pto

Results 151 - 175 of 436Sort Results By: Published Date | Title | Company Name

Limited Access to Patient Records Risking Medical Errors?

Published By: RES Software     Published Date: Jul 03, 2012
Give your clinicians access to a single, secure and HIPAA compliant workspace. Using their laptop, tablet or smartphone, they can quickly access patient data on the go, while you retain control of your devices.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, desktop migration
    
RES Software

5 Security Tips to Help Financial Services Professionals Work From Anywhere (Finance)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
finance, data encryption, mobility, security, data
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device (Healthcare)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
healthcare, mobility, data security, security tips, personal device
    
Citrix ShareFile

5 Security Tips to Help You Work on Your Personal Device

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
More and more people are using their personal devices to work from home, but are they secure enough? With the proper preparation, your laptop or smartphone can actually help improve security. Read our white paper for 5 easy tips to work securely on your personal device: Where to store your files to avoid data theft or loss Why those pesky update notifications are too important to ignore How often you should change your passwords, really
Tags : 
data security, personal device, security tips, passwords
    
Citrix ShareFile

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions

Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout

Data protection for endpoints eBook

Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite

Power and Signal

Published By: TE Connectivity     Published Date: Apr 13, 2018
Whether you’re designing to efficiently charge-up a laptop, distribute power from a battery pack, keep signals uninterrupted in industrial machinery or a thousand other products, TE Connectivity offers reliable solutions that bring power & signal to your applications. TE Connectivity’s (TE) extensive connector and sensor solutions provide the essential connectivity you need for your daily interactions at home and in the workplace. Whether you are looking to design next generation display panels and internal LED lighting or you’re designing-in for the latest door alarms and pressure sensors, TE has the essential products you need for always-on connectivity.
Tags : 
power, signal, connect, solutions, display, workplace, industrial
    
TE Connectivity

Analyst Report: Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017

Published By: Splunk     Published Date: Nov 29, 2018
Gartner Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017 Splunk Jumps From #5 in 2016 to #2 in Top 10 Named ITOM Performance Analysis Software Vendors, Worldwide, 2017 Splunk is ranked #2 of overall ITOM Performance Analysis Software Vendors, according to Gartner’s report, Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017. This Gartner report also lists Splunk as one of several disruptors in the table “Market Share of Incumbents vs. Disruptors - ITOM Performance Analysis Software.” As a Splunk customer, are you utilizing your machine data platform to its fullest potential? Learn about newest trends in ITOM software tools across AIOps, APM, infrastructure monitoring and Network performance monitoring and diagnostics. Download this report to learn: 2017 rankings of performance analysis software vendors, overall and subsegments How digital business is driving demand for modern, agile monitoring tools via DevOps toolchains Shifts in
Tags : 
application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
    
Splunk

The New Face of the Modern Workplace

Published By: Cisco     Published Date: Sep 27, 2018
The pace of innovation for collaboration and unified communications (UC) technologies has been nothing short of incredible during the past few years. IT teams are now able to deliver consistent, simple and high- quality experiences with voice, video, messaging and chat from any smartphone, tablet, laptop or conference room system. Users can move seamlessly and securely from one device to the next, escalate from one communication mode to another and share content—all while retaining the context of the meeting or discussion.
Tags : 
    
Cisco

How to Stay Protected Against Ransomware

Published By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Sophos

Learn about Mobile Data Protection from an Expert

Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.

Answers to Your Mobile Device Data Protection Questions

Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.

Autonomous can Help you Reshape your Approach to IT

Published By: Oracle     Published Date: Mar 01, 2019
To keep up with rapid growth and stay ahead, disruptor fintechs must stay agile and go on innovating. Bangkok-based Forth Smart provides payment gateways that turn cash into digital currency via its thousands of vending machines. They needed to approach ITin new ways in order to free up budgets, resources and imaginations to focus on innovation. Oracle Cloud Specialist Marek Winiarski, talked to Forth Smart’s Data Scientist, Pawarit ‘Taa’ Ruengsuksilp about how the company has made cost savings and improved customer experience by adopting Oracle Autonomous Data Warehouse.
Tags : 
    
Oracle

Decoding disruption: How to develop a strategy for navigating disruption

Published By: KPMG     Published Date: Jul 10, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: • how established organisations are meeting the challenge from disruptors • what models they’re using to gain first-mover access to technology innovation • why designing an overall portfolio of disruption responses is key • how to navigate disruption successfully, with a clear four-step approach.
Tags : 
    
KPMG

Decoding disruption: How to develop a strategy for navigating disruption

Published By: KPMG     Published Date: Jul 10, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: • how established organisations are meeting the challenge from disruptors • what models they’re using to gain first-mover access to technology innovation • why designing an overall portfolio of disruption responses is key • how to navigate disruption successfully, with a clear four-step approach.
Tags : 
    
KPMG

The Benefits of Having a Server

Published By: Dell & Microsoft     Published Date: Jul 23, 2013
As small businesses grow, many reach a point when their computing systems falter. A company with only a handful of employees can usually get by with disconnected computers and software packages. But as you add desktops, laptops and other devices to support an increasing headcount, the system can become so cumbersome that productivity and customer service start to suffer.
Tags : 
benefits, server, small business, it management
    
Dell & Microsoft

Solving the Data Migration Challenge with Endpoint Backup

Published By: Code42     Published Date: Mar 31, 2017
Data migration strikes dread in the hearts of IT admins everywhere. It’s expensive, time-consuming, and often results in data loss. As the amount of enterprise data on laptops increases, the time and burden it takes to manage the continuous tech refresh process increases as well. But it doesn’t have to.
Tags : 
    
Code42

Cloud-based Billing Management Disrupts the Role of the CFO

Published By: BillingPlatform     Published Date: Apr 18, 2019
Organization leaders and companies of all sizes are leveraging digital transformation to lead their markets with disruptive technology. CFOs can get in front of these technologies with a cloud-based billing solution and lead their businesses to greater success. This eBook explores how the right solution can help you: • Increase streams of revenue with new technologies like IoT and cryptocurrency • Launch product innovations quickly • Automate billing to improve customer retention Discover more today.
Tags : 
    
BillingPlatform

What You Need to Know Now for Modern Backup Data Protection Buyer’s Guide for Enterprise Storage

Published By: HP     Published Date: Feb 02, 2015
Everyone agrees that data is the lifeblood of any business. Just think how tense you get when your laptop crashes and you realize you have not saved that critical document. Or put yourself in the shoes of your company’s sales teams when they suddenly find themselves unable to access information related to a deal in the pipeline at the end of the quarter because it is corrupted or went missing because of a database or server issue. Data protection is—and always will be—a constant concern.
Tags : 
    
HP

What You Need to Know Now for Modern Backup Data Protection Buyer’s Guide for Enterprise Storage

Published By: HP     Published Date: Feb 11, 2015
Everyone agrees that data is the lifeblood of any business. Just think how tense you get when your laptop crashes and you realize you have not saved that critical document. Or put yourself in the shoes of your company’s sales teams when they suddenly find themselves unable to access information related to a deal in the pipeline at the end of the quarter because it is corrupted or went missing because of a database or server issue. Data protection is—and always will be—a constant concern.
Tags : 
    
HP

FICO® Optimization Solutions for Manufacturers (Executive Brief)

Published By: FICO     Published Date: Nov 30, 2016
Historically, manufacturers have “looked to the past” to help predict what they need to do in the future. This would include basic business intelligence, powered by spreadsheets, and even manual processes. The challenge is that what will happen may be something outside of what the past can predicts – who, 25 years ago, would have considered the Internet as a primary vehicle for commerce, or that Big Data would become both a treasure and a tragedy for organizations? Consider other factors, such as regulations, largely transient customers (where loyalty and brand aren’t what they used to be), disruptors (such as new entrants and technologies), and the need for manufacturers to “move faster than ever” – in effect, to be able to plan for the future before it happens.
Tags : 
manufacturing optimizations, enterprise software, infrastructure, networking, it management, knowledge management, enterprise applications, data management
    
FICO

Leading The Emerging Composable Enterprise

Published By: MuleSoft     Published Date: Sep 08, 2016
The organization as we’ve known it is barely clinging to life support. Increasingly, the calcified, creaky business systems and processes that have been embedded in organizations for decades are being swept away by more agile digital disruptors. Online and app-based companies powered by cloud, open APIs, data analytics, mobile, social, and connected to the Internet of Things are redefining markets and raising consumer expectations.
Tags : 
mulesoft, forbes, api, cloud, data analytics, business analytics, business intelligence, business management
    
MuleSoft

Care Is The New Marketing

Published By: Sprinklr     Published Date: Feb 28, 2018
"Complacency is kryptonite for customer care. It’s an evolving organism that requires speed and constant attention, and that’s why it’s imperative to stay up-to-date. Download for help with handling the complexities of social media, driving engagement, and increasing retention."
Tags : 
social customer care, customer care, customer care program, customer service, social customer service, social media customer service, social media, social
    
Sprinklr

The Cloud as the Great Equalizer

Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted?
Tags : 
cloud computing, digital economy, digital disruption, business operations
    
IBM

DataStax Enterprise: The Hybrid Cloud Data Layer Built for Disruptors

Published By: DataStax     Published Date: Nov 02, 2018
In this eBook, we’ll take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
DataStax
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.