Skip to main content
 

organization

Results 326 - 350 of 7453Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
healthcare, mobility, data security, security tips, personal device
    
Citrix ShareFile
Published By: Host Analytics     Published Date: Jun 05, 2017
Best-in-class firms have realized that budgeting, planning and reporting can't ALL be done with Excel. And running a successful business starts with effective planning and performance management, and the data you generate during these critical processes is among the most important and sensitive in your organization. A miscalculation, oversight, or a security breach could be financially devastating. By recognizing the 5 signs of Excel abuse, and making the necessary changes, best-in-class organizations can: -streamline planning and performance management -keep sensitive data secure -significantly reduce the potential for human error
Tags : 
    
Host Analytics
Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs, endpoint security, end point security, security hardware, kace
    
KACE
Published By: GoodData     Published Date: Oct 14, 2013
See GoodData's 5 steps to
Tags : 
gooddata, big data, institutionalizing big data, data-driven, data plaform
    
GoodData
Published By: Niara     Published Date: Jan 29, 2016
This handy guide, that also includes an evaluation checklist, will help you select one that’s right for your organization.
Tags : 
security analytics, security analytics solutions, analysts, attack detection, security, incident response, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics
    
Niara
Published By: mindSHIFT     Published Date: Nov 29, 2007
To successfully adopt managed IT services to meet your business objectives, small- and medium-sized organizations (SMBs) should follow five straightforward steps.
Tags : 
msp, managed service provider, it services, it service provider, outsourcing, managed services, small business, soho, smb, smbs, mindshift
    
mindSHIFT
Published By: Aruba Networks     Published Date: Nov 15, 2013
Whether you are an early adopter who has already started planning, or like several organizations, unsure of your next step, the following guidelines will help you prepare and plan for a successful migration to an 802.11ac WLAN.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
    
Aruba Networks
Published By: IBM     Published Date: Mar 30, 2016
It is important for healthcare organizations to become data driven. IBM can help organizations leverage a wide range of big data to deliver clinical and financial benefits, and the provide the steps organizations should take to become data driven.
Tags : 
ibm, healthcare, big data, healthcare analytics, enterprise analytics systems, information technology
    
IBM
Published By: Tealeaf     Published Date: May 12, 2008
While many companies believe they are delivering adequate online experiences, their customers are in pain. Why do most organizations miss the mark? Improving online customer experience requires organizations to have one view of the online customer and to utilize a common language when discussing customer experience.  Tealeaf gives you insights via their new guide, "Building an Online Customer Experience Competency: Five Steps".
Tags : 
tealeaf, customer experience, website development, web development
    
Tealeaf
Published By: IBM     Published Date: Feb 19, 2015
Refining business processes can be the key to achieving operational excellence.
Tags : 
business analytics, ibm, predictive analytics, performance management
    
IBM
Published By: Smarsh     Published Date: Mar 13, 2017
Use text messaging more while reducing your organization’s compliance, legal and reputational risk. Download now to learn how.
Tags : 
    
Smarsh
Published By: Juniper Networks     Published Date: Oct 19, 2015
The guidelines provided in this white paper make up some of the best practices entailed in creating an overall security policy for your organization that underlies deployment of effective firewalls.
Tags : 
juniper, firewall, threat, security, policy, configuration, packet
    
Juniper Networks
Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Nov 10, 2015
Implement and maintain PCI DSS compliance at your organization
Tags : 
operations, structure, compliance, security, management, data
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: Resilient Systems, Inc.     Published Date: Nov 24, 2015
It’s practically impossible to be completely prepared for a security incident – invariably something happens that best laid plans don’t address. But that doesn’t mean organizations shouldn’t try.
Tags : 
resilient systems, cyber security, incident response, plan, guide
    
Resilient Systems, Inc.
Published By: Carbonite     Published Date: Feb 22, 2017
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
backup, disaster, recovery, bdr, carbonite, environment
    
Carbonite
Published By: Carbonite     Published Date: Apr 09, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Apr 11, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: IFS     Published Date: Jun 25, 2014
EAM software delivers key benefits to an organization that relies on expensive and complex assets. It gives senior management visibility and control over the drivers of cost and productivity of those assets. And it offers real maintenance management and risk management benefits. Learn the 5 steps to realizing EAM software benefits today!
Tags : 
ifs, eam software, enterprise applications, mrp, cmms
    
IFS
Published By: Box     Published Date: Jun 22, 2018
• When it comes to the cloud, most businesses have moved from wait-and-see to a "how do we make it happen now?" approach. • But the complexities of moving valuable content from legacy systems to the cloud is still a daunting challenge. That's why some businesses are putting off the move even though they're painfully aware of the limitations of legacy infrastructure like network shares, enterprise content management systems and general purpose file servers. • The good news is the upside of migrating away from legacy infrastructure to a Cloud Content Management platform is far greater than the effort to get there. All you need is a plan. • Our new eBook, From legacy infrastructure to the cloud: A migration journey in 5 steps, gives you a clear, methodical process for migrating your organization to a Cloud Content Management solution.
Tags : 
    
Box
Published By: Clarabridge     Published Date: Dec 03, 2013
The purpose of this white paper is to provide a five step “roadmap” that organizations can use to transform their marketing organization into a Center of Customer Experience Excellence.
Tags : 
clarabridge, optimizing customer experience, voice of the customer, customer engagement, data source, voc program, customer behaviors, operationalize voc, customer relationship management, crm, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty
    
Clarabridge
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.