RSS feed Get our RSS feed

News by Topic

nac

Results 201 - 225 of 315Sort Results By: Published Date | Title | Company Name
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nouveau modèle de sécurité qui mérite d’être étudié... et reproduit. Traditionnellement, la sécurité des entreprises a toujours été fondée sur une stratégie de « forteresse », chargée de sécuriser les terminaux utilisateur et de former une barrière de protection autour du réseau. Aujourd’hui, cette stratégie n’est pas en mesure de supporter ou de sécuriser l’utilisation des périphériques mobiles et des fonctionnalités SaaS, qui existent en-dehors de la forteresse. Les responsables de la sécurité des informations (CISO, Chief Information Security Officer) sont donc tenus de trouver de nouvelles solutions à même de sécuriser ces technologies actuelles, et de s’adapter aux menaces et aux besoins métier en évolution.
Tags : 
     CA Technologies EMEA
By: Appian     Published Date: Sep 15, 2010
This report examines the implementation of technology from Appian within Pinnacle People, a private provider of welfare-to-work services to the UK Government.
Tags : appian, bpm implementation, business process management, pinnacle people
     Appian
By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : forescout, counteract, compliance, independent, assesment, network, access, control
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use
     ForeScout
By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
     ForeScout
By: ForeScout     Published Date: Jan 24, 2013
ForeScout is a leader in the 2012 Magic Quadrant for Network Access Control. Read this magic quadrant report, which is based on the assessment based on vendor's completeness of vision, including market understanding, product and more.
Tags : gartner magic quadrant, network access control, forescout, leader in network access control, nac, overall viability, it management
     ForeScout
By: Concur     Published Date: Dec 27, 2012
Reaching a pinnacle of strategic importance, expense management has found high prominence within today’s organizations. Discover Aberdeen’s latest best practices for effectively managing T&E expenses.
Tags : business expense, cloud expense management, cloud expense reporting, expense best practices, expense management, expense management best practices, expense management report, expense management research
     Concur
By: McAfee     Published Date: Jul 24, 2013
The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organizations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : stealthy attacks, malware, intrusion prevention system, siem, layered security controls, security
     McAfee
By: Siemens     Published Date: Jun 06, 2014
Providers like Dignity Health, Inspira Health Network, and PinnacleHealth are leveraging their HIEs to help solve care-coordination problems, helping to reduce costs, streamline communication, and improve provider and patient satisfaction.
Tags : siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare
     Siemens
By: Adobe     Published Date: May 19, 2015
Profissionais de marketing que veem seus clientes por um caminho linear de funil não estão em contato com seus clientes. O caminho do cliente possui múltiplos canais, onde eles esperam que os profissionais de marketing lembrem de suas preferências e antecipem suas necessidades. Em Dez Maneiras que Marketing cross-channel Não é Ciência de Foguete, você aprenderá como conectar-se com seu cliente e alcançá-lo de forma personalizada e relevante - tudo com coleta de dados confiavéis.
Tags : cross-channel, você escolhe os canais, objetivos é fácil, ciência inacessível, clientes querem, precisa de tudo, aqui para ficar, search marketing
     Adobe
By: Oracle     Published Date: Apr 16, 2018
La gestión de bases de datos resulta costosa y complicada. A medida que aumenta la cantidad de aplicaciones y de bases de datos, se pueden multiplicar los costos y las complicaciones. Una solución sería un sistema hardware y software diseñado específicamente para que el software de la base de datos optimice las operaciones, tanto para simplificar el rendimiento como el aspecto administrativo. Exadata de Oracle es la única plataforma que ofrece un rendimiento óptimo de la base de datos y eficacia para la combinación de datos, análisis y cargas de trabajo para el procesamiento de transacciones en línea (OLTP). Con una amplia variedad de opciones de implementación, puede ejecutar sus bases de datos y cargas de trabajo de datos de Oracle en el lugar que quiera y de la manera que quiera, en la Nube de Oracle, en Cloud at Customer, en su data center o cualquier combinación de estos modelos.
Tags : ejecutar, base, datos, oracle, exadata
     Oracle
By: Infosys     Published Date: May 21, 2018
A major telecoms client was struggling with time to market. Keen to launch a new youth brand, it had a number of innovative value-added digital services it wanted to offer; but it was taking a long time to implement them. Launching a new brand meant a 12-15 month cycle, which was unacceptable. The reason was that, whenever anyone wanted to launch a new product or feature, they had to work on both the back-end and the front-end and then integrate it with the front end applications to make it work. This was so time-consuming and difficult that we were appointed to introduce a micro services layer in between, which would shorten development timescales.
Tags : market, brand, launch, digital, services, client
     Infosys
By: Ephesoft     Published Date: Apr 04, 2018
In today’s highly competitive market, organizations are always looking for ways to cut costs, increase ef?ciency and strengthen the bottom line. But if yours is like most Accounting Departments, you’re threatened by forces that menace ef?ciency and jeopardize cost-cutting.
Tags : 
     Ephesoft
By: FICO EMEA     Published Date: Jul 17, 2019
Die Hersteller von heute suchen mehr denn je nach Wegen, um Advanced Analytics im gesamten Lebenszyklus eines Produkts in Bezug auf Planung und Produktion anzuwenden, um grundlegende Veränderungen zu erzielen und ihre Geschäftstätigkeiten auszubauen.
Tags : 
     FICO EMEA
By: Zebra Technologies     Published Date: May 02, 2018
Up to 14% of medical records include inaccurate, potentially dangerous patient data as a direct result of failures in patient identification. Often, errors can be attributed to outdated manual processes, such as oral verification or written wristbands, which can impact the standard of care delivered. In this white paper Zebra Technologies outlines the benefits of an automated barcode wristband solution, including insight into: Reducing common Patient ID errors The advantages of automated Patient ID processes over manual The best automated barcoding options
Tags : patient, identification, streamline, hospital, processes, optimization, zebra
     Zebra Technologies
By: AWS     Published Date: Sep 23, 2019
Tanto si pertenece a un hospital público como a una compañía farmacéutica internacional, Amazon Web Services (AWS) le ayuda a agilizar procesos, mejorar la colaboración y seguridad, crear un entorno de experimentación e impulsar la innovación tecnológica. Las organizaciones del sector de la asistencia sanitaria y de las ciencias biológicas recurren a AWS para todo lo relacionado con el almacenamiento básico y los sistemas de información clínica. Y vamos más allá. Nuestro objetivo es respaldar y capacitar a los expertos para que dispongan de todo lo necesario para poder salvar vidas. Buscamos el compromiso mutuo en cada parte del proceso. Cuando es la vida lo que está en juego, solo nos conformamos con lo mejor. Descubra el futuro de la asistencia sanitaria con la nube de AWS.
Tags : 
     AWS
By: McAfee EMEA     Published Date: Mar 14, 2018
Die Nutzung von Cloud Computing-Services nimmt weiterhin stark zu, da Unternehmen ihre Geschäftsanwendungen und Daten zu Cloud-basierten Software-, Plattformund Infrastrukturdiensten migrieren. Gartner geht davon aus, dass die Ausgaben für öffentliche Cloud-Dienste im Jahr 2017 um 18 % steigen und bis 2020 mehr als 50 % der IT-Ausgaben in Zusammenhang mit der Cloud-Implementierung stehen werden. Deloitte Global sagt voraus, dass bis Ende des Jahres 2022 mehr als die Hälfte aller IT-Ausgaben auf IT-as-a-Service-Anbieter entfallen werden. Bei der Frage nach den größten Herausforderungen bei der Cloud-Absicherung nannten in der 2016er Ausgabe dieser Umfrage 56 % der befragten Sicherheitsexperten den unzureichenden Zugriff auf die erforderlichen Daten für die Reaktion auf Zwischenfälle sowie für forensische Analysen. 62 % gaben an, dass sie über nicht autorisierte Zugriffe von Außenstehenden besorgt sind, und 59 % machten sich Sorgen über andere Cloud-Mandanten. Von den 10 %, die eine Ko
Tags : 
     McAfee EMEA
By: Symantec.cloud     Published Date: Sep 28, 2010
Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.
Tags : messagelabs, symantec hosted services, embedded links, worm, security, malware
     Symantec.cloud
By: Shavlik Technologies     Published Date: Dec 15, 2010
What follows is a brief summary of research findings that should be considered when determining whether organizations can accept the risk of relative inaction regarding 3rd party application patching.
Tags : shavlik, patching, non-microsoft application, 3rd party application patching
     Shavlik Technologies
By: Evident.io     Published Date: Sep 13, 2017
Defending your cloud environment from menacing threats requires conditioning and ongoing commitment. Using best practices and identifying issues before they explode into costly problems are critical to long-term cloud fitness. Automating the process of monitoring and reporting is crucial to ensuring that your cloud is in the best shape it can be. With the "AWS Security Fitness Guide," you’ll learn the 11 exercises that are critical keeping your organization’s data and systems secure in Amazon Web Services (AWS).
Tags : 
     Evident.io
By: Riverbed DE     Published Date: Oct 16, 2017
Think SD-WAN is the panacea for modern networking? While there’s no doubt that SD-WAN technology is absolutely necessary to support the rapid innovation required by today’s cloud-first enterprise, it is just one of many capabilities that make next-generation networking possible. Read this eBook to learn how to take your enterprise network to a best-practices level with a complete solution that includes: • Cloud-grade SD-WAN to automate connectivity and orchestration across hybrid WANs, cloud networks, and remote branch LANs/WLANs. • Rich visibility into heavily-encrypted environments for an end-to-end view of performance and fast resolution of problems. • Built-in optimization that unifies application acceleration and SD-WAN network services for complete control over application performance.
Tags : cloud networking, wan, network services, application performance, technology
     Riverbed DE
By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 12, 2017
Recently, cloud-native has been touted as the panacea to all the development concerns. In this webcast, James Governor, a Redmonk analyst and founder, will share what cloud-native really is and how it helps your business. He will highlight organizations that lead the new era of development innovation with agile and continuous methodologies and follow cloud-native development practices. Aaron De Los Reyes, Sr. Director of Oracle Technology at Cognizant, will then share how they and their clients are approaching the shift to cloud-native development and migration strategies for their legacy deployments.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: CareerBuilder     Published Date: Jun 07, 2019
Do you ever wonder how companies like Google, Hilton, Facebook and Southwest consistently rank on “Best Places to Work” lists? It’s more than fancy perks — like free gourmet meals and snacks, pet-friendly offices and nap pods — that make employees clamor to work at these companies.
Tags : 
     CareerBuilder
By: NACR     Published Date: Feb 09, 2015
Do you know what the compliance issues are for your organization and the technology solutions you might consider? Download this guide to learn what you need to know.
Tags : nacr, compliance, technology, technology solutions, regulations, software compliance – contact center, data security, customer security
     NACR
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics