security

Results 176 - 200 of 6519Sort Results By: Published Date | Title | Company Name
By: SAS     Published Date: Jan 17, 2018
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
     SAS
By: Transamerica Retirement Management     Published Date: Jun 03, 2011
76 million baby boomers are ready to redefine retirement. Are they-or you-ready for what's to come? See what other benefits directors are saying. Download our free white paper.
Tags : transamerica retirement management, benefits directors, baby boomers, padilla spear beardsley, employees, investments, medicare, social security, health insurance, hr directors, us workers, financial undertaking, retirement boom, retirement planning, retirement
     Transamerica Retirement Management
By: Aria Systems     Published Date: Jun 15, 2016
"Discover the technological solutions to deliver better patient outcomes From patient satisfaction to mobility to security, technology’s role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now >"
Tags : 
     Aria Systems
By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement, integrated actionable intelligence, security
     Cisco
By: Windstream     Published Date: Oct 22, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
     Windstream
By: Windstream     Published Date: Oct 30, 2015
“Bring your own device,” or BYOD, enables your employees be productive and collaborate wherever they are, but it also introduces concerns around security and compliance. Austin Herrington, Windstream Director of Enterprise/CPE Product Marketing, explains how Unified Communications (UC) can help you address these challenges and focus on your core business. See how Windstream experts team up with your business to design a customized UC solution that’s right for you.
Tags : 
     Windstream
By: VMware AirWatch     Published Date: Jul 19, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: Jul 19, 2017
The VMware 2016 State of the Digital Workspace Report was performed in July 2016 and is a study that examined digital workspace adoption among global organizations across industries. Data represents a survey of 1,263 business decision makers (BDMs) and IT influencers to examine the worldwide progress in transitioning from the client-server era to the mobile-cloud era. Respondents acknowledged that game-changing IT relies on organizations adopting a digital workspace that includes security and identify management as vital components. With realistic prospects of achieving astounding return on investment (ROI), even businesses that cited obstacles to adoption may want to consider taking another look at business mobility initiatives.
Tags : 
     VMware AirWatch
By: Lenovo and Intel     Published Date: Apr 28, 2017
The stats, risks, and tactics you need to shape your mobile strategy are in this definitive guide! We’ve compiled all the stats you need from first- and third-party surveys. We’ve identified the key risks. And, we’ve outlined the tactics you can put in place. With this definitive guide, you will have everything you need to shape a mobile strategy that succeeds. Get this guide now.
Tags : lenovo, mobile organization, mobile strategy, mobile ecosystem, security, flexibility, connectivity, durability, mobile workforce, anatomy of mobile organization
     Lenovo and Intel
By: Lenovo and Intel     Published Date: Apr 28, 2017
Learn the healthy habits for keeping your mobile workforce productive — and happy. • Focus on a brainpower boost • Sniff out the security threats • Embrace new options for workplace flexibility • Prepare for non-stop spine-tingling connectivity • Take a deep breath: durability is within reach Keep your mobile organization productive and secure with these quick tips. Read more now!
Tags : lenovo, mobile organization, fitness tips, mobile durability, productive organization, healthy mobile habits, workplace flexibility, non-stop connectivity, lenovo organization
     Lenovo and Intel
By: Lenovo and Intel     Published Date: Apr 28, 2017
The Real Impact of Body Cameras: Unprecedented Secure Storage Demand Body cameras have become a critical component of campus and community policing — they protect everybody’s interests. However, gathering, securing, storing, and managing the terabytes of content created on a monthly basis can be daunting even for the most sophisticated IT teams. In this eBook, we provide a comprehensive look at this growing challenge and how you can get in front of it! Read this eBook now.
Tags : lenovo, higher education, body cameras, campus policing, campus security, data managing, securing data, securing content
     Lenovo and Intel
By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : cybersecurity, attackers, http, ransomeware, malware
     Cisco
By: DocuSign     Published Date: Feb 13, 2017
Running fully digital processes is an imperative. Deals need to be closed anytime, anywhere and they need to be closed NOW. Learn how your organization can use DocuSign and Salesforce with mobile to accelerate transactions, reduce costs, and increase security and compliance – all while providing an enhanced customer experience.
Tags : docusign, client satisfaction, technology, electronic contract, paperless, reduce costs, mobile
     DocuSign
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
MIT Technology Review Survey: Executive Summary Are you prepared for the next breach? Only 6% of leaders say yes. Information security—or, the lack of it—is firmly on the radar for business and IT leaders in organizations of all sizes and in every sector. Many fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyberattacks, and a shortage of in-house security expertise remains of widespread concern. Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review of approx. 225 business and IT executives, in partnership with Hewlett Packard Enterprise Security Services and FireEye Inc.
Tags : 
     Hewlett Packard  Enterprise
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Cyberattacks are now a fact of life. Yet detection still lags. In 2015, the median amount of time attackers spent inside organizations before detection was 146 days. Why are we so vulnerable? MIT Technology Review asks Andrzej Kawalec, chief technology officer for HPE Security Services and Marshall Heilman, vice-president and executive director at Mandiant, a FireEye company, what we can do to make our systems more secure.
Tags : 
     Hewlett Packard  Enterprise
By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Is your organization prepared for a cyberattack? Most aren’t. 86% of organizations surveyed lack adequate cybersecurity capabilities. Read MIT Technology Review’s latest infographic, based on their survey of 225 business and IT leaders, and learn if you have cybersecurity holes and how to patch them.
Tags : 
     Hewlett Packard  Enterprise
By: Hewlett Packard Enterprise     Published Date: Apr 13, 2016
To understand your organization’s risk profile: “You should start with a simple question: What are your digital assets and the cyber threats facing them,” says HPE Security Services CTO, Andrzej Kawalec. Watch the MIT Technology Review interview with HPE’s Kawalec and FireEye's Vitor Desouza in order to protect your organization from what has become daily, even hourly, attacks for many.
Tags : 
     Hewlett Packard  Enterprise
By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit
     Oracle
By: Company Name     Published Date: May 04, 2016
Lorem ipsum dolor sit amet, urna eu posuere. Nec vitae amet. Elementum ut erat. Nascetur neque, accumsan lorem et placerat consequat. Rutrum ut duis, nibh velit velit metus eleifend nnc
Tags : cloud, cloud security, it security, firewall, networking, data security, data management, security management, it management
     Company Name
By: GE Power     Published Date: Jan 31, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : cyber security power plants, utilities, power producers, power plant cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment
     GE Power
By: Citrix     Published Date: Apr 06, 2017
The NHS is currently evolving to meet the needs of an ageing population. This means that not only is the delivery of clinical care more challenging in the acute hospital setting but it increasingly relies on enhanced information access in the primary care, mental health and community environments too.
Tags : 
     Citrix
By: VMware     Published Date: Feb 24, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
The VMware 2016 State of the Digital Workspace Report was performed in July 2016 and is a study that examined digital workspace adoption among global organizations across industries. Data represents a survey of 1,263 business decision makers (BDMs) and IT influencers to examine the worldwide progress in transitioning from the client-server era to the mobile-cloud era. Respondents acknowledged that game-changing IT relies on organizations adopting a digital workspace that includes security and identify management as vital components. With realistic prospects of achieving astounding return on investment (ROI), even businesses that cited obstacles to adoption may want to consider taking another look at business mobility initiatives.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
In the world of the digital workspace, employees want to get access to apps and data, with one-touch single sign-on simplicity from any device, anywhere. This poses problems for organizations as they try to ensure security and control with contextual controls, such as device type, device posture, network location, and a host of other conditions. Download this infographic to see how VMware Workspace™ ONE™ is the identity-powered solution your organization has been looking for.
Tags : 
     VMware
By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
     VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com