Skip to main content
 

nist

Results 301 - 325 of 823Sort Results By: Published Date | Title | Company Name
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: Epicor     Published Date: Sep 21, 2017
El objetivo principal de las empresas de manufactura es lograr el crecimiento de su empresa. A pesar de que los fabricantes prevén el crecimiento la mayoría enfrentan desafíos tales como la administración del crecimiento. Epicor ha preparado el eZine “Aumento de Rentabilidad en acción” en donde da a conocer como empresas como la suya han logrado el crecimiento con éxito.
Tags : 
erp software, enterprise resource planning software, erp selection, manufacturing, increase roi
    
Epicor
Published By: Epicor     Published Date: Sep 21, 2017
Una buena planeación es el factor que determina el éxito de los planes de crecimiento de los fabricantes. Esta planeación puede resultar más sencilla si se cuenta con las herramientas y la información necesaria para enfrentar los problemas y tomar mejores decisiones. Epicor ha preparado el ebook “Guía del fabricante para crecer la rentabilidad” en donde da a conocer los factores de riesgo y de éxito a los cuales se enfrentan las empresas de manufactura al momento de crecer.
Tags : 
software erp, administración empresarial, crecimiento empresarial, manufactura
    
Epicor
Published By: Infoblox     Published Date: Jun 18, 2015
Download this Case Study to learn how Geisinger Health System worked with Infoblox to keep up with emerging DNS and DHCP requirements and gain flexibility and centralized administration for future plans.
Tags : 
infoblox, geisinger, dns, dhcp, centralized administration, healthcare
    
Infoblox
Published By: HP     Published Date: Nov 05, 2014
Remove the unnecessary burdens of server management and provisioning with HP Integrated Lights-Out (iLO), designed to support the full lifecycle of servers from initial deployment to ongoing management and service alerting.
Tags : 
server management, streamlined, it life cycle, business intelligence, remote support, licensing options, servers, bladesystem
    
HP
Published By: HP     Published Date: Nov 05, 2014
The rise of computing in the cloud, expansive mobility options, and increasing pressure to boost application performance have added even further complexity - leading to inefficiencies that can limit your opportunity for growth and success.
Tags : 
server management, streamlined, it life cycle, business intelligence, remote support, licensing options, servers, bladesystem
    
HP
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Florida Hospital Celebration Health has long recognized that nursing is a key factor in the efficient delivery of high quality patient care. Nursing also represents the hospital’s highest cost of labor. Given these factors, administrators at Celebration Health sought business intelligence tools to better understand current nursing performance and pinpoint opportunities for workflow improvements leading to higher patient and staff satisfaction. Read this case study to learn more about how Florida Hospital Pioneers used RTLS and business intelligence to analyze and improve nursing workloads and workflows.
Tags : 
workflow, workload, nursing, healthcare, cost of labor, business intelligence tools, rtls, information technology
    
STANLEY Healthcare
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Like many senior living communities across the country, the staff of The Terraces of Los Gatos works hard to ensure a safe and peaceful environment for their residents. In 2011, two primary concerns for administrators were the need to reduce pressure ulcers by ensuring a regular and auditable turning schedule for each resident, as well as the desire to reduce frequent audible fall alarms, which were bothersome to both staff and residents. Read this case study to learn how The Terraces of Los Gatos ensures dignified resident care with a completely touch-free monitoring solution.
Tags : 
patient safety monitoring, healthcare, retirement community, resident care, nursing, information technology, practice management
    
STANLEY Healthcare
Published By: BMC Software     Published Date: Jul 22, 2015
Integrieren Sie Ihrer Big Data Initiativen in Ihre Unternehmensweiten Geschäftsprozesse. Gerne machen wir Sie damit vertraut, wie sie mit Control-M für Hadoop die Anwendungsentwicklung beschleunigen und die Unternehmensintegration vereinfachen können. Besprochene Themen schließen folgende Punkte ein: * Wie können Sie mit einem Enterprise Scheduler für Hadoop, weitere Automationsinseln vermeiden. * Wie kann sichergestellt werden, dass Sie aus ihren Big Data Initiativen den gewünschten Mehrwert erhalten. * Wie können Sie mit Ihren Big Data initiativen sich den administrativen Herausforderungen & Bedürfnissen stellen und mögliche Konfrontationen erfolgreich meistern.
Tags : 
    
BMC Software
Published By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Pure Storage     Published Date: Feb 01, 2016
Hear from Senior Systems Administrator Richard Savage how USF Health is leveraging Unidesk and Pure Storage to successfully deploy VDI and deliver Epic EMR and GE Centricity apps.
Tags : 
vdi, business transformation, healthcare it, unidesk, pure storage, epic emr, centricity
    
Pure Storage
Published By: Oracle     Published Date: Feb 21, 2018
Few industries have seen as much change in recent years as the healthcare sector. Sweeping legislation, a new incentive structure, a raft of regulations, and an emphasis on wellness rather than mere “sick care” have altered the clinical and administrative landscapes. Oracle is helping healthcare organizations deliver great patient experiences with a cloud-based strategy that uses innovative technology to meet the needs of everybody involved in the continuum of care.
Tags : 
    
Oracle
Published By: Forcepoint     Published Date: May 03, 2016
Todos nuestros productos están disponibles para una demostración personalizada. Por favor complete el formulario de la derecha. Algunos de nuestros productos —que se enlistan a continuación— también están disponibles para evaluaciones gratuitas (en inglés) para que pueda probarlos en su propio entorno de TI. De cualquiera de estas dos opciones, un representante de Forcepoint™ trabajará con usted para asegurarse de que esté evaluando exactamente el producto adecuado con las opciones adecuadas para usted. Para evaluaciones gratuitas, escoja el paquete de evaluación correspondiente abajo y complete el registro. Recibirá un mensaje de correo electrónico que lo guiará para configurar y administrar su evaluación. El soporte del producto estará disponible durante el tiempo que dure la evaluación del producto. Visite nuestra sección de soporte si tiene alguna pregunta.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 03, 2016
Todos os nossos produtos estão disponíveis para uma demonstração personalizada, basta preencher o formulário à direita. Alguns produtos — listados abaixo — também estão disponíveis para avaliação gratuita (em inglês) para que você possa testá-los em seu próprio ambiente de TI. Em qualquer caso, um representante da Forcepoint™ trabalhará com você para garantir que avalie o produto certo e com as opções mais adequadas para você. Para avaliações gratuitas, escolha o pacote de avaliação apropriado abaixo e conclua o registro. Você receberá um guia por e-mail sobre como configurar e administrar a avaliação. O suporte do produto estará disponível durante a avaliação. Acesse a seção Suporte se tiver perguntas.
Tags : 
    
Forcepoint
Published By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: • Seamless, secure end-user access to applications and files • Easy-to-use enterprise app store • Management security • Fully integrated infrastructure stack • Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: Jamf     Published Date: Aug 12, 2019
IT administrators must not only respond quickly to security issues, but also proactively guard against them. And, while Apple has invested a great deal in its security features, no operating system is immune to security challenges. But don’t worry. Jamf put together a comprehensive Apple security guide to ensure your Mac, iPad, iPhone and Apple TV devices remain protected.
Tags : 
    
Jamf
Published By: Kronos     Published Date: Sep 20, 2018
A As the healthcare industry shifts focus from volume to value, standardization is needed to accurately benchmark labor resource utilization. This is the premise of a survey conducted by HealthLeaders Media and sponsored by Kronos. What constitutes direct patient care? Hands-on patient assessment, administering medications, and performing procedures clearly top the list. But can other activities be considered direct care too—even those not conducted in a patient’s presence?
Tags : 
    
Kronos
Published By: Excellus BlueCross BlueShield     Published Date: Apr 03, 2018
Help your team get access to the care they need from the office, the road, or the comfort of their own homes, with telemedicine.
Tags : 
high deductible health plan, excellus, bluecross, blue shield, medicine, doctor, benefits administration, benefits management
    
Excellus BlueCross BlueShield
Published By: Excellus BlueCross BlueShield     Published Date: Sep 20, 2018
When employees don’t understand their high deductible health plans (HDHPs), they’re less likely to use them. Educate your team with this.
Tags : 
high deductible health plan, voluntary benefits, benefits administration, benefits management, pharmaceuticals, pharmacy/prescriptions, customer satisfaction, pharmacy benefits manager
    
Excellus BlueCross BlueShield
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Viele Unternehmen möchten sich in stark umkämpften Märkten einen Ruf als Innovatoren erarbeiten und streben daher die Flexibilität an, die erfolgreiche Internet-Unternehmen auszeichnet. Die Komplexität der Anwendungsentwicklung nimmt dadurch jedoch schnell stark zu. Der umfangreiche und oft monolithische Quellcode herkömmlicher Unternehmensanwendungen ist keine geeignete Basis für die schnelle Einführung neuer Services. Voneinander isolierte und möglicherweise auch geografisch verteilte Entwickler- und Administratoren-Teams bringen zusätzliche Herausforderungen auf organisatorischer Ebene mit sich. Gleichzeitig steigen die Ansprüche der Anwender. Unternehmen müssen ihre Anwendungen effektiv skalieren und überwachen können, um eine gleichbleibend hohe Leistung und Benutzerfreundlichkeit zu gewährleisten. Dabei gilt es inzwischen als selbstverständlich, dass Services rund um die Uhr uneingeschränkt verfügbar sind.
Tags : 
    
AstuteIT_ABM_EMEA
Published By: Google Chrome Enterprise     Published Date: May 07, 2018
Browsers combined with cloud-based services have effectively replaced desktop software, with an average of 1,053 cloud services in user per enterprise. This guide identifies key security features for IT administrators to consider when selecting a browser.
Tags : 
    
Google Chrome Enterprise
Published By: Bluewater Learning     Published Date: Apr 09, 2018
As great as Cornerstone OnDemand is, anyone could use a little help solving more of their learning and talent management challenges. With the right partner, you can achieve greater business results with Cornerstone almost immediately.
Tags : 
bluewater, bluewater assurance, cornerstone ondemand support, cornerstone ondemand administration, cornerstone ondemand assurance, cornerstone ondemand reporting, cornerstone ondemand ux workflows, cornerstone ondemand content
    
Bluewater Learning
Published By: Oracle     Published Date: Oct 20, 2017
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems. Many existing data protection solutions fail to meet the demands of critical databases because they treat them as generic files to copy as opposed to specialized resources. Taking a generic approach to database backup and recovery not only exposes you to the risk of data loss, it also negatively impacts performance and makes it difficult to recover within acceptable timeframes.
Tags : 
    
Oracle
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how one of the UK’s leading charities used the Webroot® Web Security Service to resolve problems with its existing Web security solution, which revolved mainly around administration and reporting. In addition, since the vast majority of Scope’s workers are mobile the organization needed a solution to protect them.
Tags : 
scope charity, disabled, services, opportunities, complex, support, peer-to-peer suppot, education and learning
    
Webroot UK
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.