Skip to main content
 

san

Results 251 - 275 of 884Sort Results By: Published Date | Title | Company Name
Published By: LogMeIn     Published Date: Jan 03, 2013
In this whitepaper, BoldChat® - with thousands of customers across 70 countries - shares analytic techniques, reporting recommendations and realistic timelines for implementing a pro-active chat program. Read on to learn more!
Tags : 
roi, live chat, bold chat, logmein, log me in, enterprise, collaboration
    
LogMeIn
Published By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : 
physician, revenue cycle, technology, physician compensation, billing, reimbursement, policy and legislation, enterprise resource planning, healthcare reform, care coordination, financial / revenue cycle management, claims processing
    
Allscripts
Published By: Neustar     Published Date: Feb 27, 2013
This case study shows how On Demand Verification plays an important role in increasing business and improving efficiencies for Santander.
Tags : 
auto verification, loan verification, contact verification, consumer verification, real time verification, risk management, loan processing, loan optimization, consumer validation, consumer qualification, verify leads, verify consumers, b2c, business to consumer
    
Neustar
Published By: NetApp     Published Date: Sep 24, 2013
"Today, IT’s customers are more mobile and global than ever before and as such expect their applications and data to be available 24x7. Interruptions, whether planned or unplanned, can have a major impact to the bottom line of the business. ESG Lab tested the ability of clustered Data ONTAP to provide continuous application availability and evaluated performance for both SAN and NAS configurations while running an Oracle OLTP workload. Check out this report to see the results."
Tags : 
mobile, global, applications, cloud, configuration, technology
    
NetApp
Published By: Extreme Networks     Published Date: Feb 10, 2015
Découvrez en 10 points clés comment la remontée d’informations stratégiques sur les applications, les utilisateurs, les appareils utilisés sur le réseau et leur localisation, peut vous aider à prendre de meilleures décisions, plus rapidement.
Tags : 
extreme networks, wifi, byod, réseau sans fil, réseau hôpitaux, mobilité, réseau, purview, santé
    
Extreme Networks
Published By: Extreme Networks     Published Date: Feb 10, 2015
Téléchargez le livre blanc pour découvrir comment planifier votre migration vers le 802.11ac
Tags : 
extreme networks, wifi, byod, 802.11ac, wi-fi, infrastructure wifi, réseau sans fil, réseau, mobilité
    
Extreme Networks
Published By: Extreme Networks     Published Date: Feb 10, 2015
Dans cet eBook, nous vous présenterons des cas d’utilisation illustrant comment une solution d’analyse des applications peut être utilisée de manière efficace par le service informatique.
Tags : 
extreme networks, purview, analyse des applications, sans fil, wifi, solution réseau, solution de business intelligence, business intelligence, analyse applicative, datamining, réseau, optimisation du réseau, business analytics, application, sécurité des applications
    
Extreme Networks
Published By: Extreme Networks     Published Date: Feb 14, 2017
En este documento, se describen casos de uso concretos de cómo una solución de análisis de red e inteligencia de negocio ayuda a gestionar eficientemente las operaciones de TI de hospitales y centros sanitarios
Tags : 
    
Extreme Networks
Published By: McAfee     Published Date: Jan 20, 2015
Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall
    
McAfee
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
    
Vectra Networks
Published By: Mitel     Published Date: Mar 30, 2017
Step behind the scenes in this exclusive one on one interview as Daryl Reva, Mitel VP Cloud Marketing discusses mobility, contact center and cloud with Ray Chan, Director of Information Technology for the San Diego Padres. Hear how changing customer expectations, employee mobility and the rigors of hosting the 87th annual MLB All-Star Game inspired a major technology overhaul, including: A move to the Cloud Technology integrations in the contact center UCC and team collaboration applications
Tags : 
cloud, technology integration, marketing, mobility, productivity
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Une solution hyperconnectée. Disponible 24 heures sur 24, 7 jours sur 7. Activée en permanence. Tous les acteurs économiques ont des opinions très différentes au sujet de l'environnement commercial actuel. Cependant, quelle que soit leur perception, la rapidité du monde des affaires actuel exerce une pression sans précédent sur les entreprises. La réussite ou l'échec de votre entreprise dépend de votre capacité à identifier les bonnes personnes, à communiquer, à accéder aux données et à échanger des informations rapidement.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
La plupart des entreprises savent distribuer les systèmes informatiques afin de réduire le nombre de défaillances dans ce domaine. Un plus petit nombre d’entreprises réfléchit suffisamment à optimiser la disponibilité de leur bien le plus précieux : les ressources humaines ! En distribuant les deux, les entreprises peuvent éliminer des zones de risques et surmonter de nombreuses menaces. Voici cinq façons d’améliorer la continuité de l’activité en relocalisant ou en répartissant votre force de travail.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Mitel Mobilität Wenn es früher darum ging, die besten Mitarbeiter zu finden und zu halten, kam es auf den traditionellen Arbeitsplatz in einem repräsentativen Gebäude mit eigenen Büros in erstklassiger Lage an. Dieses Konzept eines Arbeitsplatzes in einem festen Büro, das wir jeden Tag aufsuchen, gilt nicht mehr. Es ist bei bestehenden und neuen Mitarbeitern nicht mehr gefragt und akzeptiert bzw.für diese nicht mehr interessant. Die heutige Generation der Arbeitskräfte hat eine ganz andere Vorstellung vom Arbeitsleben, die oft wie folgt zusammengefasst wird: „Mein Arbeitsplatz ist überall dort, wo ich mich gerade befinde, und mein Arbeitgeber stellt mir die Tools zur Verfügung, damit ich meine Arbeit überall erledigen kann, wo ich möchte.“ Wir zeigen Ihnen fünf Möglichkeiten, mit Mobility die besten Mitarbeiter zu finden und zu halten.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Les modes de communications en entreprise évoluent radicalement, de pair avec la technologie, l'utilisation croissante des smartphones, des réseaux IP et l'évolution des modèles de travail.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
De nos jours, le monde des affaires est rapide, compétitif, mondial et fondé sur la technologie. Des éléments culturels, technologiques et physiques collaborent pour accélérer le changement comme jamais auparavant. De la demande pour plus de liberté dans notre façon de travailler et la tendance de l’AVEC (« Apportez Votre Équipement personnel de Communication »), à l’innovation technologique et à l’adoption croissante de nouveaux appareils, plateformes et applications, en passant par la suppression des barrières internationales et régionales.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
L'expérience client est un facteur clé de différenciation dans l'environnement ultraconcurrentiel actuel. Plus que jamais, cette expérience est façonnée et proposée via des interactions numériques. Bien que la majorité des communications se font toujours par téléphone, les consommateurs comptent maintenant davantage sur les méthodes numériques, telles que le courrier électronique, les SMS, le chat en ligne et les réseaux sociaux. Les consommateurs se sont habitués au confort de pouvoir contacter l'entreprise par le média qui leur convient, où qu'ils soient. Ils s'attendent également à pouvoir basculer sans difficulté d'un moyen de communication à l'autre lorsqu'ils sont en déplacement.
Tags : 
    
Mitel
Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Rackspace     Published Date: Mar 28, 2018
Building a cloud operations team isn’t a new concept. But what if you need to build an operations team from the ground up for your applications that are running on Google Cloud Platform? Over the course of eight years at Rackspace, I’ve had the opportunity to build operations teams that have supported thousands of customers. When given the opportunity to build out a new operations team focused on managed services for Google Cloud Platform, I knew we needed to approach things a little differently.
Tags : 
    
Rackspace
Published By: Oracle CPQ BB     Published Date: Feb 05, 2016
Configure, Price, Quote. It sounds simple, but what happens when you have thousands of products, complex pricing calculations, a lengthy approval process, and sales reps that just don't have the time to worry about it all? Depending on who drags their feet, getting a quote to an interested customer can take weeks. Even when the proposal is complete, what makes sure that the product configuration is valid, or that the pricing calculations are correct? That's where Oracle Configure, Price, and Quote (CPQ) Cloud comes in, the proven CPQ leader. Enterprise and midsize businesses around the world have eliminated human error and quote turn-around time by automating their configuration and quoting processes with Oracle CPQ Cloud.
Tags : 
    
Oracle CPQ BB
Published By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.