information work

Results 1 - 25 of 486Sort Results By: Published Date | Title | Company Name

Email is a useful tool for communication but not the answer to collaborating and increasing producti

Published By: 4Retail     Published Date: Nov 19, 2009
If you find yourself under the burden of mass emails and wasting valuable time sifting through volumes of unnecessary information, read on to find out why you are not alone and how you can change your working practices by looking to alternative ways of communicating.
Tags : 
email overload, communication, document management, problem of spam, project management, global sourcing, global sourcing management, on demand collaboration solution, email viruses, communication tool, growing inboxes, document upload, email security, content management system, email archiving
    
4Retail

Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work

Published By: Accelops     Published Date: Nov 05, 2012
Read this white paper to learn about guidance to operationalize security and put the top 10 best SIEM practices to work, offering pertinent insights and details about how to gain more assure value from security information and event management.
Tags : 
siem, information security, security information, event management, security, business technology
    
Accelops

Addressing HIPAA Requirements for Electronic Communications

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Healthcare providers are starting to realize that using electronic communication, collaboration, and social networks to keep in touch with each other and with patients can improve the quality of care they provide. However, it also exposes them to risk since the information they share on these networks has to be protected in order to meet specific regulatory guidelines, like those mandated by HIPAA. The prescription for success is to consider compliant use of these networks before and while they are being used and the technology that helps achieve that goal. Read this paper to gain an understanding of: What the regulatory landscape of the healthcare industry looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, hipaa requirements, social networks, compliance, it management, enterprise applications
    
Actiance, Inc.

Best Practices for Using Electronic Communications In The Public Sector

Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, public sector, social networking platforms, compliance, real-time communication, it management, enterprise applications
    
Actiance, Inc.

Addressing the Document Disconnect: Hidden Opportunity, Big Payoff

Published By: Adobe     Published Date: Apr 13, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes. Learn how organizations of all sizes in all industries around the world are suffering from what we call the “document disconnect.” Learn how this is causing significant delays and errors across critical business functions such as sales contracting and quoting, procurement, talent acquisition, and onboarding. Download this white paper to learn more.
Tags : 
adobe, talent acquisition, sales contracting, sales quoting, document disconnect, collaboration, productivity, project management, human resources services, workforce management software
    
Adobe

Addressing the Document Disconnect: Hidden Opportunity, Big Payoff

Published By: Adobe     Published Date: Aug 11, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : 
adobe, enterprise, mobile, security, saas, document management, cloud, it management, human resource technology, business technology
    
Adobe

Addressing the Document Disconnect: Hidden Opportunity, Big Payoff

Published By: Adobe     Published Date: Nov 10, 2015
Download this white paper to hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : 
adobe, information technology, data management, business technology, document disconnect, sales management, contracts, e-signatures, quote to cash, sales contract management, software development, it management, knowledge management
    
Adobe

Managing Anonymous and Authenticated Experiences Across the Customer Lifecycle

Published By: Adobe     Published Date: Mar 03, 2017
Today, customer identity is the only constant in digital marketing. But as consumers switch from desktop to mobile, they are more and more difficult to recognize. But it’s not impossible. The Adobe white paper, Managing Anonymous and Authenticated Experiences Across the Customer Lifecycle, explains best practices to identify your anonymous and authenticated customers while complying with regulations, contracts, and industry standards. Read the paper to learn: • The benefits of well executed personalization • How to navigate the landscape between anonymous and authenticated data • Safe and effective uses of consumer information • The technological building blocks to put these new methods to work
Tags : 
personalization, authenticated data, anonymous data, consumer information, customer life cycle, customer experience
    
Adobe

Bot Manager Advanced strategies to flexibly manage the long-term business and IT impact of bots

Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
    
Akamai Technologies Australia

Advanced Strategies to Flexibly Manage the Long-Term Business and IT Impact of Bots

Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia

How to Leverage Log Data for Effective Threat Detection

Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
AlienVault

Best Practices for Leveraging Security Threat Intelligence

Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault

Point of Sale (POS) Security: Defending against POS Malware

Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault

Practical Threat Management for Educational Institutions

Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault

IDS Evaluation Guide

Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault

Frost & Sullivan: What you SIEM is what you get

Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault

AlienVault® USM™: The Perfect Rx for HIPAA Compliance

Published By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
    
AlienVault

Case Study: Maximize productivity with a healthy EHR core

Published By: Allscripts     Published Date: Oct 20, 2014
Download this case study to learn how Allscripts Professional solutions have enabled Pulmonary Associates of Richmond to meet Meaningful Use, earning incentives of $714,000.
Tags : 
allscripts, pulmonary associates, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts

Case Study: Forward-looking practice uses EHR to move toward new payment models

Published By: Allscripts     Published Date: Oct 20, 2014
Download this case study to learn how Allscripts Professional solutions have helped Cornerstone Medical Care in Brandon, Florida negotiate value-based contracts, accounting for a seven-figure increase in revenue.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts

Free Whitepaper: How to Win with Value-based Care: Developing Your Practice’s EHR Strategy

Published By: Allscripts     Published Date: Feb 18, 2015
Value-based care has arrived. Does your practice have a strategy ready? Download this step-by-step guide to planning and executing a value-based care strategy that's right for your individual practice needs.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts

Case Study: Forward-looking practice uses EHR to negotiate value-based contracts

Published By: Allscripts     Published Date: Feb 18, 2015
Download this case study to learn how Allscripts Professional solutions have helped Cornerstone Medical Care in Brandon, Florida negotiate value-based contracts, accounting for a seven-figure increase in revenue.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts

5 Ways the Cloud Can Drive Economic Development

Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Government agencies often look to promote new technology for cost-savings and efficiency, but it does not stop there. The second and third-tier effects of technology can be long lasting for citizens, businesses, and economies. When public institutions adopt the cloud, they experience an internal transformation. Inside an organization, cloud usage drives greater accessibility of data and information sharing, increases worker productivity, and improves resource allocation. The external benefit of the cloud is recognized through a government’s ability to put reclaimed time and resources toward serving citizens. This includes provisioning public services, such as occupational-skills training, quicker and more effective service delivery, a pathway to a more productive workforce, and ultimately, a boost to local development. This whitepaper examines the enterprise-level benefits of the cloud, as well as the residual impact on economic development. The U.S. Economic Development Administration
Tags : 
    
Amazon Web Services APAC

Distributed Denial-of-Service Attacks: Time for a New Defense

Published By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : 
arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud, cloud migration, high-bandwidth attacks, volumetric attacks, deployment, multi-vector threat, ips solutions, deployment models, security, infrastructure, business intelligence, business management, secure content management
    
Arbor

The Information Governance Maturity Model: A Foundation for Responding to Litigation

Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management, best practices, business intelligence
    
ARMA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.