RSS feed Get our RSS feed

News by Topic

ims

Results 1 - 25 of 333Sort Results By: Published Date | Title | Company Name
By: Group M_IBM Q418     Published Date: Oct 23, 2018
The General Data Protection Regulation (GDPR) framework seeks to create a harmonized data protection framework across the European Union, and aims to give back EU citizens control of their personal data by imposing stricter requirements for those hosting and processing this data, anywhere in the world. IBM is committed to putting data responsibility first and providing solutions that are secure to the core for all customers. As such, IBM Cloud has fully adopted the EU Data Protection Code of Conduct for Cloud Service providers – meaning we agree to meet the entirety of its stringent requirements.
Tags : 
     Group M_IBM Q418
By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     Cylance
By: Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : data, gdpr, global, nationally, cybercriminals
     Cylance
By: Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : ransomware, threats, cyber, security, data
     Cylance
By: Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : cylance, endpoint, protection, cyber, security
     Cylance
By: Akamai Technologies     Published Date: Sep 12, 2017
In his time as Director of E-Commerce at Linen Chest, Riaz Faride was faced with a challenge right out of the gate. He found himself responsible for a site that had page load times ranging anywhere from 6 to 30 seconds. Linen Chest’s site was heavy, images were hosted on the origin, and code was never refactored and needed to be optimized. Riaz knew he needed to make some changes, and fast.
Tags : case study, linen chest, image hosting, image optimization
     Akamai Technologies
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
     Cisco
By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
     CrowdStrike
By: IBM Watson Health     Published Date: Mar 30, 2018
Chilmark Research, a global research and advisory firm, recently released a report rating vendors and solutions in the healthcare analytics industry. IBM Watson Health, a leader in healthcare analytics, has put together this infographic comparing how its solutions stack up against some of the closest competitors in the industry in areas such as population discovery and definition, predictive analytics, cost and utilization, and claims data contribution.
Tags : analytics, infographic, predictive analytics, cost utilization, population discovery, claims data, healthcare, chilmark
     IBM Watson Health
By: Dell PC Lifecycle     Published Date: Aug 13, 2018
Your business may need to keep track of dozens of different initiatives—but that doesn’t mean you need dozens of separate storage solutions to get the job done. To reduce complexity, your business may consider storage solutions that can take care of multiple jobs at once without sacrificing performance. For example, if you operate a brick-and-mortar store and an online store, you should be able to retrieve customer data from both sources without compromising transactional database performance. The all-flash Dell EMC™ SC5020 storage array aims to be just such a solution.
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: Aug 13, 2018
Your business may need to keep track of dozens of different initiatives—but that doesn’t mean you need dozens of separate storage solutions to get the job done. To reduce complexity, your business may consider storage solutions that can take care of multiple jobs at once without sacrificing performance. For example, if you operate a brick-and-mortar store and an online store, you should be able to retrieve customer data from both sources without compromising transactional database performance. The all-flash Dell EMC™ SC5020 storage array aims to be just such a solution.
Tags : 
     Dell PC Lifecycle
By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
     Fortinet EMEA
By: CA Technologies     Published Date: Nov 12, 2014
This paper aims to help IT departments understand how capacity is allocated and consumed throughout the data center.
Tags : optimizing it capacity, the demands on the it department, performance optimization
     CA Technologies
By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
     Cisco
By: Vision Solutions     Published Date: Aug 26, 2014
This executive overview aims to detail how systems migrations are inevitable through upgrades, but business downtime isn't.
Tags : systems migrations, business downtime, system migration, business continuity, vision solutions
     Vision Solutions
By: Hyland Software     Published Date: Jun 16, 2016
Fueled by new technologies, expanding regulations and greater patient expectations, there’s a clinical content gold rush in the healthcare market. Sources and types of clinical content grow at an exponential rate and through increasingly refined input methods, including voice and improved OCR, clinicians capture more unstructured information about their patients than ever before. Making all clinically relevant content available together, in one place seems like a simple request. Must the response be so complex?
Tags : healthcare, technology, solutions, best practices, business management, process management, analytics, content management
     Hyland Software
By: Blue Coat Systems     Published Date: Jul 18, 2013
Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view himself or herself as a business enabler. He or she must focus on continuously aligning with business objectives, improving delivery capability to support business processes that bring new products and services to market more quickly, fostering innovation, and reducing costs through improved performance. In this custom Technology Adoption Profile (TAP), the data confirms this trend.
Tags : security, technology, business technology, cio
     Blue Coat Systems
By: Oracle     Published Date: Aug 09, 2013
This e-book draws on the insights of independent researchers, Oracle Human Capital Management (HCM) product and industry experts, and Oracle HCM customers. It aims to provide both inspiration and practical roadmaps to simplify workforce management, build the best talent, and help HR leadership make a major contribution to their companies’ overall success.
Tags : driving, hcm, oracle
     Oracle
By: Oracle     Published Date: Aug 15, 2013
This e-book draws on the insights of independent researchers, Oracle Human Capital Management (HCM) product and industry experts, and Oracle HCM customers. It aims to provide both inspiration and practical roadmaps to simplify workforce management, build the best talent, and help HR leadership make a major contribution to their companies’ overall success.
Tags : driving, hcm, oracle
     Oracle
By: GE Healthcare     Published Date: Aug 27, 2015
Healthcare organizations are facing uncertain times, which are putting enormous strains on their revenue cycle management (RCM). Automation is proven to improve RCM measures, and even small improvements can significantly impact the bottom line. This whitepaper details how providers can embrace automation to help drive financial performance.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
Children’s Mercy is not only one of the nation’s top pediatric medical centers, they have a strategy that improves organizational profitability in the face of constant change – all while delivering world-class care for their patients. Children’s Mercy accomplished what many have tried: integrating hospital and ambulatory revenue cycle activities with complete integration of all processes on a single IT platform.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
Sharp is leading the way in the shift to shared risk. In this journey, they manage to the right financial metrics while still delivering appropriate care to their patient population. Watch the video to learn how GE Healthcare is helping Sharp make a difference.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
Centricity™ Business helps Virginia Commonwealth University achieve new heights in financial performance while delivering award-winning care.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
Centricity™ Business Performance Manager service helps Schumacher Group make significant workflow improvements and reduce rework costs by approximately $3.8 million per year.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
The shift to value-based reimbursement (VBR) entails more financial risk for providers. Successful management of the transition to VBR can only be achieved when healthcare organizations are clinically and financially integrated to ensure tight care coordination and efficient resource utilization. That level of integration requires the aid of a robust IT infrastructure to support the enterprise. This whitepaper offers the opportunity to learn about new tools for healthcare providers to manage financial challenges associated with value-based reimbursement
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing rcm, episodic payment, accountable care
     GE Healthcare
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics