Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

hie

Results 1751 - 1775 of 2338Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2008
Discover how to achieve and maintain FISMA compliance to ensure security of systems and data.
Tags : 
fisma, government, federal regulations, federal regulation, fisma compliant, citizen, constituent, constituency
    
Tripwire
Published By: Tripwire     Published Date: Feb 25, 2008
Find out how to maintain the same level of stability and security across both virtual and physical environments, using the same software and approach.
Tags : 
virtual machine, virtual, virtualize, virtualized, virtualization, virtual server, configuration, configuration management
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : 
tripwire, iso, iso 27001, security, compliance, comply, isms, information security
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : 
tripwire, configuration, compliance, infrastructure, network management
    
Tripwire
Published By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : 
tripwire, information security, audit fatigue, compliance, security risk
    
Tripwire
Published By: Tripwire     Published Date: Jan 20, 2010
Gene Kim, CTO of Tripwire, describes seven practical steps owners and operators of the bulk power system can take to meet the mandatory IT configuration requirements set forth in the NERC-CIP standards. These steps help owners and operators avoid costly penalties for non-compliance while also protecting the Critical Cyber Assets that control or affect the reliability of North America's bulk electric power system.
Tags : 
tripwire, gene kim, nerc compliance, critical infrastructure protection, cip, cyber security standards, nerc-cip standard, information security
    
Tripwire
Published By: IBM     Published Date: Oct 06, 2014
This Aberdeen research paper describes how companies that empower line-of-business (LoB) employees to manage digital store content without relying on IT, achieve better return on marketing investments and create more engaging digital customer experiences.
Tags : 
e-commerce, lob employees, digital store content, marketing investments
    
IBM
Published By: IBM     Published Date: Oct 06, 2014
While traditional B2B sales channels are still the most influential, the explosive growth of B2B ecommerce is forcing B2B organizations to dedicate resources and budget to the on-line sales channel. While B2B organizations can learn from B2C in terms of user experience, B2B selling is much more complex and requires a centralized commerce platform that fully supports sophisticated workflows, pricing, product configurations, approvals and more. In this paper, we explore the impact of the on-line channel and examine five key components required to achieve B2B commerce effectiveness.
Tags : 
b2b sales channels, b2b ecommerce, user experience, centralized commerce platfrom
    
IBM
Published By: IBM     Published Date: Nov 04, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
threat prevention, cybercrime, it security, malware protection
    
IBM
Published By: IBM     Published Date: Nov 14, 2014
Data mining uncovers patterns in data through a variety of predictive techniques. By engaging in data mining, organizations like yours gain greater insight into external conditions, internal processes, your markets – and your customers.
Tags : 
ibm, data mining, data management, business results, predictive intelligence, business insights
    
IBM
Published By: IBM     Published Date: Feb 05, 2015
Discovery Health ... Predictive analytics used to craft preventive programs that keep members healthier and costs lower.
Tags : 
predictive analytics, preventive programs, predictive risk management, clinical risk models
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
Read the IBM IBV CPO Study ebook to learn: - Four steps top procurement groups can take to realize and sustain greater savings than their peers - Three ways top-performing procurement teams achieve a more effective approach to risk mitigation - How top performers use insights from suppliers to bring innovative ideas to the business
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, procurement, commerce, procurement analytics, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
Read the IBM IBV CPO Study ebook to learn: - Four steps top procurement groups can take to realize and sustain greater savings than their peers - Three ways top-performing procurement teams achieve a more effective approach to risk mitigation - How top performers use insights from suppliers to bring innovative ideas to the business
Tags : 
ibm, procurement, commerce, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 30, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, business analytics, finance, closing, consildating, reporting, reporting process, internal control management
    
IBM
Published By: IBM     Published Date: Jul 30, 2014
Develop or restore forecasting health by adhering to the six principles presented in this paper.
Tags : 
ibm, business forecasting, forecasting process, financial management, financial planning, budgeting
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
As executives witness data’s proven impact on performance and innovation and recognize its strategic significance, they also realize the growing need for a leader whose primary role is to understand and advocate on behalf of data: The Chief Data Officer.
Tags : 
ibm, retail, data, big data, analytics, chief data officer
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
As a precursor to the IBM Global Chief Marketing Officer (CMO) Study to be published later in 2011, the Economist Intelligence Unit, in cooperation with the IBM Institute for Business Value, conducted an online survey of nearly 300 executives to assess which trends are impacting CMOs and how CMOs are responding to today's complex business environment.
Tags : 
ibm, retail, cmo, trends, business environment, innovate
    
IBM
Published By: SyberWorks     Published Date: Oct 21, 2008
Jean Ann Larson, Chief Learning Officer (CLO), and Tawanna Foggs, Educational Systems Coordinator, of William Beaumont Hospitals, talk about their use of the SyberWorks Learning Management System to train and certify hospital employees.
Tags : 
syberworks, learning management system, learning management systems, learning management system, e-learning, elearning, web based training, training management systems
    
SyberWorks
Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: IBM     Published Date: Aug 28, 2014
Equipping IT with the resources that they need to optimize the user experience to match that of consumer applications can help you achieve the business outcomes you want, while making the most of your enterprise content management (ECM) investments.
Tags : 
user experience, ecm, consumer applications
    
IBM
Published By: IBM     Published Date: Oct 22, 2014
Equipping IT with the resources that they need to optimize the user experience to match that of consumer applications can help you achieve the business outcomes you want, while making the most of your enterprise content management (ECM) investments.
Tags : 
consumer applications, content management, ecm, it management
    
IBM
Start   Previous    64 65 66 67 68 69 70 71 72 73 74 75 76 77 78    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.