Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ssm

Results 101 - 125 of 555Sort Results By: Published Date | Title | Company Name
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI helped a leading global bank digitize its traditional product ecosystem for AML transaction monitoring. With the creation of a data lake and efficient learning models, the bank successfully reduced false positives and improved customer risk assessment. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: GetWellNetwork, Inc.     Published Date: Feb 22, 2014
Managing pain is vital to how hospitals are measured on patient satisfaction. Learn how a hospital uses an interactive patient care solution to streamline pain feedback, integrating with an EMR, nursing notification and pharmacy dispensing systems.
Tags : 
hcahps, pain management, pain control, integration, patient satisfaction, emr, outcomes, press ganey, pharmacy, care coordination, hit, nursing communications, automated documentation, emr, electronic medical record, patient education, pain assessment, patient engagement, interactive patient care
    
GetWellNetwork, Inc.
Published By: Dun & Bradstreet     Published Date: Feb 02, 2016
Take the mystery out of business credit data The modern-day explosion in data has presented new challenges for interpreting financial reports to uncover meaningful insight. We often struggle to be efficient with the resources we have and the data we use to make our decisions, whether we’re talking with a new customer or an existing one.
Tags : 
hoovers, credit data, data analysis, credit report, evaluation, risk assessment
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Feb 02, 2016
Since when did budgeting become a process that companies dread? Just say the word “budget,” and you’ll elicit at least a few groans or eyerolls from teams outside of finance. It’s daunting: the weight of the next few years rests on a couple of forecasts, financial projections and line-item lists. As a result, cross-functional teams are under a lot of stress to ensure that their cases and arguments are heard. In some ways, the budgeting process almost feels combative.
Tags : 
hoovers, finance, budgeting, cfo, data, risk assessment
    
Dun & Bradstreet
Published By: Workday     Published Date: Aug 17, 2015
Workday stelt het bedrijf centraal in zijn geünificeerde platform voor businessmanagement en biedt een oplossing die een ongekend inzicht in de financiële positie van een bedrijf geeft.
Tags : 
financial management systems, workday solutions, accounting systems
    
Workday
Published By: Schneider Electric     Published Date: May 07, 2018
Don’t risk availability … upgrade your infrastructure
Tags : 
modernization, data center lifecycle services, refresh-ups, mprs, assessment services, old ups, aging infrastructure
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 07, 2018
Modernizing your data center operations doesn't always mean expanding to a physically larger system
Tags : 
modernization, data center lifecycle services, refresh-ups, mprs, assessment services, old ups, aging infrastructure
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 07, 2018
Industry demands can punish older physical infrastructure. Low agility and high maintenance costs can be prevented
Tags : 
modernization, data center lifecycle services, refresh-ups, mprs, assessment services, old ups, aging infrastructure
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 14, 2018
Don't wait until it's too late! Start considering modernization options now.
Tags : 
modernization, data center lifecycle services, refresh-ups, mprs, assessment services, old ups, aging infrastructure
    
Schneider Electric
Published By: EMC Corporation     Published Date: Jul 07, 2013
3TIER helps organizations understand and manage the risks associated with renewable energy projects. A pioneer in wind and solar generation risks analysis, 3TIER uses science and technology to frame the risk of weather-driven variability, anywhere on Earth. 3TIER's unique expertise is in combining the latest weather data with historical weather patterns, and using the expertise of 3TIER's meteorologists, engineers and data scientists to create a detailed independent assessment of the future renewable energy potential of any location.
Tags : 
renewable energy, customer profile, emc, risk management, best practices, storage, technology, security, it management
    
EMC Corporation
Published By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : 
risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc
    
EMC
Published By: Polycom     Published Date: Oct 17, 2016
Some Do's include: Doing a network assessment, and doing you due diligence. Some Don't's include: Not giving up on the handset, and not waiting to get started. Download this helpful white paper to learn more.
Tags : 
    
Polycom
Published By: Polycom     Published Date: Oct 17, 2016
This IDC study uses the IDC MarketScape model to provide an assessment of the 11 top vendors in the worldwide enterprise video conferencing equipment market. The IDC MarketScape is an evaluation based on a comprehensive framework and a set of parameters that assess vendors relative to one another and to those factors expected to be most conducive to success in a given market during the short term and the long term.
Tags : 
    
Polycom
Published By: Mimecast     Published Date: Aug 14, 2017
Not all email security systems perform the same. Lots of false negatives get let through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of incumbent email security systems to uncover the number, type and severity of threats getting into organizations. Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss. Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems like Symantec miss.
Tags : 
mimecast, symantec email security, esra, message labs
    
Mimecast
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"IDC's recently published report “IDC MarketScape: Worldwide Virtual Client Computing Software 2016 Vendor Assessment” (doc #256606, November 2016) named VMware as a leader. According to the IDC MarketScape report, “It would appear that the commitment made in 2013 (by VMware) is resulting in solid gains and the strategies that were employed have been effective. These elements, along with reference interviews, provide VMware with a solid rating in the IDC MarketScape. As a result, IDC has placed VMware in the Leaders category in this IDC MarketScape. VMware's position reflects the company's market position and commitment to providing resources to expand its VCC product portfolio as well as supporting software and hardware solutions.” Be the first to receive an excerpt of the IDC MarketScape: Worldwide Client Computing Software 2016 Vendor Assessment, available from VMware. Register now to access your copy.
Tags : 
    
VMware AirWatch
Published By: Puppet     Published Date: Jun 24, 2016
The fifth annual State of DevOps Report, presented by Puppet and DevOps Research & Assessment (DORA), confirms and highlights the fact that achieving higher IT and organizational performance is a team effort spanning development and operations — and it’s an investment that can deliver powerful returns. This year’s report shows how DevOps speeds up delivery, improves quality and security, enhances employee engagement and more. Download the report to learn why: • High-performing IT organization experience 200x more frequent deployments and 24x recovery from failures. • High performers spend 22 percent less time on unplanned work and 29 percent more time on new work, such as features or code. • Taking an experimental approach to product development improves IT performance. The report also helps you understand the ROI of DevOps, and includes formulas to quantify your potential cost savings, using metrics from you own organization.
Tags : 
    
Puppet
Published By: Secureworks     Published Date: Oct 04, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organization’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
    
Secureworks
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
Regardless of the industry, your customers are digital and always on; your business should be, too. As such, today's forward-thinking business has increased its use of digital channels and ecosystems to engage with and serve its customers. To do so, a well-crafted business continuity / disaster recovery (BCDR) plan can ensure a company's ability to keep its business uninterrupted and maintain its survival, despite unforeseen disruptions. Read this Forrester technology adoption profile to learn the mission-critical nature of and how to maintain an always-on business presence.
Tags : 
    
Spectrum Enterprise
Published By: PwC     Published Date: Jun 20, 2018
Digital Fitness Assessment 2.0 is here. The time to upskill is now. Let’s face it--every industry is being disrupted. To stay profitable and lead the way, it’s critical to be deliberate about making sure your employees have the skills they’ll need to take you there. The Digital Fitness Assessment will help your employees build their future through a custom experience that targets specific skills and behaviors to each employee. Get a demo here. [Please confirm link works and is tracked] What if you could give every employee a blueprint for tomorrow's most-needed skills? Your people know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here. [Please confirm link works and is
Tags : 
    
PwC
Published By: PwC     Published Date: Jul 19, 2018
What if you could give every employee a blueprint for tomorrow's most-needed skills? Your teams know they need new skills--and most are eager to get them. But, what most companies offer is, well, standardized. That can make it boring and not applicable. To stand out and bring your workforce into the future, you need a creative, personal--and even enjoyable--learning experience. The Digital Fitness Assessment will help your employees build their future. Get a demo here.
Tags : 
    
PwC
Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, illusive networks
    
Illusive Networks
Published By: Symantec     Published Date: Jul 30, 2014
This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
Knowledge is power: the Symantec guide to protecting your website
Tags : 
vulnerability assessment, website security, protecting against vulnerabilities
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.