Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

card

Results 76 - 100 of 431Sort Results By: Published Date | Title | Company Name
Published By: GE Healthcare     Published Date: May 12, 2015
An effective cardiovascular IT system is a must-have, not a nice-to-have for cardiologists and cardiovascular clinicians to provide optimal care and help improve critical outcomes.
Tags : 
cardiovascular it system, diagnostic images, web-enabled information technology, it management
    
GE Healthcare
Published By: GE Healthcare     Published Date: May 12, 2015
Help optimize cardiovascular care with a single database of images and information from virtually anywhere there is an internet connection.
Tags : 
cardiovascular diagnostics, image quality, secure web-based data integration, remote access, it management
    
GE Healthcare
Published By: GE Healthcare     Published Date: May 12, 2015
Ongoing IT system improvements are required for cardiologists and cardiovascular clinicians to enhance the overall quality of care experience.
Tags : 
cardiovascular care, patient data software management, cost containment, secure data integration, analytics, workflow, productivity, billing, charge capture, it management
    
GE Healthcare
Published By: GE Healthcare     Published Date: Jun 11, 2015
Streamline patient-centered cardiovascular diagnostic workflow with a definitive imaging strategy.
Tags : 
cardiovascular diagnostics, cardiac care, imaging solution, workflow, optimization, it management, enterprise applications
    
GE Healthcare
Published By: GE Healthcare     Published Date: May 12, 2015
An effective cardiovascular IT system is a must-have, not a nice-to-have for cardiologists and cardiovascular clinicians to provide optimal care and help improve critical outcomes.
Tags : 
cardiovascular it system, diagnostic images, web-enabled information technology, cardiovascular information system, cvis software, cvpacs, cardiovascular informatics, cardiovascular image software, cath diagnostic imaging, echo diagnostic imaging, nipv diagnostic imaging, peripheral vascular diagnostic imaging, vascular diagnostic imaging, it management
    
GE Healthcare
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organisations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security, security access
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organizations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : 
security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust, certificates
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper helps organisations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.
Tags : 
security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust, certificates
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This infographic illustrates how Entrust PKI Technology is still a key player and global leader in online security.
Tags : 
security, internet security, online security, pki, entrust pki technology, application security
    
Entrust Datacard
Published By: SAP SME     Published Date: Nov 02, 2017
Proporciona a los CIOs un marco para ejecutar objetivos existentes, emergentes o potencialmente nuevos relevantes para la transformación digital de la organización
Tags : 
    
SAP SME
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies
Published By: Cardinal Health     Published Date: Dec 28, 2017
Data driven tools and analytics can uncover a wealth of new savings opportunities for surgery centers and surgical hospitals. And you usually don’t have to search far to uncover the savings. You can immediately tap into one source of data to find these opportunities. Every Electronic Health Record (EHR) and Practice Management System offers a set of standard reports. Stored inside are at least five ways to save. Download this whitepaper to learn about these five opportunities
Tags : 
    
Cardinal Health
Published By: Cardinal Health     Published Date: Dec 28, 2017
Rising costs, declining reimbursements and the mandate to improve quality: these are key challenges that surgery centers face every day. For years, costs have continued to climb, while reimbursements have declined or, at best, remained stable. To address these issues and succeed in the future, surgery centers need to develop comprehensive plans that leverage both supply chain and clinical expertise. For many facilities, the next step is to conduct a clinical assessment that identifies new ways to improve inventory management and clinical practices. The heart of this approach from Cardinal Health is a clinical team that leverages OR and supply chain expertise to understand, prioritize and pursue opportunities for improving the health of patient and your practice alike. To learn more, read this case study and find out how two surgery centers have used a clinical assessment from Cardinal Health to improve performance.
Tags : 
    
Cardinal Health
Published By: Cardinal Health     Published Date: Dec 28, 2017
Days at a surgery center, or surgical hospital, can be unpredictable… but your supply chain doesn’t have to be. From managing costs, to physician preferences, surgery centers are challenged every day to maintain an efficient supply chain. Download this infographic to find out ways Cardinal Health can help your surgery center overcome five challenges, because less time focused on challenges means more time to focus on what matters most… patients
Tags : 
    
Cardinal Health
Published By: Qualys     Published Date: Jul 19, 2012
Updated for PCI DSS Version 2.0 where internal scanning is now required! With the recent updates to PCI DSS, get all the facts and learn how to comply with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI DSS. It arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. Discover: . What the Payment Card Industry Data Security Standard (PCI DSS) is all about . The 12 Requirements of the PCI Standard . How to comply with PCI . 10 Best-Practices for PCI Compliance . How QualysGuard PCI simplifies PCI compliance
Tags : 
pci, technology, security, firewall, email, virus protection
    
Qualys
Published By: Entrust Datacard     Published Date: Jun 29, 2017
Customers are the ones in control. And they give their business to the businesses keeping pace. To learn how you can keep pace, get a sneak peek into the upcoming webinar – “The Bottom Line About Instant Card Issuance” by downloading the new insight infographic.
Tags : 
    
Entrust Datacard
Published By: Oracle     Published Date: Aug 17, 2017
50% of guests do not want to be served by a robot but 80% of operators say robots will be cleaning restaurants by 2027 50% of guests want to be recognized without giving a name or loyalty card 54% of restaurant operators would like to see artificial intelligence helping with menu planning
Tags : 
anticipating, consumer trends, seeking innovations, enhance guest experiences
    
Oracle
Published By: Oracle     Published Date: Mar 16, 2018
What you will learn from this report: • The opportunity of loyalty: two thirds of consumers are already members of at least one restaurant loyalty program • What consumers look for in a restaurant loyalty program • What puts consumers off joining loyalty programs in the first place
Tags : 
mobile phone app, plastic swipe cards, restaurant loyalty program, oracle
    
Oracle
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.