Skip to main content
 

secure

Results 1 - 25 of 1946Sort Results By: Published Date | Title | Company Name
Published By: IntelliCentrics, Inc.     Published Date: Jan 08, 2015
Discover how the Saint Joseph Mercy Health System used the ReptraxTM vendor credentialing service to improve the compliance of commercial visitors, resulting in a safer and more secure environment for patients.
Tags : 
    
IntelliCentrics, Inc.
Published By: Zix corp     Published Date: May 11, 2016
Email is the most used communication tool in business and IT security and compliance professionals cannot ignore the sheer volume of unsecured PHI exchanged regularly in email. Read why email security is critical to your organization.
Tags : 
    
Zix corp
Published By: Zix corp     Published Date: May 11, 2016
Email is the most used communication tool in business. It's so easy to click that seemingly innocent 'Send' button that you may not realize the risk. Find out your next steps to an implementing an effective secure email strategy.
Tags : 
    
Zix corp
Published By: Vocera Communications Inc.     Published Date: May 20, 2015
Insights and recommendations for healthcare communication solutions that connect physicians, nurses, and staff.
Tags : 
    
Vocera Communications Inc.
Published By: TigerText     Published Date: Jun 30, 2015
With clinicians wasting 45 minutes per day playing phone tag, it’s time to retire pagers and migrate to a secure messaging solution, that saves your staff time, is HIPAA compliant and fosters workflow collaboration.
Tags : 
    
TigerText
Published By: Box     Published Date: Jun 22, 2018
• Moving from legacy to cloud infrastructure is a huge win for business, but the process requires a fundamental shift in organizational culture and business processes both inside and outside IT. In fact, managing this change may be the biggest challenge your company faces when moving to the cloud, unless you're equipped with the resources that make for a simple, successful transition. • Here's our tried-and-true 3-step approach proving that change doesn't have to be hard. Download now to start your easy, secure and efficient move to the cloud.
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: KPMG     Published Date: Jul 10, 2018
Manufacturers are already investing in select industry 4.0 technologies and capabilities. But their investments won’t automatically deliver success. What strategy should you follow to become an i4.0 leader? Read this report to find out: • how leading manufacturers invest to optimise the benefits of industry 4.0 • why deploying at the right scale is key to delivering enterprise value • what capabilities, controls and culture are required to support i4.0 success • how to use i.4 to deliver better value for customers • why i.4. leaders are bringing suppliers into the i4.0 environment.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 11, 2018
The business is increasingly side-stepping the IT function to procure new technologies. Do you have the right governance in place to encourage innovation and ensure investment is directed for maximum impact? Read this report to find out: • how to balance the opportunities and risks from emerging technology • how to ensure funding for innovation is available and prioritised • where to direct funds for innovation • why ‘guardrails’ work better than rules in the current environment. Download the report now
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: Datastax     Published Date: Aug 15, 2018
Built on a production-certified version of Apache Spark™ and with integrated search and graph capabilities, DSE Analytics provides highly available, production-ready analytics that enables enterprises to securely build instantly responsive, contextual, always-on applications and generate ad-hoc reports. Read this white paper to learn about the specific features and capabilities of DSE Analytics, and why DSE Analytics is designed for the Right-Now Enterprise.
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
Today’s enterprises continue to differentiate themselves via their cloud applications. But differentiation is getting harder and harder to accomplish. To stand out, you need a flexible, nimble, scalable, always-on data platform that can deliver powerful, game-changing, customer-facing applications. Read this white paper to learn how DataStax Enterprise delivers comprehensive data management through a secure, operationally simple platform built on the best distribution of Apache Cassandra™.
Tags : 
    
Datastax
Published By: Menlo Security     Published Date: Jun 01, 2018
"Uncover the Business Impact of Managing Risky Web Content Download this white paper to learn: How to safely manage ""uncategorized"" websites when sites are unknown to the secure web gateway (SWG) policies, which are largely based on website categories, such as news, entertainment, weather, social media, etc. The cost implications of securing web content, including staffing, clean-up and risk mitigation Isolation - a new technique for malware prevention to maintain end user & IT staff productivity Administrators can either be lenient in allowing access to uncategorized sites, increasing malware risk, or deny access and deprive employees of necessary information. There are hidden costs to both approaches. "
Tags : 
    
Menlo Security
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance
    
Sangoma
Published By: DocuSign UK     Published Date: Aug 08, 2018
Download this eBook to learn how eSignature technology and the processes associated with it not only optimise workflows but also can help make company activities more secure and compliant.
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Aug 10, 2018
"Every organisation already has a system of agreement. It's how written agreements get prepared, signed, enacted, and managed. But typically, it involves a messy, improvised mix of printing, signing, scanning, faxing, and overnighting paper agreements. These needlessly slow legacy processes add costs to agreements due to wasted productivity and materials. It's time for a change. The DocuSign System of Agreement Platform connects the world's No. 1 eSignature technology to every other aspect of the agreement process. Read this white paper to learn how to modernise your System of Agreement, including how to: - Prepare agreements with a high degree of automation - Sign agreements quickly and securely - Act on agreement terms after signing - Manage agreements with flexible options"
Tags : 
    
DocuSign UK
Published By: Lenovo     Published Date: Aug 14, 2018
Get our Security Solutions Brochure Backed by deep expertise and supported by a global network of trained and certified technical service professionals, Lenovo’s 360° approach to security gives you the complete experience of: Secure supply chain Best-in-class hardware security Securely developed software Complete component verfication Adoption and extension of security technology
Tags : 
security, supply, chain, hardware, security
    
Lenovo
Published By: Jelecos     Published Date: Aug 02, 2018
The people of Jelecos are experts in migrating some or all of a Customer’s work-loads or operations to AWS. We can help you build, deploy, scale, and manage Microsoft applications easily, quickly, securely and cost-effectively.
Tags : 
    
Jelecos
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Adverity     Published Date: Jun 15, 2018
Master Your Client's Data To Build An Advertising Agency For The Future This is the first part of our ebook Strategic Playbook For Data-driven Advertising Agencies. In this instalment we cover how agency executives can benefit from their client's data to maintain a sustainable, future-proof business in times of digital transformation. Scaling your business with Marketing Intelligence Building a data strategy to stay ahead of the curve Mastering the end-to-end data management process Once you decide to master your data, you will be rewarded with deep, meaningful insights and happy long-term clients that get the most out of their data. We know it’s worth it! Signup and download the 28-page pdf-document to understand how data will secure your spot in the future advertising industry.
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
    
Adverity
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.