information industry

Results 1 - 25 of 92Sort Results By: Published Date | Title | Company Name
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Healthcare providers are starting to realize that using electronic communication, collaboration, and social networks to keep in touch with each other and with patients can improve the quality of care they provide. However, it also exposes them to risk since the information they share on these networks has to be protected in order to meet specific regulatory guidelines, like those mandated by HIPAA. The prescription for success is to consider compliant use of these networks before and while they are being used and the technology that helps achieve that goal. Read this paper to gain an understanding of: What the regulatory landscape of the healthcare industry looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, hipaa requirements, social networks, compliance, it management, enterprise applications
    
Actiance, Inc.
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Social Media Risks and Benefits for the Pharmaceuticals Industry Drug makers are just beginning to realize how social networks can improve business processes. Social media helps your organization share information and exchange ideas with your customers quickly, but doing so can involve considerable risk. Thats because social media is subject to the scrutiny of regulators, legislators, and litigators. So, what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Not having technology in place to help manage these requirements and increasing risks, or doing so without careful planning, can be a costly mistake. Read this paper to gain an understanding of: What the regulatory landscape of the pharmaceuticals industry looks like What concerns you should be aware of f
Tags : 
social media, increased risks, business processes, regulatory requirements, it management
    
Actiance, Inc.
Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs are the unseen language of the Internet. They power digital transformation across industries by allowing applications to talk to one another and operate as crucial backend services to websites and mobile apps. As a dynamic and somewhat hidden technology, it can be challenging to find detailed information about the API space. We combined findings from our recent API survey of business leaders from over 400 leading technology companies with industry data to compile four need to know facts about APIs.
Tags : 
api, mobile app, technology, backend service
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
    
Akamai Technologies
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelites Vice President of Information Technology, is responsible for overseeing all aspects of the companys IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV. Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage.Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance at two previous companies, he was confident CylancePROTECT could significantly improve Safelites endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Childrens CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security teams existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance
Published By: Box     Published Date: Jun 22, 2018
These days, everyone's talking about digital transformation. But exactly how does your company get there? Capture is a great place to start in fact, it's one of the most critical steps to take as you move your business into the digital age. Whether its simply using OCR to make content more easily discoverable, adding and enhancing metadata to drive specific processes, or classifying content from the onset for better information governance, capture adds a ton of value to your existing content assets. This ebook details our key takeaways from AIIM's Industry Watch Report, Improving Business Operations in 2017: Capturing Vital Content. We share how cloud-based capture tools are replacing the longstanding legacy of paper-based processes to streamline and speed up the way you do business. Download the ebook to learn: How the latest capture innovations can support your digital strategy 5 business processes that benefit most from advanced capture technologies The key benefits of c
Tags : 
    
Box
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
    
Brainloop
Published By: CA Technologies     Published Date: Jun 03, 2015
"DevOps seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Financial Services industry."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 03, 2015
"DevOps seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Healthcare industry."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 03, 2015
"DevOps seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Entertainment industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
"DevOps seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Entertainment industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Financial Services industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Healthcare industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Entertainment industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Financial Services industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
DevOps seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Healthcare industry.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understandingand Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, particularly Graham, Leach, Bliley (GLBA), the Payment Card Industry Data Security Standards (PCI-DSS) and the Sarbanes Oxley Act (SOX). Today, the General Data Protection Regulation (GDPR) is also top-of-mind, as it regulates not only the processing of personal data, including PII, relating to individuals in the European Union, for also any organization that processes personal data of EU residents. For United States banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer prot
Tags : 
    
CheckMarx
Published By: Cognizant     Published Date: Oct 23, 2018
Value-based care is the predominant model for enabling the healthcare industry to control costs and deliver better information to consumers. The basic idea is that reimbursements are based on the quality of the outcome of a procedure, episode of care, use of a device or therapy. Under this model, life sciences companies are rewarded for improving health outcomes and/or reducing the costs to achieve those outcomes. It requires life sciences companies to rethink many of their processes, from R&D through the commercial phase. Navigating those momentous shifts requires that life sciences companies embrace a range of digital technologies which will enable a holistic approach to value-based care. This white paper will examine the drive for value-based care, its impact on life sciences companies and how technology platforms can address the challenges the industry is facing.
Tags : 
cognizant, life sciences, digital
    
Cognizant
Published By: Dassault Systmes     Published Date: May 09, 2018
Discerning and demanding consumers expect meaningful retail interactions. Creating new world-class experiences is vital to differentiate products and boost profits in the consumer goods market. Let me shop when and how I want: Technology to research and buy products defines consumer behavior, driven by social medias see now, buy now mentality. Give me relevant data: With ever-expanding information, every touchpoint should have customer data that matters. Give me a truly unique experience: Innovative retailers use new partners and tools to deliver personalized consumer experiences. Pair my products with consistently good service: New customer service technologies are crucial in a world with more consumer/retailer choices. Make my retail environments better: Consumers want memorable, differentiated experiences in user-friendly digital and physical retail environments. I invite you to download your targeted industry analysis and uncover the expectations to take into account a
Tags : 
    
Dassault Systmes
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.