industry standard of defining malicious attacks and reporting on bad bot origins and makeup to help organizations prepare for, and mitigate, this rapidly accelerating security threat.
Tags : 
block bot, block bots, data protection, distil networks, online trust, prevent web scraping, price scraping, web scraping
    
distilnetworks
Published By: IBM     Published Date: May 02, 2014
This paper introduces you to Big SQL, answering many of the common questions that relational database management system (DBMS) users have about this IBM technology.
Tags : 
ibm, big data, big sql, querying data, database management technology, apache hadoop, data administrators, infosphere, biginsights, industry-standard sql, management systems, database metadata, application programming interfaces, api
    
IBM
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA API Management is a robust, enterprise-grade solution that can enable the success of your API initiatives. The software provides industry-leading tools to rapidly create APIs from existing data assets, orchestrate legacy services and safely expose enterprise applications and services. The solution also allows you to quickly onboard, manage and enable the developers who will create innovative apps that add value to your business. And, just as importantly, CA API Management secures your enterprise data to meet the toughest compliance and regulatory standards, while providing you with full control over which apps, developers and partners can access your APIs.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Monotype     Published Date: Aug 24, 2016
The world of digital advertising is changing—HTML5 has replaced Flash as the industry standard for digital ads. Find out how this change benefits your workflow, branding, and—most importantly—your customers. In this eBook, you’ll learn what HTML5 is and how it differs from Flash, how you can use HTML5 to make better ads, and why you need to get on board with HTML5 now.
Tags : 
digital advertising, html5, flash, monotype, web fonts, internet marketing, targeting, branding, end of flash, user experience, marketing best practices, banner ads, marketing, emerging marketing, display advertising, design, creative, responsive ads, dynamic ads, mobile ads
    
Monotype
Published By: IBM     Published Date: May 28, 2014
The ability to keep pace with trends like big data, open data, sophisticated analytics, and the de-compartmentalization of data silos and processes, distinguishes leading master data management (MDM) solutions from their counterparts. IBM, one of the five vendors in this evaluation, is positioned as THE leader with the most prominent, widely implemented solution in the market.
Tags : 
ibm, forrester, master data management, big data, database management technology, data administrators, infosphere, biginsights, industry-standard sql, management systems, database metadata, application programming interfaces, api, data persistence, virtualize data, lifecycle management, big data strategy
    
IBM
Published By: IBM Corporation     Published Date: Jun 09, 2011
Get a clear understanding of the ways DAM technology is being consolidated and integrated enabling security professionals and database managers to make strategic and tactical deployment decisions more effectively.
Tags : 
ibm, guardium, database activity monitoring, dam, pci-dss, data protection, hipaa
    
IBM Corporation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Automation and gold have much in common. One of the most coveted materials in the world, gold isn’t just beautiful – it has a wide array of uses within industry. ’Au’ is of course the first two letters of automation! Automation is the gold of the software world. It’s the backbone of modern business, enabling communication and orchestration between components. As the only company with a dedicated automation team, at CA Technologies, we set the Automation Gold Standard. With that in mind, this is our Golden Book of Automation.
Tags : 
    
CA Technologies_Business_Automation
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies
Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce
Published By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Fault Tolerant is a pretty common term in the world of IT, also an often misused and misleading term.  For 3 decades, Stratus Technologies has been engineering and manufacturing purpose built Fault Tolerant solutions. Check out this short video to understand what it takes to be REAL Fault Tolerant.
Tags : 
stratus, virtualization, fault tolerance, real fault, it management, industry standard components, disaster prevention
    
Stratus Technologies
Published By: Butler Technologies     Published Date: Jul 03, 2018
Industry standards have been established to ensure performance, consistency, and interoperability between network equipment vendors. However, the consistent implementation and operation of these standards become even more critical as speeds and bandwidth increase. At the fiber infrastructure level, this also means more testing may be needed beyond the basic fiber end-face inspection certification and Tier 1 testing. This white paper explores Tier 2 optical time domain reflectometer (OTDR) testing and examines its relationship to Tier 1 testing and how inspection plays into both. This paper defines Tier 2 testing and explains when it is needed. It also addresses the OTDR complexity argument.
Tags : 
    
Butler Technologies
Published By: Quantcast     Published Date: Feb 19, 2014
In 2012, 1.8 trillion display ads were paid for, but not seen. For advertisers looking for results, this is an unnecessary waste of effort and budget! Thankfully the industry is rallying towards a viewability standard, signaling a new wave of accountability for publishers, advertisers and ad vendors. As advertisers embrace viewability, they can benefit from knowing that their ads are seen, eliminating waste, and increasing campaign accountability and effectiveness.
Tags : 
quantcast, viewability, advertising, display advertising, advertising solutions, vendors, publishers, cpm, impressions, online advertising, branding, attribution
    
Quantcast
Published By: Quantcast     Published Date: Feb 13, 2015
In 2012, 1.8 trillion display ads were paid for, but not seen. For advertisers looking for results, this is an unnecessary waste of effort and budget! Thankfully the industry is rallying towards a viewability standard, signaling a new wave of accountability for publishers, advertisers and ad vendors. As advertisers embrace viewability, they can benefit from knowing that their ads are seen, eliminating waste, and increasing campaign accountability and effectiveness. We conducted our own research and found that viewability is becoming a reality for improved campaign performance.
Tags : 
display advertising, display viewability, advertising ecosystem
    
Quantcast
Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is the best strategic option for meeting your organization’s demands for increased efficiency and agility while leveraging existing apps and data. HCI is a scale-out software-defined infrastructure that converges core data services on flash-accelerated, industry standard servers, delivering flexible and powerful building blocks under unified management. Put simply, HCI has the potential to revolutionise your security environment and increase efficiencies relating to application performance. In this whitepaper, we break down the top 5 reasons why hyperconverged infrastructure is the right way forward for your organisation. Please enter your details to access the whitepaper.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.