Skip to main content
 

phi

Results 1 - 25 of 1726Sort Results By: Published Date | Title | Company Name
Published By: Spok     Published Date: Dec 18, 2015
Hospital communications used to be a lot simpler. If you needed to find a doctor, you could dial 0 and the operators would connect you or send a page on your behalf. People communicated through paper charts, wrote key phone numbers on grease boards, and kept on-call schedules in binders. Some of this still happens today, but communications across healthcare have become progressively more convoluted. The use of diverse mobile devices (smartphones, tablets, pagers, Wi-Fi phones, etc.), and the rise in care complexity necessitating care team coordination mean more sophisticated communication technology is required.
Tags : 
    
Spok
Published By: Zix corp     Published Date: May 11, 2016
Email is the most used communication tool in business and IT security and compliance professionals cannot ignore the sheer volume of unsecured PHI exchanged regularly in email. Read why email security is critical to your organization.
Tags : 
    
Zix corp
Published By: Kronos, Inc.     Published Date: Jan 07, 2015
HealthLeaders' survey on workforce management queried leaders from a cross-section of U.S. healthcare organizations, including hospitals, health systems, physician organizations, and long-term care/skilled nursing facilities. The 150 respondents represent executives across all disciplines — administration, clinical, operations, finance, marketing, and information. In the next three to five years, hospitals, health systems, and other patient service providers expect to augment their time-and-attendance and payroll systems with integrated applications that enable more sophisticated data crunching around labor analytics, acuity management, and staffing assignments. The goal? To convert the workforce from overhead to asset — a flexible, agile asset that will help organizations succeed in an increasingly demanding regulatory and competitive environment.
Tags : 
    
Kronos, Inc.
Published By: Privacy Analytics     Published Date: Jul 01, 2015
Learn the right way to responsibly safeguard PHI - while unlocking its potential for secondary purposes - in this Privacy Analytics white paper.
Tags : 
    
Privacy Analytics
Published By: Ricoh     Published Date: Sep 28, 2018
xxx
Tags : 
    
Ricoh
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: TriNet     Published Date: Jan 17, 2013
For the first time in modern history, workplace demographics now span four generations. Download this white paper for best practices on how to better understand and effectively manage a multi-generational workforce.
Tags : 
    
TriNet
Published By: Workday France     Published Date: Sep 27, 2018
Découvrez les éléments clés que les ETI et PME doivent retenir de cette étude réalisée en février 2018 par Forrester Consulting pour le compte de Workday Découvrez pourquoi les évaluations doivent être plus fréquentes et le rôle de la technologie.
Tags : 
    
Workday France
Published By: Vena Solutions     Published Date: Oct 29, 2018
Based on in-depth research and customer interviews, the annual Nucleus Research Value Matrix map out the corporate performance management (CPM) market landscape, evaluating vendors on a matrix contrasting usability and ease-of-use versus features and depth of functionality. Read or download the 2018 edition to uncover the most up-to-date CPM landscape, to find the best finance software solution for your needs, and to see why Vena led the pack in usability to land in the Leader quadrant for the third straight year.
Tags : 
nucleus research, cpm matrix, cpm technology value, cpm technology matrix 2018, excel replacement, financial planning, budgeting, forecasting, financial modeling, business modeling, finance what-if scenarios, financial close and consolidation, risk and audit management, erp data integration systems, adaptive insights, hyperion, anaplan, prophix, vena solutions
    
Vena Solutions
Published By: Workday UK     Published Date: Sep 18, 2018
Get key takeaways for large enterprises from this February 2018 Workday-commissioned study conducted by Forrester Consulting. Learn what’s driving the need for a more frequent performance review cycle and how technology can help.
Tags : 
    
Workday UK
Published By: Workday Netherlands     Published Date: Sep 20, 2018
Bekijk de belangrijkste conclusies voor medium enterprises uit dit onderzoek dat Forrester Consulting in februari 2018 namens Workday heeft uitgevoerd. Ontdek waarom een frequentere performance review-cyclus nodig is en hoe technologie daarbij helpt.
Tags : 
    
Workday Netherlands
Published By: Turbonomic     Published Date: Oct 02, 2018
Microsoft Azure is a public cloud platform featuring powerful on-demand infrastructure and solutions for building and deploying applications workloads as well as a wide variety of IT and application services. You can use Azure as a public cloud provider and as a hybrid extension to existing on-premises infrastructure. Organizations that use Microsoft solutions on-premises are able to extend their infrastructure and operational processes to Azure. With the growing popularity of Azure, today’s systems administrators need to acquire and strengthen their skills on this fast-growing public cloud platform. In this guide we explore the Azure public cloud platform with a focus on the Infrastructure-as-a-Service (IaaS) features. We cover general architectural features of the Azure cloud including geographic regions, availability zones, and Service Level Agreements (SLAs) attached to the core Azure IaaS infrastructure.
Tags : 
    
Turbonomic
Published By: Spredfast     Published Date: Aug 24, 2018
Learn how to better connect with your audiences on each social channel. Our 2018 Social Audience Guide breaks down everything you need to know to from demographics, device usage and even site behavior. Start engaging in a more meaningful way, today. Download your guide.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
All of cyberspace and its underlying infrastructure is vulnerable to a wide range of risk and exposure from both physical and cyber threats and perils. Sophisticated cyber individuals and groups exploit standalone and congregated vulnerabilities to steal money and information, or disrupt, endanger and damage operations. The combination of wide opportunity for crime in cyberspace and the ability to execute from geographically-dispersed locations has produced a transformation of traditional criminal activities.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Nov 01, 2018
Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. That is why IBM Resilient® was developed: to arm security teams with a platform for managing, coordinating, and streamlining incident response (IR) processes. IBM Security has had the privilege of working with organizations of all sizes and across all industries as they implement Resilient solutions to develop more sophisticated and robust incident response functions. These organizations build IR processes that are consistent, repeatable, and measurable, rather than ad hoc. They make communication, coordination, and collaboration an organization-wide priority. They leverage technology that empowers the response team to do their job faster and more accurately
Tags : 
    
Group M_IBM Q418
Published By: Cyren     Published Date: Oct 17, 2018
Average rates at which enterprise email security systems miss spam, phishing and malware attachments.
Tags : 
email security, phishing, malware, email security systems, appliance security
    
Cyren
Published By: Cyren     Published Date: Oct 17, 2018
An Osterman Research Survey Report
Tags : 
office 365, it security, cybersecurity, web security, phishing, microsoft office
    
Cyren
Published By: Citrix and Google Chrome Enterprise     Published Date: Oct 22, 2018
How can IT safely enable a mobile workforce in the face of an ever changing and increasingly sophisticated world of cyber threats? The answer is a solution that securely delivers and manages seamless access to Windows desktops, apps, and data to Chrome OS, the secure by design endpoint operating system.
Tags : 
    
Citrix and Google Chrome Enterprise
Published By: Qualtrics     Published Date: Oct 04, 2018
Every product needs a target audience. Market segmentation identifies subsets of a market based on demographics, needs, priorities, common interests, or other psychographic or behavioral criteria to better understand and communicate with that audience. Segmentation can be as simple as splitting your potential market into age ranges or as complex as dividing your audience based on subtle behaviors, values, or beliefs. To be truly useful, segmentation should enable you to target core groups of your potential customers with precision. Practically speaking, segmentation enables you to: • Boost demand with messaging that resonates more with your market • Grow your customer base by understanding what drives purchase behavior • Increase revenue and profitability by discovering which customers will pay a premium for • your product
Tags : 
    
Qualtrics
Published By: TIBCO Software EMEA     Published Date: Sep 12, 2018
By processing real-time data from machine sensors using artificial intelligence and machine learning, it’s possible to predict critical events and take preventive action to avoid problems. TIBCO helps manufacturers around the world predict issues with greater accuracy, reduce downtime, increase quality, and improve yield. Read about our top data science best practices for becoming a smart manufacturer.
Tags : 
inter-company connectivity, real-time tracking, automate analytic models, efficient analytics, collaboration
    
TIBCO Software EMEA
Published By: Zerto     Published Date: Oct 08, 2018
This infographic summarizes the growing threat of ransomware, what the potential impact could be on your business, and how you can mitigate the threat of ransomware by following a few simple steps and learn to recover you data in minutes with Zerto.
Tags : 
ransomware, it resilience
    
Zerto
Published By: SAP     Published Date: Oct 03, 2018
How future-ready is your family business?
Tags : 
    
SAP
Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software
Published By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.