information industry

Results 51 - 75 of 92Sort Results By: Published Date | Title | Company Name
Published By: Epicor     Published Date: Aug 02, 2012
Distribution executives can no longer afford to view their IT department as merely a cost center. In today's competitive landscape, information technology represents a strategic, cost-saving, revenue-generating differentiator. Read this new brief and discover why IT continues to be a major business driver in this industry, supporting customer service, collaboration, decision-making and other aspects of modern distribution.
Tags : 
white paper, it success, strategies, service-oriented architecture, software as a service, web, virtualization, business intelligence, web service management, infrastructure
    
Epicor
Published By: Kyocera EMEA     Published Date: Mar 18, 2015
This paper provides information on how an optimised print fleet and managed document services can address some of the specific challenges facing the legal industry.
Tags : 
mds, managed document solutions, management documents, document services, legal industry, documentation workflows, legal challenges, document management, information management, green computing
    
Kyocera EMEA
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
The journey to digital healthcare begins with simply moving HR and other healthcare information to a digital format. An important next step is moving back-office operations to the cloud. Use the checklists of industry, technology and internal challenges facing healthcare organizations contained within this white paper to determine where you are on the cloud readiness spectrum, and begin creating a digital healthcare transformation plan for your organization.
Tags : 
    
Oracle HCM Cloud
Published By: WebEx     Published Date: Apr 02, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended. To harness the benefits of the new work order, organizations are looking to achieve true collaboration with customers, partners, suppliers and employees. Simply put, the mantra is to "improve productivity while lowering costs." Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : 
webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles, it infrastructure, virtual enterprise, metrics, industry benchmarks, sfa, crm, erp, synchronous meeting environment, webex mediatone network, return on investment, travel costs, labor costs
    
WebEx
Published By: WebEx.     Published Date: Apr 03, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended.  Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : 
webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles, it infrastructure, virtual enterprise, metrics, industry benchmarks, sfa, crm, erp, synchronous meeting environment, webex mediatone network, return on investment, travel costs, labor costs
    
WebEx.
Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection, ebusiness, customer relationship management, software compliance, security management, security policies, secure computing, securecomputing, intrusion prevention, pci compliance
    
Secure Computing
Published By: Medical Group Management Association (MGMA)     Published Date: Jun 25, 2009
MGMA Connexion™ magazine is the medical group practice professional's power resource. This popular magazine is filled with insight from peers, advice from experts and timely information on a variety of cutting-edge healthcare industry topics. MGMA Connexion™ magazine ranks as the "must-read" magazine for nearly 23,000 Medical Group Management (MGMA) members. MGMA's flagship publication is distributed ten times per year with a circulation well beyond the nearly 23,000 readers. About 50% or readers report the MGMA that they pass the issues on to other readers. This sample issue includes trend stories and member case studies, providing you a behind-the-scenes perspective on the group practice industry.
Tags : 
mgma, connexion, medical, ehr, physician recruiting, medicare, private, ids, pfizer, medfusion, pmic, health, mgis, medical protective, sage software, moonlighting solutions, navicure
    
Medical Group Management Association (MGMA)
Published By: Workforce Software     Published Date: May 26, 2015
In this white paper, we share 10 critical questions every employer should ask their SaaS provider before moving their workforce management systemssuch as time and attendance, scheduling, and leave managementto the cloud. Packed with detailed information about industry standards and tips for protecting your employee data, youll learn: 10 questions to ask your SaaS provider before you share employee data WorkForce Softwares multi-layered approach to cloud security What you need to know about disaster recovery and redundancy measures What certifications to look for when evaluating cloud providers
Tags : 
saas, security, cloud provider, workforce management, employee data, cloud security, redundancy
    
Workforce Software
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
    
Brainloop
Published By: Mimosa Systems     Published Date: Jan 14, 2009
This white paper will present an improved approach to legal discovery for Microsoft® Exchange systems provided by Mimosa Systems. Unlike existing methods for legal discovery of Exchange Server data, Mimosa’s approach delivers major advances in performance and granularity of information. To begin this paper, we will review the industry forces that are driving the need to manage email for legal discovery, followed by a discussion of the market-leading enterprise messaging application—Microsoft Exchange Server and the challenges it presents for legal discovery.
Tags : 
mimosa systems, microsoft exchange systems, legal discovery, email for legal discovery, platforms, storage, microsoft exchange, windows server
    
Mimosa Systems
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management, firewalls
    
HP - Enterprise
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: IBM     Published Date: Jan 27, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, as discussed in The truth about information governance and the cloud, most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these hybrid environments that people will look for insights to make critical decisions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these hybrid environments that people will look for insights to make critical decisions.
Tags : 
cloud-based data, data quality, data management, hybrid environment, decision making
    
IBM
Published By: Pure Storage     Published Date: Jul 19, 2017
As the information technology (IT) industry enters the cloud era, where hybrid IT is the dominant deployment model in organizations of all sizes, the capabilities of primary all-flash arrays (AFAs) will need to evolve to handle cloud scale and agility
Tags : 
it architecture, cloud, all-flash, storage, virtualization, cloud computing, infrastructure
    
Pure Storage
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understandingand Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industrys security model is one example that provides a new way to think about risk and contain itthat is, if you can see past the occasional bad rap its gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: IBM Corporation     Published Date: Sep 20, 2010
This IBM® Redguide™ publication provides a high level overview of the new IBM WebSphere® CloudBurst™ Appliance, including current issues being faced in the information technology (IT) industry and how WebSphere CloudBurst can address many of these issues.
Tags : 
application servers, enterprise software, ibm websphere, application server, middleware, cloudburst appliance, server provisioning, server virtualization, web sphere, service oriented architecture
    
IBM Corporation
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelites Vice President of Information Technology, is responsible for overseeing all aspects of the companys IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV. Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage.Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance at two previous companies, he was confident CylancePROTECT could significantly improve Safelites endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: Box     Published Date: Jun 22, 2018
These days, everyone's talking about digital transformation. But exactly how does your company get there? Capture is a great place to start in fact, it's one of the most critical steps to take as you move your business into the digital age. Whether its simply using OCR to make content more easily discoverable, adding and enhancing metadata to drive specific processes, or classifying content from the onset for better information governance, capture adds a ton of value to your existing content assets. This ebook details our key takeaways from AIIM's Industry Watch Report, Improving Business Operations in 2017: Capturing Vital Content. We share how cloud-based capture tools are replacing the longstanding legacy of paper-based processes to streamline and speed up the way you do business. Download the ebook to learn: How the latest capture innovations can support your digital strategy 5 business processes that benefit most from advanced capture technologies The key benefits of c
Tags : 
    
Box
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. This e-book presents six reasons why you should consider a database change, including opinions from industry analysts and real-world customer experiences. Read on to learn more.
Tags : 
database, streamlining, it infrastructure, database systems
    
Group M_IBM Q1'18
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.