it standard

Results 126 - 150 of 690Sort Results By: Published Date | Title | Company Name

The Payment Card Industry: Data Security Standard and CA Privileged Access Management

Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies

The Ultimate Guide to Healthcare Marketing Attribution & ROI

Published By: Evariant     Published Date: Nov 08, 2018
Smarter growth for healthcare providers requires a strong patient acquisition engine that can demonstrate ROI. By focusing on the financial impact of marketing efforts, healthcare marketers demonstrates why these efforts warrant further investment. This guide presents the Evariant approach to calculating service line ROI from marketing spend. It includes a standard set of formulas and optional factors that may be relevant to certain service lines and system-wide operations.
Tags : 
healthcare marketing, marketing roi, patient acquisition, marketing measurement
    
Evariant

It's Time to Move Your Critical Data to SSD's

Published By: Micron     Published Date: Oct 14, 2016
Today’s IT professionals are well aware that users expect fast, reliable access to ever-growing amounts of data – from web content, to videos, to business intelligence data and more. Meeting the challenges of this exponential growth is nearly impossible with existing, spinning media storage technology. Hard disk drives (HDDs) have been the standard in data storage for decades, but they can no longer satisfy. They create bottlenecks in data access, they fail to meet the growing demands of higher user expectations, and they consume too much power. Download to learn how to solve this issue.
Tags : 
    
Micron

Web Customization in 5

Published By: Progress     Published Date: Oct 09, 2017
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress

The Rise of Machine Learning (ML) in Cybersecurity

Published By: CrowdStrike     Published Date: Apr 10, 2017
All ML technology isn’t created equal. Learn how the CrowdStrike® ML-based Engine Defends Against Unknown Malware. While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware.
Tags : 
    
CrowdStrike

The CFO Guide to Rev Re: Challenges and Solutions

Published By: FinancialForce     Published Date: Dec 01, 2017
Download this guide to review three major pain points that companies are facing as they prepare for the new revenue recognition standards-ASC 606 and IFRS 15- as they are fast approaching.
Tags : 
    
FinancialForce

Rolling Forecasts

Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Jul 12, 2017
In recent years, business forecasts have had to become faster and more flexible—ready to be adjusted at a moment’s notice. As earnings and product cycles accelerate, it has become clear that the business world is decisively moving towards treating rolling forecasts as standard. A slow process of budgeting and forecasting is no longer enough. This digibook contains a step-by-step guide on how to meet stakeholders’ expectations, with case studies and examples of how smart CFOs are adapting their processes to improve the quality and timeliness of their business forecasting.
Tags : 
forecast, digital transformation, digibook, cfo, process, case study
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017

HFS Blueprint Report ServiceNow Services 2018

Published By: Infosys     Published Date: Jun 28, 2018
The 2018 HfS ServiceNow Services Blueprint continues our theme of looking at the services ecosystems of leading Software-as-a-Service platforms. Unlike other quadrants and matrices, the HfS Blueprint identifies relevant differentials between service providers across a number of facets under two main categories: innovation and execution.
Tags : 
provider, analysis, digital, automation, standardization
    
Infosys

Credential Stuffing 101: The Risk of Bots to Your Business

Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia

Which arc flash analysis method is right for you?

Published By: Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : 
arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
    
Schneider Electric

How To Upgrade Customers Through Valuable Data

Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
Technology offers the opportunity for brands to compete - and win - on a rising standard of customer service delivery. Changing cornerstones of engagement: consumers may seem like they stick with their service providers no matter what, but marketers can’t be complacent. To stop their valued customers adding services elsewhere, organizations need to fulfill a new set of standards.
Tags : 
management, call center, website, mobile, app
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX

A Short Primer of GDPR Essentials

Published By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
    
Splunk

How do you know your security’s working?

Published By: Lenovo - APAC     Published Date: Aug 13, 2019
How much money does the average data breach cost? How many days of downtime does ransomware cause? How many millions of people have their data exposed? Discover the vast impact on time, money & productivity of security breaches. Investing up front in strong security, will save you in the long run. Comprehensive end-to-end security not only reduces the risk of being compromised, it also brings benefit to the business., Taking steps to invest in the right solutions, that use rigorous, trackable and auditable security standards, across their entire supply chain is a must to mitigate risks. ThinkShield provides that and so much more. It is a security solution that offers end-to-end protection that drives productivity, innovation, and profitability.
Tags : 
    
Lenovo - APAC

What Do You Mean TLS 1.3 Might Degrade My Security?

Published By: Gigamon     Published Date: Mar 26, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon

What Do You Mean TLS 1.3 Might Degrade My Security?

Published By: Gigamon     Published Date: Jun 10, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon

The 2018 Gartner Magic Quadrant for Full Life Cycle API Management

Published By: Google Apigee APAC     Published Date: Jun 10, 2019
Power your APIs with a three-time leader. We’re thrilled to share that Gartner has recognized Apigee as a Leader in the 2018 Magic Quadrant for Full Life Cycle API Management. This year, Apigee was not only positioned furthest on Gartner’s "completeness of vision" axis for the third time running, it was also positioned highest in "ability to execute." Download your complimentary copy of the 2018 Gartner Magic Quadrant for Full Life Cycle API Management. This must-read for IT professionals provides a comprehensive analysis of the API management marketplace and evaluates 22 vendors across 15 essential criteria. What’s inside? Apigee continues to be recognized as a leader in its category APIs are the de facto standard for building and connecting modern applications APIs and API management have become essential to how enterprises deliver applications in and across clouds Apigee’s API management platform can be a key ingredient in running a successful digital business
Tags : 
    
Google Apigee APAC

IDC Infobrief: Agile Integration for cloud-enabled enterprise

Published By: Red Hat APAC     Published Date: Jun 27, 2019
"Cloud first" mandates accelerate cloud adoption within an enterprise and across enterprises looking at what their peers are doing. As enterprises work to balance innovation with efficiency—and increasingly adopt cloud-first strategies—agility is key. In this IDC InfoBrief, sponsored by Red Hat, learn 4 key capabilities supporting cloud adoption and agile integration approaches that offer faster, more flexible workflows. IDC recommends 4 critical technology cornerstones: - Modular development: Microservices - Deployment portability: Containers - Standardization of service interfaces: APIs and API management - Decentralized connectivity: Hybrid integration Get the IDC InfoBrief to learn more.
Tags : 
    
Red Hat APAC

Wireless Traffic Data: Minimizing consumption and cost

Published By: HERE Technologies     Published Date: Dec 05, 2018
Car data consumption is critically important to auto manufacturers. As more vehicles are produced with built-in infotainment systems, the cost of supplying them with live information and real-time updates via a data connection grows ever greater. Auto manufacturers need to be able to enhance the driving experience with smart traffic, navigation, and entertainment services, while reducing costs and data volumes. HERE is the world’s leading provider of traffic data to the automotive industry. This eBook shows how HERE optimizes traffic solutions and it outlines how data use modelling, standardization, and good data management can help reduce usage.
Tags : 
traffic data, auto, location data
    
HERE Technologies

Transparent Talent Mobility - A New Standard of Endurance

Published By: Taleo     Published Date: Feb 09, 2011
Making the right talent management decisions requires a specific understanding of what talent management actually is and does. The goal of a talent management program is to create a highly responsive, high-performing, sustainable organization that meets business targets.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment, employee performance, quality of hire
    
Taleo

Oracle’s NEC3 Contract Management Cloud Solution

Published By: Oracle     Published Date: Nov 09, 2016
As projects become larger and more complex, the variation in contracting standards around the world makes compliance increasingly challenging to maintain—especially when project teams are often operating in different time zones. Easy access to tools that streamline compliance with a range of contracting standards enables construction firms to rapidly improve communication, optimise efficiency and mitigate risk.
Tags : 
    
Oracle

Guard Your Organization's Data With Intelligent IBM Encryption

Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM

The GDPR: It's Coming - and Sooner than You Think. Are You Prepared?

Published By: IBM     Published Date: Oct 26, 2017
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so starting May 25, 2018.
Tags : 
gdpr, data protection, right to access, data breach, personal data
    
IBM

IBM Blueworks Live: Optimize your business processes

Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
What is IBM Blueworks Live? An intuitive, cloud-based business process modeling tool that generates industry-standard BPMN 2.0 layouts, documentation and output allowing you to:
Tags : 
    
Group M_IBM Q3'19

Partnering with Certainty Series: Customer Demands at the Edge - Always On, Always Connected

Published By: Schneider Electric     Published Date: Jan 26, 2018
The first event in the Partnering with Certainy Webinar Series, "Customer Demands at the Edge." Trends like IoT are driving customer experience expectations in a way that demands resiliency in local edge environments. As a result, we’re seeing a rise of edge computing (compute power coming out of the cloud and into the access layer). Customer demands manifest themselves differently based on things like company size and segment. For example, a retail customer’s business imperatives might look different from a doctor’s office. But one thing remains constant: A standardized, redundant, and repeatable physical infrastructure can protect the availability of these now-critical access-layer IT assets. APC by Schneider Electric has: The solutions you need to deliver a standardized, redundant, & repeatable infrastructure to your customers The tools you need to configure them, The alliances & certifications you trust & rely on, The program to make it profitable. Fill out your information and click "Register" to watch the kick off our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Always On, Always Connected.” This webinar originally aired on October 5th, 2017.
Tags : 
    
Schneider Electric

Partnering with Certainty Series: Customer Demands at the Edge - Fix My Problem Before it Starts!

Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 2 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." In our last webinar, we discussed how trends & technologies like IoT and its many applications have helped drive an Always On, Always Connected mentality that has completely evolved customer experience standards. These demands are driving a need for resiliency in local edge environments, meaning compute & storage capacity is now coming back on premise for many applications – especially in industries like Healthcare, Retail, Finance, and Education. In other words, this highly distributed access layer is now becoming a compute layer – one that is mission-critical to delivering a flawless (or at least acceptable) customer experience. These environments are often make-shift wiring closets (janitor’s closets, back rooms, etc.) with no dedicated IT staff per each location. More than ever before, Healthcare, Retail, Finance, and Education customers are turning to solution providers to be that “dedicated IT staff” to find and fix problems before they start, so that the customer (or patient, or student) experience they’re working to provide remains a good one. APC by Schneider Electric has: Connected Products making it easy to remotely monitor your customers’ environments Including our NEW Smart-UPS with APC SmartConnect – the industry’s first cloud-connected UPS! A Managed Service Program to help you develop & monetize power as a managed service Fill out your information and click "Register" to watch part 2 of our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Fix My Problem Before it Starts.” This webinar originally aired on October 19th, 2017.
Tags : 
    
Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.