coverage

Results 51 - 75 of 97Sort Results By: Published Date | Title | Company Name
By: Aternity     Published Date: Apr 10, 2012
Report reveals Aternity's version 5.0's new innovative features focused on driving the broadest coverage of end-user experience across almost any type of application or Windows-based desktop (physical or virtual).
Tags : aternity, end user experience, end user management, technology, windows, technology platform
     Aternity
By: EMC Corporation     Published Date: Nov 08, 2011
This study provides the market size and initial five-year forecast for the worldwide PBBA market as part of IDC's Storage Solutions coverage.
Tags : back up, backup, backup appliance, forecast, purpose built, pbba, storage solutions, storage
     EMC Corporation
By: Castlight Health     Published Date: May 02, 2014
This white paper reveals data-driven insights to help you create a strategic communications plan that includes: creative, cost-effective incentives promoted through repeated communications, a robust, multi-media digital promotion strategy paired with on-the-ground advocates at all levels, internal leadership participation to encourage adoption
Tags : castlight health, driving employee engagement, health plans, healthcare decisions, company healthcare coverage, incentives, internal leadership
     Castlight Health
By: LogRhythm     Published Date: Jun 19, 2018
As in years past, 2017 was packed with stories of cyber security failure. Between sophisticated attackers, lack of proper security monitoring and controls implementation, and devastating data breaches that may have arisen from these scenarios, it’s easy to see that we still face serious challenges in the security arena, with potentially serious consequences. Why are we continually seeing these issues? Many security professionals readily admit that we don’t have the staff, training and breadth of coverage in our security controls to adequately combat the attackers today. How is this happening when we’re spending so much money and time on cyber security?
Tags : logrhythm, sans, cloudai, ueba
     LogRhythm
By: Clari     Published Date: Mar 24, 2017
The key to successful sales forecasting starts with pipeline measurement — consistent tracking in each stage of the sales cycle will bring consistent results. Careful focus on ?ve areas will strengthen the sales forecast process to drive better capacity planning, smoother operations, and most importantly, more revenue! The five metrics for every sales leader: Accuracy Variance Pipeline Coverage & Mix Compliance & Commitments Linearity Download now to learn more!
Tags : sales forecasting, sales execution, clari, sales, sales operations, pipeline inspection, opportunity management, opportunity
     Clari
By: Anaplan     Published Date: Mar 29, 2018
To support these principles, Anaplan was deliberately crafted as a highly distributed global company that allows for significant resiliency against threats and disasters. All functions within Anaplan are geographically distributed across the globe, reducing risks associated with regional events. The U.S. offices host most of the sales, marketing, and support activities. Staff in the U.K. and Singapore offices provide regional coverage, in addition to backup support.
Tags : anaplan, architecture, security, controls, geographically, regional, global
     Anaplan
By: McAfee EMEA     Published Date: Nov 15, 2017
To ensure fast, efficient, and comprehensive remediation of breaches, IT security decision makers have acknowledged the need to reduce the complexity of their endpoint security environments. Today’s enterprises value integrated endpoint security solutions that can effectively handle the whole process of endpoint security, including attack prevention, detection, and remediation. Single-vendor suite solutions and cloud technologies are on the rise due to their perceived benefits, including simplicity, lower costs, and better integrated coverage across platforms.
Tags : endpoint, efficiency, security, prevention, technology, decision makers
     McAfee EMEA
By: Dell Software     Published Date: Jul 24, 2012
With Quest Workspacetm Asset Manager, you can easily find data on hardware and software inventory and compare it to records on what's been purchased as well as what's actually in use. Centrally track and manage the IT contracts and licenses then generate usage reports automatically that you easily correlate to actual purchase costs and legal responsibilities. For managing software licenses, Quest Workspacetm Asset Manager goes beyond simply scanning and identifying software. It traces software usage through metering and quickly identifies if it's being underutilized, sitting idle or if the appropriate number of licenses have been purchased. From one solution, you can implement IT asset management best practices that eliminate overspending and ensure license compliance.
Tags : software data recognition, software management, software metering, multiple platform coverage, windows, mac os, software inventory, vmware
     Dell Software
By: Aon Hewitt     Published Date: Apr 22, 2014
Download our business brief to learn more about the changing health care landscape and how private health exchanges are realigning incentives to benefit everyone in the value chain: employers, insurance carriers, employees and providers.
Tags : corporate health exchange, active health exchange, private health exchange, aon hewitt exchange, aon exchange, aon health exchange, corporate health care, health benefits
     Aon Hewitt
By: Aon Hewitt     Published Date: May 25, 2016
Today in the United States, employer-sponsored health benefits are the source of coverage for more than 149 million individuals.1 Fueled by many factors, including rising costs, legislative changes, new provider models, and evolving market forces, the health care industry is undergoing a transformation. And as health care evolves, so must the employer’s role in it. What has not changed, however, is employers’ belief that health benefits are a key differentiator for talent. In fact, most large employers plan to continue offering coverage in spite of the uncertainties in the health care market. To keep pace with the changing environment, employers must rethink their role in health coverage: how they sponsor, structure, and deliver health benefits, and how they manage costs while keeping employees healthy, productive, and satisfied.
Tags : health care, employer-sponsored benefits, healthy benefits, manage costs
     Aon Hewitt
By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
     SAS
By: CDW     Published Date: Aug 07, 2015
Like many, you may find that you lack the time and resources to adequately extend Disaster Recovery (DR) to safeguard all aspects of your organization. As a result, gaps in DR coverage put your business at risk.
Tags : cloud, storage, data center, disaster recovery, data storage
     CDW
By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
     CrowdStrike
By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
     HP
By: HP     Published Date: Nov 14, 2011
See how HP is setting the benchmark for 802.11n performance with the industry's first three-spatial-stream 802.11n dual-radio access points.
Tags : wireless, 208.11n, dual-radio, performance, benchmark, ehternet, range, coverage
     HP
By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
The networks that support this free-moving, agile world need the same kind of distributed intelligence. Revolutionary distributed control places intelligence in the access point, allowing automatic optimization of coverage and bandwidth.
Tags : wi-fi, technology, wireless, mobile devices, innovation, organizations, hr professionals, workforce
     Alcatel Lucent Enterprise
By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
In the same way, the WLAN seems to be demanding more of our attention these days. IT teams are spending an increasing amount of time managing, configuring and troubleshooting to accommodate a growing number of devices and apps, and to meet user demands for ever-faster speeds and better coverage.
Tags : it teams, wlan, intelligent architecture, unified network, security management, iot onboarding
     Alcatel Lucent Enterprise
By: Alcatel Lucent Enterprise     Published Date: Sep 07, 2017
The networks that support this free-moving, agile world need the same kind of distributed intelligence. Revolutionary distributed control places intelligence in the access point, allowing automatic optimization of coverage and bandwidth. With contractors on site, and employees using their own devices, future-ready networks must support all kinds of devices, including legacy equipment. Airtime fair access provides optimal connectivity, even for older devices.
Tags : wi-fi, technology, wireless, mobile devices, innovation, organizations, hr professionals, workforce
     Alcatel Lucent Enterprise
By: LifeLock     Published Date: Feb 24, 2017
Identity theft (IDT) is a critical concern for people around the world. Providing identity theft protection as an employee benefit helps safeguard employees from fraud, scams and threats to their personal credit ratings. And, this low-cost benefit can make your employment benefits package more attractive. In this program, Todd Davis, founder of LifeLock, discusses the options for identity theft coverage, how to drive participation in such coverage and how to use your IDT benefit to improve employee retention and engagement.
Tags : 
     LifeLock
By: SAS     Published Date: Mar 06, 2018
Enhanced regulatory pressure requires continuous evaluation of your bank’s risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to: • Improve monitoring programs. • Reduce false-positive alerts. • Increase monitoring coverage. • Reduce the rapidly escalating financial cost of maintaining AML programs.
Tags : 
     SAS
By: Oracle Social Cloud     Published Date: Feb 17, 2015
Last year's Super Bowl was disappointing on every level and simply could not live up to the hype. 2015 could not have provided a more opposite result. This was the year of the emotional rollercoaster. NBC is known for their heartfelt sports coverage and has mastered the art of storytelling, all on full display for Sunday's game. The network leveraged all their best tactics with outstanding results. The game was high drama at its best and kept the audience engaged to the very end. Brands had serious competition from the games itself this year, but brought their own flood of emotions with some familiar storylines that garnered significant social conversation volume to very unexpected commercials eliciting strong negative feedback. In this analysis we will examine how brands used social media to continue the conversation, leverage assets and advocates, and even create intentional mistakes to earn attention.
Tags : oracle, brand strategy, super bowl, social media strategy, engagement, continuing the conversation
     Oracle Social Cloud
By: Intel Security     Published Date: Apr 06, 2016
The SANS 2015 Incident Response survey results reveal an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Tags : siem, incident response, sans, continuous monitoring
     Intel Security
By: Zane Benefits     Published Date: Sep 28, 2015
In an ideal world, health insurance would be as easy as one, two, three - right? However in reality, navigating health insurance isn’t exactly easy.
Tags : health insurance, guide, small business, self employed, reform, coverage
     Zane Benefits
By: IBM     Published Date: Jul 15, 2016
This Market Guide helps CISOs identify emerging data-centric audit and protection tools. IBM is positioned with a centralized management console approach across multiple silos and has coverage of all the key capabilities evaluated by Gartner.
Tags : ibm, gartner, data, dcap, data-centric audit protection, security, data science
     IBM
By: BlackBerry     Published Date: Dec 22, 2009
AT&T is a premier communications holding company. Its subsidiaries and affiliates, AT&T operating companies, are the providers of AT&T services in the United States and around the world. Among their offerings are the world's most advanced IP-based business communications services, the nation's fastest 3G network and the best wireless coverage worldwide, and the nation's leading high speed Internet access and voice services.
Tags : blackberry, mobile applications, at&t, pharma, cio, pim, voip, smartphones
     BlackBerry
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com