claim

Results 1 - 25 of 198Sort Results By: Published Date | Title | Company Name

The 8 Criteria for Enterprise-Grade Communications as a Service

Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Many companies claim to offer enterprise grade communications solutions. But how is “enterprise grade” measured and what should you look for? This fact-filled white paper outlines 8 ways to determine whether or not your provider is equipped to offer an enterprise-grade communications solution. Download this complimentary white paper: The 8 Criteria for Enterprise-Grade Communications as a Service 8x8 shares full technical details on what to expect from an enterprise-grade service platform that stands above the rest. You’ll learn the 8 criteria to look for including: What to expect when it comes to service level guarantees What geo-routing technology is and why it’s critical for optimizing global call clarity and reliability What you should look for in your communications provider’s network for global operations and superior service Which security and compliance certifications to expect from your provider Specific uptime and reliability metrics to ask your provider for How analytics
Tags : 
communications, enterprise grade, communications solution, 8x8, geo-routing
    
8x8 Inc.

2017 Digital Trends

Published By: Adobe     Published Date: Aug 02, 2017
This digital trends report shows that this era of experience is definitely here, but it also highlights some key challenges for businesses making the change. For example, the respondents overwhelmingly claim that customer experience is their most exciting opportunity. Many of them are investing in content and design, looking to create those experiences that will feel personal, compelling and memorable.
Tags : 
customer experience, insights, shared service value, consolidated services, global services division, organization optimization, social analytics, accounts receivable
    
Adobe

Security Starts at the Edge: The 2019 Security Buyer’s Guide

Published By: Akamai Technologies     Published Date: Aug 30, 2019
Security is the foundation of digital business innovation. It’s a bold claim; one that hasn’t always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, it’s that security-related incursions are inevitable. And it’s news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation.
Tags : 
    
Akamai Technologies

Security Starts at the Edge: The 2019 Security Buyer’s Guide

Published By: Akamai Technologies     Published Date: Sep 04, 2019
It’s a bold claim; one that hasn’t always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, it’s that security-related incursions are inevitable. And it’s news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, there’s no longer a choice. As a CIO, CISO, or other security or IT leader, you know it’s your job to be the central agent stressing the connections between business and digital risk. It’s your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. That’s up from 40% in 2018. Whether you’r
Tags : 
    
Akamai Technologies

5 Ways the Cloud Can Drive Economic Development

Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Government agencies often look to promote new technology for cost-savings and efficiency, but it does not stop there. The second and third-tier effects of technology can be long lasting for citizens, businesses, and economies. When public institutions adopt the cloud, they experience an internal transformation. Inside an organization, cloud usage drives greater accessibility of data and information sharing, increases worker productivity, and improves resource allocation. The external benefit of the cloud is recognized through a government’s ability to put reclaimed time and resources toward serving citizens. This includes provisioning public services, such as occupational-skills training, quicker and more effective service delivery, a pathway to a more productive workforce, and ultimately, a boost to local development. This whitepaper examines the enterprise-level benefits of the cloud, as well as the residual impact on economic development. The U.S. Economic Development Administration
Tags : 
    
Amazon Web Services APAC

Carolinas HealthCare System Exceeds Goal to Reduce Claim Edit Backlog, Recovers Millions in Revenue

Published By: Availity     Published Date: Aug 08, 2013
Carolinas HealthCare System was growing, and as claim volumes mounted, claim error rates doubled. Find out how they recovered $8 million, brought claim edit backlog to zero, and reduced claim edits by 97 percent.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield, realmed, availity, practice billing, health plans, eligibility and benefits, denial management, health network, clearinghouse, denials, claims, transactions, hipaa
    
Availity

Adventist Health System Optimizes Multiple Billing Offices by Using a Common Tool to Drive Revenue

Published By: Availity     Published Date: Aug 08, 2013
Adventist Health System was troubled by inconsistent billing practices and disparate systems across seven central billing offices. Find out how they reduced time-to-payment by 17 percent -- bringing days in accounts receivable to an all-time low -- by standardizing processes and improving workflow with RealMed (now known as Availity Revenue Cycle Management).
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield, realmed, availity, practice billing, health plans, eligibility and benefits, denial management, health network, clearinghouse, denials, claims, transactions, hipaa
    
Availity

Asheville Anesthesia Associates Achieves Dramatic Improvements in Time-to-Payment Goals

Published By: Availity     Published Date: Aug 08, 2013
Asheville Anesthesia Associates faced a growing accounts receivable file and a payment collection process that was too slow. Learn how they used RealMed (now known as Availity Revenue Cycle Management) to reduce time-to-payment by 75 percent, and reduce their average days in A/R by 62.5 percent.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield, realmed, availity, practice billing, health plans, eligibility and benefits, denial management, health network, clearinghouse, denials, claims, transactions, hipaa
    
Availity

American Health Network Reduces Denial Management Time by 75 Percent, Realizes ROI of 200 Percent

Published By: Availity     Published Date: Aug 08, 2013
American Health Network faced one of the most vexing problems in health care: Claim denials. Learn how this physician-owned practice realized an ROI of 200 percent and recovered $1.4 million.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield, realmed, availity, practice billing, health plans, eligibility and benefits, denial management, health network, clearinghouse, denials, claims, transactions, hipaa
    
Availity

The Definitive Guide To Sales and Use Tax

Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, enterprise applications
    
Avalara

Riteway Compares Options on AWS Marketplace, Chooses Spotfire for 93% Faster Insights

Published By: AWS     Published Date: Nov 15, 2018
"Riteway Sales and Marketing, who helps many Southeastern supermarkets execute marketing strategies, needed an intuitive solution to visualize data in multiple ways, including geographic coding that could map gathered data to store locations. TIBCO® Spotfire® for Amazon Web Services cloud met their requirements and exceeded them. After deploying this solution, Riteway’s Director of Insights and Marketing, Elisa Westlund, claimed that their time-to-insight rose to 93% faster than it was before using it. When analyzing a product category, they found that what used to take a week for their team to accomplish could now be completed in only hours. Download this case study to learn more about TIBCO Spotfire’s benefits, including: • Riteway’s claim of time-to-insight that rose 93% faster than before using TIBCO Spotfire • A complete return on investment in just one year • 100% adoption among their business users, due to TIBCO Spotfire’s ease of use"
Tags : 
    
AWS

How Trupanion Became an AI-driven Company for Pets

Published By: AWS     Published Date: Jul 24, 2019
Trupanion, a Seattle-based medical insurance provider for cats and dogs, needed to find data insights quickly. With only 1% of pet owners insured, the process of evaluating a claim to approve or deny payment was manual and time-consuming. Building accurate predictive models for decision-making required manpower, time, and technology that the small company simply did not have. DataRobot Cloud, built on AWS, helped Trupanion create an automated method for building data models using machine learning that reduced the time required to process claims from minutes to seconds. Join our webinar to hear how Trupanion transformed itself into an AI-driven organization, with robust data analysis and data science project prototyping that empowered the company to make better decisions and optimize business processes in less time and at a reduced cost. Join our webinar to learn: Why you don’t need to be an expert in data science to create accurate predictive models. How you can build and deploy pr
Tags : 
    
AWS

See what Forrester Research is saying about enterprise email security

Published By: Barracuda     Published Date: Oct 14, 2019
In its guide for buyers considering email-security solutions—a detailed analysis of products and services—Forrester’s evaluation gave Barracuda the highest score possible in the cloud integration, deployment options and support and customer success criteria. Get full report and see all the details for yourself, including innovative solutions for email authentication and incident response and for preventing account takeover, business email compromise (BEC) and spear-phishing. Claim your complimentary copy right now!
Tags : 
    
Barracuda

Not All Cybersecurity Machine Learning Is Created Equal

Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
" Artificial intelligence and machine learning approaches provide radically new and improved endpoint protection. But not all companies' claims of using machine learning add up to a threat prevention strategy. Know the difference."
Tags : 
    
BlackBerry Cylance

Predictive Malware Response Test

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance

Hospital Takes on Cybersecurity

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance

Ransomware Prevention Is Possible: Fighting Today’s Extortive Threats

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance

Why Cylance Beats the Competition When It Comes to Endpoint Protection

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance

Cloud Data Protection? Ask The Tough Questions

Published By: Blue Coat     Published Date: Feb 09, 2016
Lots of marketing claims are being made by Cloud Data Protection Gateway providers. It’s time for critical analysis. This Blue Coat paper reviews the key questions Security, Governance & Risk and IT should be asking vendors.
Tags : 
    
Blue Coat

10 Hidden Costs of a Premises-Based (PBX) System

Published By: Broadsoft     Published Date: Jun 14, 2017
Many premises-based phone system (PBX) manufacturers claim that the five year costs of their systems are lower than an equivalent cloud alternative. What the premises guys don’t tell you about is all the extra little hidden costs that come as a result of the limitations of the hardware and software in their systems. This guide will provide you with useful questions to ask your PBX manufacturer to ensure that you're getting the full picture on the cost of their system. Questions to Ask During an Evaluation: • Have you sized this system for my peak demand? • Have you factored in the cost of site redundancy? • How many hours of call recording are included? • How is mobility supported? Do calls route in an out of the PBX for call treatment? • What are the annual maintenance costs of the hardware and software in this system? • Which third party systems have you integrated this PBX with?
Tags : 
    
Broadsoft

Break Through The Hype: Uncover the Reality of AI

Published By: Bronto     Published Date: Jul 10, 2017
Artificial intelligence (AI) is a hot topic in commerce marketing and may be the fastest growing technology trend today. Experts believe AI will have a huge impact on our daily lives, our interactions with one another and the broader economy. A growing number of commerce marketing software providers claim their systems use AI. But it can be difficult to know for sure what that means for your brand and how you can use it to market products and services more effectively to consumers. Does the rise of AI and related technologies signal a sea change in commerce marketing? In a word, yes. Let’s take a closer look at these techniques and how they can boost your marketing efforts and success. We’ll also look at their limitations and the questions you can ask to help you distinguish between marketing hype and tools that can provide value for your business.
Tags : 
artificial intelligence, commerce marketing, branding
    
Bronto

Reclaiming Control of Mobile Development with Devops

Published By: CA Technologies     Published Date: Oct 08, 2014
In this Gigaom Research Webinar, we will examine the impact mobility has had on application development, the pain points experienced when businesses try to manage mobile development across the enterprise, and the role automation, DevOps and other rapid development tools play in moving IT from inhibitor to enabler.
Tags : 
ca technologies, mobile applications, application development, mobile apps, apps, mobile development, devops, mobile computing, smart phones, wireless application software, application integration, web development
    
CA Technologies

Crossing the Chasm Between Demand Intake and Business Outcomes

Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Modern solutions like CA PPM continue to raise the bar above last-generation IT demand management tools, continuously providing new features to ease the burden of the PMO, the financial manager, the resource manager and the product manager. In the last few years, new vendors looking to exploit the large and increasingly influential project and portfolio management (PPM) market have developed modules that “snap” into their SaaS platforms. These vendors claim their tools are easy to install, easy to manage and save customers money. It sounds too good to be true. And for most organizations, it is. Carefully consider whether you need a PPM solution that is only capable of providing low-level functionality for the project manager, or if your organization could benefit from PPM technology that provides 360-degree optics across your organization, delivers actionable business intelligence and enables extensive modeling and forecasting capabilities to make data-driven business decisions.
Tags : 
    
CA Technologies EMEA

Cut Costs, Meet Strategic Goals and Manage Document Processes With Confidence

Published By: Canon Business Process Services, Inc.     Published Date: Aug 17, 2015
This paper will explore the potential of applying business performance management (BPM) principles to advance document performance management (DPM) in a way that enables organizations to reduce costs; better manage documents as vital strategic, ?nancial and information assets; and secure positive returns on investments from outsourcing. An example of this approach — spotlighted later in this paper — is MAX, a document performance management system that enables companies to more effectively manage their document processes and outsourcing service providers.
Tags : 
canon business process services, document management, document imaging, business performance management, outsourcing services, managed services, balanced scorecard framework, slas, service level agreements, improving operational efficiency, improve business results, six sigma methods, document services, claims processing, document processing, forms processing, it management
    
Canon Business Process Services, Inc.

“Quality” in Health Care: Understanding All the Dimensions and Components

Published By: Castlight Health     Published Date: May 06, 2014
Poor quality of care takes a tremendous toll, not just on the system as a whole, but on the patients and their families at the center of that system. It also has a tremendous effect on employers, who already face unsustainable health care costs. When we evaluated one of our customer's claims, we found numerous signs of preventable complications that had cost our client significant amounts, not to mention the toll on the individual. Specifically, we identified the following preventable hospital- acquired conditions (HACs): • Fourteen instances of stage III and IV pressure ulcers • Twelve instances of vascular catheter-associated infections • Thirteen instances of catheter-associated urinary tract infections • One instance of a patient dying or experiencing a serious disability associated with intravascular air embolism • Five instances of foreign objects remaining in patients after a procedure. Please download the whitepaper to learn more!
Tags : 
healthcare, healthcare quality, intravascular air embolism, preventable complications, castlight health, hospital-acquired conditions, medical errors, health insurance, inappropriate care, unsustainable costs
    
Castlight Health
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.