Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

day

Results 251 - 275 of 6158Sort Results By: Published Date | Title | Company Name
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, rackspace, log management, automated log management, pci, hipaa, glba, log data, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
Defending against application security threats is an ongoing battle. With new threats emerging every day, this whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, vulnerability life cycle, security, it management
    
Alert Logic and Sungard Availability Services
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : 
alert logic, sungard, log management, automated log management, pci, hipaa, glba, log data, security, it management
    
Alert Logic and Sungard Availability Services
Published By: AlienVault     Published Date: Oct 21, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : 
alienvault, limited resources, it time management, it prioritization, it management, security
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM. So, you can go from installation to insight in days, not months. Download the 2014 Gartner MQ for SIEM.
Tags : 
mitigate, threats, detect, affordability, solution, deliver, security, visibility, siem, quadrant, it management
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: Alight Solutions     Published Date: May 07, 2018
Choosing a payroll provider is never easy. Read the top questions you should be asking to assess payroll providers.
Tags : 
payroll provider, tax vendor, garnishments, quality assurance, tax reconciliation, payroll on cloud, payroll service, tax filing, workday, workday payroll, cloud services
    
Alight Solutions
Published By: Alight Solutions     Published Date: Jul 17, 2018
As much as moving to the Cloud has been a hot trend over the past several years with Human Capital Management systems, in today’s world, financial management systems are not far behind. We’re starting to see the activity significantly ramp up within the financial management system space. So much so, that according to research done by Gartner, the Cloud is expected to become the dominant deployment model across all areas of financial management applications by 2025. Spending on cloud or SaaS-based applications will increase from 30% of the total market spend in 2015 to 47% by 2020. So which financial systems are organizations shifting to the cloud model and why is this happening—aside from following the trend in HR? Download now to learn more -
Tags : 
    
Alight Solutions
Published By: Alight Solutions     Published Date: Aug 01, 2018
Download this webinar to learn more about how to prepare for your company's upcoming Workday release! During this webinar, Alight's panel of Workday experts will focus on the steps we recommend you take during each phase of your testing schedule, highlighting specific considerations for: • Configuration, including a focus on Payroll and Financial Management • Integrations and reports • Test management
Tags : 
    
Alight Solutions
Published By: Alight Solutions     Published Date: Aug 09, 2018
Download this webinar to learn more about how to prepare for your company's upcoming Workday release! During this webinar, Alight's panel of Workday experts will focus on the steps we recommend you take during each phase of your testing schedule, highlighting specific considerations for: • Configuration, including a focus on Payroll and Financial Management • Integrations and reports • Test management
Tags : 
    
Alight Solutions
Published By: Allbound     Published Date: Mar 14, 2016
What is the most important asset for your company? The people. We all know this by now. Your employees are what makes your business function. What is the most important asset of your sales channel? The people. But this time, they are not your employees, they are your customers. Let us take you along the new customer journey (which, does not end at point of purchase), and share how to empower your channel teams with the knowledge they need to best meet the needs of today’s customers. In this ebook, you’ll learn three tips on how to write a great customer success story that champions both your customers and your partners, how to find and retain quality partners, how to keep customers happy while keeping your sanity, and how to create authentic channel marketing, making your business a preferred customer choice.
Tags : 
    
Allbound
Published By: Allscripts     Published Date: Oct 24, 2014
Cornerstone Medical Care, a 10-provider practice in Brandon, Florida is currently using Allscripts EHR solutions to shift from fee for service to value based care. Today, their risk-based contracts have accounted for a seven-figure increase in revenue. Download the webinar now to learn how!
Tags : 
allscripts, ambulatory practice, value based care, ehr replacement, ehr solution, risk based contracts, actionable data
    
Allscripts
Published By: Allscripts     Published Date: Apr 23, 2015
In this paper, you will learn the challenges facing organizations using yesterday’s Practice Management systems, and discover why capitalizing on the latest technology is easier—and much more rewarding—than you might think.
Tags : 
revenue cycle, healthcare, practice management, technology, allscripts, financial processes
    
Allscripts
Published By: Allscripts     Published Date: Oct 30, 2015
Download our ebook today to discover how Allscripts Value-based Care Services can help your practice adjust to changing reimbursement trends.
Tags : 
medicare, value-based reimbursement models, revenue growth, value-based care, allscripts, community care solutions, chronic care management solutions, analytics, aco formation services
    
Allscripts
Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Email has become today's most mission-critical communication channel. Each and every day, 800 million business users worldwide use email during the course of their work day and about 80 percent of a company's intellectual property passes though its email server. Email is a vital component of both internal communication between employees and external communication with customers and business partners. It has become such an integral part of normal day-to-day business operations that most companies simply cannot function without it: when email stops, your ability to conduct business also stops.
Tags : 
alt-n technologies, email, exchange server, mdaemon, smtp, pop, imap, syncml, pocket pc, sender policy framework (spf), sender id
    
Alt-N Technologies
Published By: Alteryx, Inc.     Published Date: Apr 21, 2017
The traditional multiple-step, multi-tool legacy approach is a slow, time-consuming, and in most cases, a costly process that prevents organizations from making faster decisions with confidence. Data analysts today need an agile solution that empowers them to take charge of the entire analytics process. Download The Definitive Guide to Self-Service Data Analytics to: Understand why traditional analytic tools designed for data scientists are not ideal for data analysts like you Learn how self-service data analytics delivers the ease of use, speed, flexibility, and scalability you require See how Alteryx stacks up against traditional data prep and analytics tools
Tags : 
    
Alteryx, Inc.
Published By: Alteryx, Inc.     Published Date: Apr 21, 2017
Analysts struggle to incorporate new sources of data into their analysis because they rely on Microsoft Excel or other tools that were not designed for data blending. Deleting columns, parsing data, and writing complicated formulas to clean and combine data every time it changes is not an efficient way for today’s analysts to spend their time. Download The Definitive Guide to Data Blending and: Understand how analysts are empowered through data blending Learn how to automate time-consuming, manual data preparation tasks Gain deeper business insights in hours, not the weeks typical of traditional approaches
Tags : 
    
Alteryx, Inc.
Published By: Alteryx, Inc.     Published Date: Sep 06, 2017
In order to improve competitive advantage, decision making, and operational efficiencies, many of today’s leading organizations are creating an Office of the Chief Data Officer. According to Gartner, “90 percent of large companies will have a CDO role by the end of 2019”.
Tags : 
    
Alteryx, Inc.
Published By: Alteryx, Inc.     Published Date: Sep 06, 2017
Predictive analytics is on the verge of widespread adoption as enterprises become more interested in deploying predictive capabilities. In fact, a recent 2017 TDWI education survey, ranked predictive analytics the top analytics-related topic respondents wanted to learn about. The TDWI Navigator Report- Predictive Analytics provides a comprehensive overview of the state of the predictive analytics market. Download this report to better understand: Opportunities and obstacles of implementing predictive analytics Market forces and trends driving the adoption of predictive analytics Features and market landscapes that define predictive analytics Download this report today to get a better sense on how your organization can take advantage of predictive analytics to drive change in your business.
Tags : 
    
Alteryx, Inc.
Published By: Alteryx, Inc.     Published Date: Sep 06, 2017
According to Forrester, the level of analytic satisfaction within organizations is on the decline.* The traditional multiple-step, multi-tool legacy approach is a slow, time-consuming, and in most cases, a costly process that prevents organizations from making faster decisions with confidence. Data analysts today need an agile solution that empowers them to take charge of the entire analytics process. Download The Definitive Guide to Self-Service Data Analytics to: Understand why traditional analytic tools designed for data scientists are not ideal for data analysts like you Learn how self-service data analytics delivers the ease of use, speed, flexibility, and scalability you require See how Alteryx stacks up against traditional data prep and analytics tools Find out how self-service data analytics bridges the gap across skills, speed, and depth of analysis to empower you to achieve ever-greater insights without coding or depending on other departments.
Tags : 
    
Alteryx, Inc.
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.