access

Results 501 - 525 of 2577Sort Results By: Published Date | Title | Company Name

Transforming Content Access In Accounting & Finance

Published By: Onbase     Published Date: Feb 18, 2016
As a strategic framework, ECM can help organizations take control of their content; and, thereby boost productivity, encourage collaboration, help meet compliance initiatives, enable better content-centric processes and make information easier to share.
Tags : 
accounting, finance, finance management, best practices, business management, business process management
    
Onbase

From Invoice Capture to Archive: How to Achieve End-to-End AP Automation

Published By: Onbase     Published Date: Feb 18, 2016
Accounts payable has been talking about end-to-end integrated automation for at least 40 years. Today, the technology exists, but resources are limited and end-to-end AP automation is still not standard. Some AP departments have automated pieces of the AP process, but an end-to-end solution should include the ability to capture, integrate, measure, process, store, and access information.
Tags : 
accounts payable, business management, business practices, accounting, finance, business intelligence, productivity
    
Onbase

How to Create a Smarter, Faster Lending Process

Published By: Mirador     Published Date: Jul 18, 2016
Over the last several years, marketplace lenders have popped up to fill this significant gap between small business borrowers and access to credit. They typically offer fast approval turn-around – delivering requested funds in hours or days vs. weeks.
Tags : 
    
Mirador

CIO Magazine White Paper: Six Ways Organizations Can Make Better Use of Data Through An Appliance

Published By: Oracle ODA     Published Date: Aug 15, 2016
Businesses understand more than ever that they depend on data for insight and competitive advantage. And when it comes to data, they have always wanted easy access and fast performance. But how is the situation different now? Today, organizations want those elements and more. They want IT to strip away the limitations of time with faster deployment of new databases and applications. They want IT to reduce the limitations of distance by giving remote and branch offices better and more reliable access. And in a global world where business never stops, they want IT to ensure data availability around the clock. If IT can deliver databases and applications faster, on a more automated and consistent basis, to more locations without having to commit onsite resources, IT will be free to focus on more strategic projects.
Tags : 
    
Oracle ODA

The Payment Card Industry: Data Security Standard and CA Privileged Access Management

Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies

A Privileged Access Management Maturity Model for Digital Transformation and Automation at Scale

Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies

Brexit—The Impact on Privileged Identities

Published By: CA Technologies     Published Date: Jun 26, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

CA Technologies Unveils New Mainframe Machine Learning Capabilities at CA World '16

Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies

What does the GDPR mean to you?

Published By: CA Technologies     Published Date: Sep 13, 2017
"There's new legislation in place, that's expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across testing and development environments. It's the General Data Protection Regulation (GDPR). Are you ready for it? In this session, we’ll demonstrate how CA Test Data Manager helps to both mask your production data and to generate synthetic test data; a powerful combination to help you meet compliance needs and deliver quality applications. There will be a short section on the future of the tester self-service model that will enable testers to efficiently get access to the right test data."
Tags : 
    
CA Technologies

Privileged Access Management: A Roadmap to Calculating Total Cost of Ownership

Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies

Hybrid Privileged Access Management for Hybrid Architectures: A Strategic Approach

Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies

Reducing the Risk of Data Breaches on Your Most Critical Servers: How CA Can Help

Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?

Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
    
CA Technologies

How Can I Protect Privileged Credentials Across my Traditional and Virtual Data Centers

Published By: CA Technologies     Published Date: Jun 01, 2018
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
    
CA Technologies

Better Search Experiences with Unified Information Access

Published By: Lucidworks     Published Date: Aug 24, 2016
This white paper discusses the imperative demand faced by organizations to create satisfying and relevant search experiences for their users. Executives who read this white paper will learn what it means to the overall organization to provide unified information access; the impact and benefits of and challenges to pursuing a strategy to unite information across an organization; and the strategies and examples of organizations that have effectively utilized tools to support unified information access in the pursuit of delivering a superior and more relevant search experience for their users.
Tags : 
search experience, unified information access, lucidworks, information strategy, relevant search, ecommerce search
    
Lucidworks

Transforming Yesterday's Call Center Into Tomorrow's Engagement Center

Published By: Evariant     Published Date: Aug 22, 2018
Health systems that implement CRM-based engagement solutions stand to achieve significant strategic gains, from acquiring and retaining patients to supporting more positive clinical outcomes to increasing referrals to member providers and practices. Driven by easy access to rich consumer data and analytic profiling, as well as patient encounter histories, CRM-based engagement centers optimized for healthcare enable health system CSRs to quickly offer personalized responses to consumer or patient inquiries via multiple in- and outbound media, including telephone, email, social, and web.
Tags : 
call center, healthcare crm, patient experience, patient acquisition, healthcare transformation
    
Evariant

It's Time to Move Your Critical Data to SSD's

Published By: Micron     Published Date: Oct 14, 2016
Today’s IT professionals are well aware that users expect fast, reliable access to ever-growing amounts of data – from web content, to videos, to business intelligence data and more. Meeting the challenges of this exponential growth is nearly impossible with existing, spinning media storage technology. Hard disk drives (HDDs) have been the standard in data storage for decades, but they can no longer satisfy. They create bottlenecks in data access, they fail to meet the growing demands of higher user expectations, and they consume too much power. Download to learn how to solve this issue.
Tags : 
    
Micron

To Productivity & Beyond: Prioritizing Technology For The Future of Work

Published By: Citrix ShareFile     Published Date: Mar 31, 2017
The workplace is changing. Are you taking advantage of new technology to improve your productivity? Learn how far modern tech can take you. Read the e-book to learn how you can: • Integrate new work routines • Improve client relationships • Eliminate barriers to collaboration
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device (Healthcare)

Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, cloud security, data storage, network security, device protection, information protection
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile

VMware's Move to a Digital Workspace

Published By: VMware     Published Date: Jul 24, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
    
VMware

4 Pillars Behind the Evolution of End-User Computing

Published By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
    
VMware

FlashBlade Data Sheet

Published By: Pure Storage     Published Date: Nov 02, 2017
In the new age of big data, applications are leveraging large farms of powerful servers and extremely fast networks to access petabytes of data served for everything from data analytics to scientific discovery to movie rendering. These new applications demand fast and efficient storage, which legacy solutions are no longer capable of providing.
Tags : 
big data analytics, genomics, medicine, digital science, engineering, design, software, development, next-generation
    
Pure Storage

Carbonite: Complete Data Protection

Published By: Carbonite     Published Date: Oct 05, 2017
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection. IT pros need confidence that the protection they deploy can: •Ensure long-term survivability of historical data •Deliver data securely to different waypoints. •Extend protection as environments change.
Tags : 
data protection, data security, carbonite, data recovery, data resiliency, data backup
    
Carbonite
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.