policies

Results 226 - 250 of 410Sort Results By: Published Date | Title | Company Name

4 Steps to Successful IT Systems Management

Published By: Kaseya     Published Date: Feb 11, 2014
Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.
Tags : 
kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies
    
Kaseya

Reporting: Five Easy Steps to Improve IT’s Reputation and Excel at Audits

Published By: Kaseya     Published Date: Mar 12, 2015
Turn management data into actionable business information that helps create operational efficiencies and demonstrate value.
Tags : 
data management, business information, audits, inventory information, it policies, automation management systems, it assets, it solutions
    
Kaseya

Healthcare IT Systems Management: Challenges and Solutions

Published By: Kaseya     Published Date: Mar 12, 2015
The risks of irregular maintenance and non-compliance of IT and security policies are not only measured in dollars lost but in lives saved. With such a complex and critical proposition, efficiency is paramount to fulfilling the organization’s mission of providing quality, timely patient care.
Tags : 
healthcare, daily operations, health record system, practice management, coding software, health statistics, prescribing systems, healthcare providers
    
Kaseya

Banking IT Systems Management: Challenges and Solutions

Published By: Kaseya     Published Date: Mar 12, 2015
The risks of irregular maintenance and non-compliance of IT and security policies can cost the organization much in terms of fines, lost opportunities and a damaged reputation. With such a serious and complex challenge, employing an efficient and comprehensive solution is paramount to minimize risk and instill confidence in the organization’s ability to fulfill on its compliance requirements.
Tags : 
it systems, systems management, financial institutions, banking sector, compliance hurdles, infrastructure, best practices
    
Kaseya

Healthcare IT Systems Management: Challenges and Solutions

Published By: Kaseya     Published Date: May 13, 2015
Healthcare systems are inherently distributed across large campus environments, making regular IT systems management complex and time consuming. The risks of irregular maintenance and non-compliance of IT and security policies are not only measured in dollars lost but in lives saved.
Tags : 
network management, network performance, service management
    
Kaseya

Mobile Device Management: Looking Beyond BYOD

Published By: Kaspersky     Published Date: Jul 22, 2016
Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?
Tags : 
kaspersky, byod, mobile device management, mobile workers, mobile security, remote security, mobile computing, smart phones
    
Kaspersky

TicketsNow Scores Big with Paid Search from Kenshoo Enterprise

Published By: Kenshoo     Published Date: Aug 06, 2012
TicketsNow, a leading online resale marketplace for sports, concert, and theater tickets, has created a strong paid search program to drive visitors and conversions to its site, TicketsNow.com. In 2010, TicketsNow began using Kenshoo Enterprise to manage its robust paid search campaigns. Using Kenshoo's algorithmic rules and model-based bid policies, TicketsNow has been able to effectively optimize millions of keywords and double overall contribution from its search engine marketing. To build on its success with the Kenshoo Universal Platform, TicketsNow sought to expand its efforts into social marketing with Facebook ads.
Tags : 
kenshoo, ticketsnow, cost-per-fan, kenshoo social, marketing, sales
    
Kenshoo

NetGiant Improves ROI Using Kenshoo's Customised Bid Policies

Published By: Kenshoo     Published Date: Aug 07, 2012
Kenshoo Portfolio-Based Algorithm Delivers 44% Life in Overall Revenue
Tags : 
roi, bid management, search marketing, sem, kenshoo, netgiant, bid policies
    
Kenshoo

Briefing: The Future of IT – Preparing for modern delivery of IT

Published By: KPMG     Published Date: Jun 06, 2019
Organisations increasingly need a delivery model for technology that can keep pace with the market. This is about more than doing the basics faster. Find out what ‘modern delivery’ looks like. Read this briefing to discover: • why modern deliver is a key enabler for the customer-centric, connected enterprise • how organisations can make better decisions before development begins • how future development teams will be organised • how to adjust policies and controls to create space for innovation • critical steps for achieving frictionless agility at scale.
Tags : 
    
KPMG

Customer Centricity and the CHRO

Published By: KPMG     Published Date: Jun 06, 2019
Leading companies are focused on increasing customer satisfaction and retention by taking an organisation-wide, customer-centric approach. Find out about the critical role HR has to play in elevating the customer experience. Read this report to discover: • how HR can influence the customer agenda • how to take advantage of AI and D&A to recruit the right people • what skills customer service employees will need as a result of automation • how to win senior buy-in for new HR policies and approaches • seven action steps for building a customer-centric culture.
Tags : 
    
KPMG

Report: Data ethics in a digital economy

Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG

How to Drive Productivity by Focusing on Your Hourly Employees

Published By: Kronos     Published Date: Sep 20, 2018
Kronos for Retail allows you to offer associates preferred scheduling options, mobile self-service, fairer application of workplace policies, and perfect paychecks. The result? Associates who are more loyal, productive, and motivated to deliver exceptional customer service.
Tags : 
    
Kronos

LTI helped reducing operation cost by 50% for a largest national multiline insurance company

Published By: Larsen & Toubro Infotech(LTI)     Published Date: Feb 18, 2019
The largest national multiline insurance had built a repository of Insurance policies (P&C and Life Insurance) on Microfilm and Microfiche in early 90’s, as a preservation strategy. They were grappling with issues as this technology became outdated over time: • Risk of losing their only source of data for Insurance policies and corresponding communication, need to improve data availability and speed of claims evaluation • Compliance issues, need of a WORM (write once read many) storage compliant with FINRA regulations, where data should be encrypted when at rest • Total cost for digitization compared to 10-12 years of support left to maintain insurance policies was not very encouraging • Required a low cost, cloud-based, FINRA-compliant document management solution which could provide quick access to stored data Download complete case study to know how LTI’s e-Office sDownload full case study to know how LTI’s e-Office solution enabled 50% TCO for Largest national Multiline Insurance.
Tags : 
    
Larsen & Toubro Infotech(LTI)

Using Likewise to Comply with the PCI Data Security Standard

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows, data protection
    
Likewise Software

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Published By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : 
likewise, risk, compliance, sox, security
    
Likewise Software

Mobile Malware in the UK

Published By: Lookout     Published Date: Sep 25, 2017
A report from CERT-UK and Lookout Mobile Security Mobile malware is increasingly sophisticated and as such presents a growing threat to organisations as well as consumers. The volume of malware targeting mobile devices in the UK quadrupled in 2015, with Q1 2016 already reaching 50% of 2015 numbers. Read the whitepaper to learn what factors must be accounted for to make effective mobile security policies.
Tags : 
    
Lookout

2015 Data Protection Maturity Report

Published By: Lumension     Published Date: Jun 03, 2015
The IT news over the last year has been filled with story after story on data breaches, making the release of Lumensions’ 4th annual data protection maturity report all the more relevant. Review this report for a timely analysis of the threats, responses, policies, and technologies comprising today’s shifting data security landscape. It also reveals how organizations have made progress, the steps they plan to take to address data protection challenges in 2015—and where they may still be at risk.
Tags : 
data protection, data, security, cloud, storage, infrastructure, business intelligence, database development
    
Lumension

Intelligent Whitelisting: An Introduction to More Effective and Efficient Endpoint Security

Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension

2015 State of the Endpoint Report: User-Centric Risk

Published By: Lumension     Published Date: Jun 03, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity, business technology
    
Lumension

2015 State of the Endpoint Report: User-Centric Risk

Published By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity, cloud computing
    
Lumension

2015 Data Protection Maturity Report

Published By: Lumension     Published Date: Jun 05, 2015
Lumension’s fourth-annual survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.
Tags : 
data protection, threats, security landscape, shifting data, data maturity
    
Lumension

Intelligent Whitelisting: An Introduction to More Effective and Efficient Endpoint Security

Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension

Is Your Acceptable Use Policy Social Media Proof?

Published By: M86 Security     Published Date: Dec 01, 2010
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : 
m86 security, social media policy, web acceptable use policies, aups, email and web security, email security, security policies, web service security
    
M86 Security

Is Your Acceptable Use Policy Social Media Proof?

Published By: M86 Security     Published Date: Feb 09, 2011
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : 
m86 security, social media policy, web acceptable use policies, aups, email and web security
    
M86 Security

Throughput and Scalability Report

Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering
    
McAfee
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.