business

Results 13826 - 13850 of 14138Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : 
access manager, security, cloud service, microsoft office 365, it strategies
    
IBM
Published By: Cox Business     Published Date: Dec 19, 2016
Reliable and secure network connectivity is no longer optional. It supports critical priorities for healthcare providers, including enhancing patient care outcomes, improving operational efficiency and boosting financial returns. If a healthcare provider’s network infrastructure is not resilient, reliable and secure, the provider will not be able to reap the benefits of its healthcare IT investments.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and greater convenience through the capabilities of better networking technologies, opportunities have never been greater to use technology to make for a truly seamless hospitality experience. However, growing dependence on your network for everything from booking to entertainment can also mean that hospitality networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
It’s no secret that a potent combination of new digital technologies and rising constituent expectations is transforming government. The impact is being felt at all levels, from the largest state agencies and departments to the smallest municipalities.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
Never have Distributed Denial of Service attacks been more present globally, and it’s time for the healthcare industry to take notice. They have shut down of?ces, caused ransom-like threats, and created an atmosphere where a sophisticated attack could come from almost anywhere at almost any time.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
Exposing data or suffering downtime not only creates risks to patient safety, supports identity theft and damages the hospital's reputation, but can also result in signi?cant HIPAA penalties. The costs include the time your staff spends responding to the attack and lost productivity when systems are unavailable or work needs to be redone. Investing in computer and network security is a smart ?nancial decision for hospitals.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
Solutions that make it easy to keep track of security and software updates will give you an edge like no other. In many cases, hackers target specific holes in outdated software. Rather than dealing with the headache of continually updating each computer in your network, use tools that track and perform system updates automatically. You’ll always be ahead of the curve.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
Never have Distributed Denial of Service attacks been more present globally, and it’s time for the hospitality industry to take notice. They have shut down of?ces, caused ransom-like threats, and created an atmosphere where a sophisticated attack could come from almost anywhere at almost any time.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
Businesses need to plan for unforeseen events that can disrupt productivity, impair the customer experience, and possibly even threaten a business’s existence. A disruption every business needs to plan for is any event that destroys valuable data, inhibits access to data, or causes downtime of core applications. Consider the staggering amount of information your company stores electronically. What if an unforeseen event destroyed all financial records, client contacts, and application data? You wouldn’t be able to send customers accurate invoices. Your marketing efforts might be undermined. You would lack key metrics for measuring quality, profitability, and more. The losses could be staggering. In every aspect of life, it’s smart to plan for unexpected events. That’s especially true for two plans every business must have: a disaster recovery plan and a business continuity plan.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to healthcare and other networks, and how to protect against them. As we are expected to host more and more key information on our network, we increase our risk at risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data.
Tags : 
    
Cox Business
Published By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to hospitality networks, and how to protect against them. As we are expected to host more information on our network, we increase our risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data. Customers expect to be able do everything online, and won’t tolerate any interruption in service. This expectation inhibit a situation where an attacker is holds your web services hostage, and you have to choose between paying them off or apologizing to a lot of angry customers.
Tags : 
    
Cox Business
Published By: Lookout     Published Date: Mar 28, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting.
Tags : 
mobile, security, lookout, risks
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
insights, mobile, security, byod, lookout
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : 
data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
    
Lookout
Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Comcast Business     Published Date: Oct 19, 2018
Technology has had a truly transformative impact on the healthcare space. Thanks to innovations in technology, tools and their respective processes, the practice of treating patients has shifted from mostly reactive to proactive, enabling physicians and caregivers to approach healthcare in a more holistic fashion. As part of that shift, hospitals, wellness centers and physicians’ offices are focusing on providing value over volume1, taking healthcare beyond the four walls of the facility and into patients’ homes, places of work and social centers. The concept of whole health is much easier to attain with technology such as artificial intelligence, analytics, wearables and mobile health (mHealth) apps, to name a few.
Tags : 
    
Comcast Business
Published By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a “Challenger” in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
    
Progress
Published By: Progress     Published Date: Mar 06, 2017
Formerly, buyers were limited in the ways they could gather product information. But because of the web and social media, buyer behaviors have changed. Because buyer interactions can number in the thousands or millions, businesses must use automated tools to personalize the buyer’s online experience and drive them toward a purchase decision.
Tags : 
    
Progress
Published By: Progress     Published Date: Mar 06, 2017
The Digital Ultimatum, is your first step towards building a future-proof organization that optimizes the customer experience and routinely achieves organizational excellence.
Tags : 
    
Progress
Published By: Progress     Published Date: Mar 26, 2018
Digital transformation has changed the face of business across the globe. New digital technologies— specifically, mobile devices—are opening new avenues for companies to engage their prospects and manage their operations with greater effectiveness and efficiency. However, in the healthcare space, the response to these technological innovations has been reserved. While it’s undeniable that digital transformation could bring great change to the healthcare space just as it has in other industries, obstacles like regulatory compliance and rigid systems of record discourage the adoption of new tools and technology. This has led to frustration from all sides of the healthcare ecosystem. Many people are accustomed to using intuitive digital applications in their everyday lives, so when healthcare applications deliver archaic user experiences, everyone is left wanting more. Patients and members want applications that enable them to manage their health more easily. Providers want to provide new
Tags : 
    
Progress
Published By: Progress     Published Date: Jan 22, 2019
A great digital experience is no longer a competitive differentiator—it’s a must for doing business. Poor experiences quickly result in dissatisfied customers and lost prospects. For many enterprises, delivering a multichannel digital experience can be a daunting task—but it doesn’t have to be with the right technology. Learn how to conquer the five challenges for digital experience delivery in this whitepaper.
Tags : 
    
Progress
Published By: Progress     Published Date: Jan 22, 2019
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress
Start   Previous    547 548 549 550 551 552 553 554 555 556 557 558 559 560 561    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.