policies

Results 201 - 225 of 409Sort Results By: Published Date | Title | Company Name

Getting a Grip on Content: Empowered Content Collaboration in the Cloud

Published By: IBM     Published Date: Jan 19, 2017
This ebook takes you on a journey to discover a cloud-based content management solution that provides greater visibility and collaborative control over business content. Meet Mike, an IT Solutions Executive, looking for an innovative way to collaborate that's secure, easy to use, immediate and accessible -- all while meeting strict governance policies.
Tags : 
ibm, analytics, ecm, box, box for it, content, cloud, content management
    
IBM

Mobile Is The New Playground For Thieves

Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM

The Business Value of a Security Monitoring and Analytics Platform

Published By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 05, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises.
Tags : 
    
IBM

Stop Rowing Alone: Integrated Cybersecurity Ecosystems Will Get You Further

Published By: IBM     Published Date: Jun 05, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM

Stop Rowing Alone: Integrated Cybersecurity Ecosystems Will Get You Further

Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM

Banking Webinar - New Risk Management Strategies

Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, financial, quality, risk, management, cost, reduce costs, effiency
    
IBM ILOG.

Healthcare Video - How to Improve Customer Experience In Private Health Insurance

Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, health, healthcare, customer, service, private, epxperience, insurance
    
IBM ILOG.

Author and deploy rules using Webe ILOG JRules Business Rules Management SystemSpher

Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : 
ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
    
IBM ILOG.

Mobile Device Management for Manufacturing

Published By: IBM MaaS360     Published Date: Apr 15, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360

Mobile Device Management for Manufacturing

Published By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, networking, security
    
IBM MaaS360

The Value of Enterprise SSO to HIPAA Compliance

Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa
    
Imprivata

Eight Elements of Effective Information Security Policies

Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002
    
Information Shield

The Business Need for Updated Information Security Policies

Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799
    
Information Shield

5 Reasons to Manage with Controls

Published By: Intellitactics     Published Date: Feb 28, 2008
Learn how best-in-class organizations are using controls to lower operating costs, support higher scale, reduce security risks, and maintain consistent policies for security and compliance.
Tags : 
siem, intellitactics, compliance, security management, risk management
    
Intellitactics

Insurance Contact Centers in the Cloud

Published By: Interactive Intelligence     Published Date: Sep 11, 2013
Contact centers have long played a vital role in the insurance industry. Prospects and customers use them to get product information and quotes and then submit applications. Insurance agents and advisors rely on contact centers to tap into expertise and handle business and technical issues. Policyholders and members make inquiries or changes to their policies, or conduct financial transactions. Claimants call in to report accidents and check on the status of their claims. The list could go on, but the meaning is clear. Contact centers are major contributors to many key parts of the insurance business, especially the parts that require direct interaction with customers or agents. As a result, contact centers now play a critical role in an insurer’s journey toward becoming more customer-centric.
Tags : 
interactive intelligence, contact centers, insurance industry, prospects, customers, product information, quotes, members
    
Interactive Intelligence

Cloud Communications and the Federal Government: Opportunities to Seize

Published By: Interactive Intelligence     Published Date: Apr 23, 2014
To put it carefully, certain technology decisions at the federal level since 2002 have been questionable. But citing new “Cloud First” policies for implementations in government contact centers, data centers, and federal agencies, cloud initiatives are now showing value by way of cost reductions and broader functionality. Abdo Rabadi of Blue Kite Consultants and Mechele Herres of Interactive Intelligence say even more benefits of the cloud await. Read how the federal government can best achieve them.
Tags : 
interactive intelligence, cloud communications, cloud, cloud solutions, government, cloud providers, business process automation, contact center
    
Interactive Intelligence

Demonstrate PCI Compliance through Better Change Management

Published By: ITinvolve     Published Date: Jun 01, 2012
Demonstrating PCI compliance with policies and regulations is an IT necessity, especially when periodic audits are conducted. ITinvolve has a better approach to change management with the capability to identify official PCI systems and their associated policies and documentation thus eliminating manual processes and reducing the risk of errors and delays.
Tags : 
it operations, information technology, audit, compliance, pci, governance, productivity, software compliance
    
ITinvolve

Accurately Demonstrate Compliance With Far Less Effort

Published By: ITinvolve     Published Date: Apr 16, 2013
Demonstrating compliance with policies is a chore for any IT operations organization and often seen as a distraction from the "real work" needed to keep IT services up and running. What if there was an approach that enabled you to demonstrate compliance with policies easily and also helped you better manage day-to-day operations as well? Read this use case document to understand how social knowledge collaboration can help you achieve this today.
Tags : 
itinvolve, compliance with far less effort, social knowledge collaboration, collaboration, it services
    
ITinvolve

Understand and React to Policies Assigned to Your Assets

Published By: ITinvolve     Published Date: Apr 16, 2013
Most assets in IT are governed by one or more policies, yet there is usually no quick and easy method to determine which policies apply to which assets and what specifically those policies govern. This means that IT teams are often making changes to assets that violate the policies meant to govern them. Read this use case document to understand how social knowledge collaboration techniques can help you to easily assign and track the policies that govern your assets to avoid out of compliance situations.
Tags : 
itinvolve, policies, it teams, compliance situations, social knowledge collaboration, techniques
    
ITinvolve

Why Taking a Unified Approach Is Essential to Hybrid Cloud Security

Published By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : 
cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx
    
Juniper Networks

4 Steps to Successful IT Systems Management

Published By: Kaseya     Published Date: Feb 11, 2014
Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.
Tags : 
kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies
    
Kaseya
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.