Skip to main content
 

protect

Results 1 - 25 of 2511Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Apr 14, 2016
Nearly six years after passage of the Patient Protection and Affordable Care Act, the healthcare industry is in the midst of a massive retooling that is dramatically altering the way we think about cost management, strategic partnerships, and customer service. Fee-for-service reimbursement is giving way to new models of care delivery and payment to support a system based on pay-for-value. With financial risk or payments tied to value measures (such as patient satisfaction, clinical performance, and population health), compensation and reimbursement will increasingly be tied to value-based incentives.
Tags : 
    
HealthLeaders Media
Published By: Truven Health Analytics     Published Date: Oct 01, 2014
The tax on high-cost health plans, which are often referred to as Cadillac plans, is expected to impact a considerable share of the plans provided by healthcare organizations for their own employees, as much as 39% by 2020. The implications are significant because the excess-benefits tax requires the employer to pay 40% on the value of the portion of the plan that exceeds thresholds set by the Patient Protection and Affordable Care Act. Employers also need to consider that the tax is measured as a direct function of plan cost, and not actuarial plan value, and that a number of factors can drive excise-tax exposure.
Tags : 
    
Truven Health Analytics
Published By: Capella University     Published Date: Oct 23, 2015
Registered nurses, with targeted training, are the secret weapon in the race for comprehensive care coordination. Accountable care organizations. Patient-centered medical homes. Value-based reimbursements. Bundled payments. Healthcare is experiencing a revolution brought on by the Patient Protection and Affordable Care Act that aims to put patients squarely in the middle of all their clini­cal and financial decisions. Payers, including government agencies and insurers, are tying the quality and safety of patient care to reimbursements, making patient-centered care a necessity in all settings.
Tags : 
    
Capella University
Published By: Dell EMC     Published Date: May 23, 2017
Digital information has quickly become the lifeblood of business success, enabling firms to become more operationally efficient and to better serve their customers. As companies seek to harness their data in new ways, the infrastructure that houses that data can falter under the strain. In response, new innovations have emerged to help address the concerns of managing and protecting these increasingly important data capacities. While some vendors focus innovation development on software alone and allow the hardware to remain commodity, Dell Technologies is delivering some impressive hardware innovation with Isilon’s next generation hardware to complement its software’s disruptive capabilities.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 23, 2017
The rapid growth of unstructured data poses significant challenges to store, manage, secure and protect data across virtually every industry segment. You need a way to manage your data: simply, securely and cost-effectively.
Tags : 
    
Dell EMC
Published By: Schneider Electric     Published Date: Jun 06, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Aflac     Published Date: Mar 15, 2013
Every day, heart health has a significant impact on businesses. Consider steps to build a healthier workforce with three important ways your company can protect heart health.
Tags : 
    
Aflac
Published By: MobileIron     Published Date: Apr 24, 2017
The modern, mobile enterprise is expanding faster than ever, across every part of the world and in every industry. Increasingly, organizations are looking for comprehensive security blueprints to help them secure their mobile devices, apps, and data without compromising productivity or the user experience. For that reason, iOS has become the mobile OS of choice in a majority of enterprises because of its highly intuitive, user-friendly, and easy to manage design. With MobileIron’s enterprise mobility management (EMM) platform, IT organizations gain a comprehensive mobile solution that complements and augments the security features inherent in iOS.
Tags : 
ios security, it security, device security, applications security, malware protection, mobile device protection, data encryption
    
MobileIron
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Intel     Published Date: May 15, 2017
The intent of this document is to help customers who are interested in implementing security protection mechanisms in Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) domains.
Tags : 
software-defined wan, security, network functions virtualization, nfv, wide area network, intel
    
Intel
Published By: Druva     Published Date: May 22, 2017
Enterprise data is growing at an exponential rate. Download now to learn more!
Tags : 
    
Druva
Published By: Druva     Published Date: May 22, 2017
Wondering what data protection will look like in 2017? Download now to find out!
Tags : 
    
Druva
Published By: Mimecast     Published Date: Apr 25, 2017
Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance.
Tags : 
    
Mimecast
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Oracle     Published Date: Mar 09, 2017
DANS CE LIVRE BLANC, IDC ANALYSE LES DIFFICULTES INHERENTES AUX SCHEMAS DE SAUVEGARDE TRADITIONNELS ET LES DYNAMIQUES MOUVANTES DES STRATEGIES DE PROTECTION DES DONNEES.
Tags : 
    
Oracle
Published By: Entrust Datacard     Published Date: Jun 09, 2017
Security professionals attribute more than 63% of confirmed breaches to weak, default or stolen passwords. Analysts say more than 80% of all confirmed breaches involve privileged credentials. And the average cost of a data breach totals more than $3.8M. Almost every story reporting statistics like these concludes with “the password is dead.” The world clearly must move on from passwords in the battle to protect data – or at least attempt to phase them out.
Tags : 
    
Entrust Datacard
Published By: IBM     Published Date: May 22, 2017
Financial institutions should consider rapidly transforming business models in ways that are cognitive and digital. These transformations should include: Developing alternative revenue sources and streamlining costs.
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
IBM
Published By: IBM     Published Date: May 22, 2017
Only a handful of industries have been transformed by the digital age the way banking has. Internet and mobile banking, digital wallets, and a raft of new and innovative products have redefined “the bank” from a local, brick-and-mortar branch to an anytime-anywhere process. The new banking environment has opened opportunities for national, regional, and community banks alike, which are no longer constrained to serve only customers located in the areas where they maintain a physical branch presence. But it has also brought challenges associated with collecting, processing, analyzing, storing, and protecting vast amounts of new data, from multiple locations and sources.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
IBM
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of Session Border Controllers on the market. Sangoma’s Vega Enterprise SBC VM/Hybrid provides full-featured protection and easy interconnection.
Tags : 
vega sbc, enterprise, vm hybrid, data sheet, easy to use, cost effective, sbc solution
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication
    
Sangoma
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.