RSS feed Get our RSS feed

News by Topic

pay

Results 251 - 275 of 1193Sort Results By: Published Date | Title | Company Name
By: RelayHealth     Published Date: Jul 08, 2013
Helping you keep your finger on the pulse of the revenue cycle
Tags : revcycle report, payer payment resolution, payment velocity, patient service, payer reimbursements, revenue cycle, relayanalytics pulse
     RelayHealth
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains. Unlike appliances, our cloud security platform protects devices both on and off the corporate network. Unlike agents, the DNS layer protection extends to every device connected to the network — even IoT. Umbrella truly is the easiest and fastest layer of security to deploy everywhere. Download today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may also be the reality. The problem is that every single business that pays to recover their files is directly funding the development of the next generation of ransomware. As a result, ransomware is evolving at an alarming rate with new and more sophisticated variants. This makes defending your organization's data against ransomware more critical than ever. But where do you start? Lots of questions come to mind. We've got the answers.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
What is ransomware? Ransomware is a malicious software designed to hold a user’s files (such as healthcare records, financial contracts, manufacturing blueprints, software code, and other documents) for ransom by encrypting them and demanding the user pay a fee (often in Bitcoin) to decrypt them. How ransomware works Attackers initiate attacks using an array of tactics. Ransomware infections often first begin with an exploit kit — which are software kits designed to identify software vulnerabilities on endpoints and then upload and execute malicious code on the endpoint. Although variants of ransomware behave differently — there are many ways that Cisco can help. Download this whitepaper today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: KPMG     Published Date: Jun 06, 2019
Businesses increasingly see cloud as the best route to enhanced agility and digital transformation. But this survey reveals that keeping the lid on cloud costs is far from straightforward. Read this report to discover: • whether businesses are realising the benefits they anticipated from cloud migration • how effective companies are at managing cloud investments • the risks and consequences of getting locked into inefficient architectures.
Tags : 
     KPMG
By: Sage People     Published Date: Dec 06, 2017
Your customers won't rave about a simple payment experience. They won't talk on social media about the slickness of the online checkout process, but they will make a lot of noise about a bad payment experience, and your conversion rates and sales will take a hit. Learn how to delight your customers with our FREE insider’s guide to creating the perfect payments customer experience
Tags : 
     Sage People
By: Workday UK     Published Date: Apr 25, 2019
Lees deze expertanalyse van SMB Group en ontdek waarom één systeem voor finance, HR en payroll hét verschil maakt voor uw organisatie. U krijgt ook tips voor het kiezen van de beste oplossing voor uw organisatie.
Tags : 
     Workday UK
By: Workday Netherlands     Published Date: May 21, 2019
Lees deze expertanalyse van SMB Group en ontdek waarom één systeem voor finance, HR en payroll hét verschil maakt voor uw organisatie. U krijgt ook tips voor het kiezen van de beste oplossing voor uw organisatie.
Tags : finance, workday, workforce technology, digital strategy
     Workday Netherlands
By: Concur ENT     Published Date: May 11, 2018
VAT has been a valuable source of revenue for the UK Government since 1973. Yet, despite more than 40 years of getting used to calculating, paying and reclaiming VAT, businesses still struggle to adhere to HMRC guidelines. With support from SAP Concur, it doesn’t have to be this way. First, we offer an expense audit solution to check for fraud and non-compliance. Secondly, we work with tax specialists to help you comply with VAT regulations. Thirdly, we give you visibility and control over all aspects of your travel, expense and invoice spending. Crucially, we see VAT reclaim as an opportunity to reduce business costs and put money back in your budget.
Tags : 
     Concur ENT
By: Workday Netherlands     Published Date: Aug 07, 2018
HCM suites enable core HR, payroll, talent, workforce management and HR service delivery processes. Application leaders in entities with over 1,000 workers and emerging global needs that are pursuing a cloud HCM strategy should use this research to help identify vendors for further evaluation.
Tags : cloud hcm strategy, cloud solutions
     Workday Netherlands
By: Workday Netherlands     Published Date: Aug 07, 2018
HCM suites enable core HR, payroll, talent, workforce management and HR service delivery processes. Application leaders in entities with over 1,000 workers and emerging global needs that are pursuing a cloud HCM strategy should use this research to help identify vendors for further evaluation.
Tags : cloud hcm strategy, cloud solutions
     Workday Netherlands
By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : data, security, encryption, cloud environments, data regulation
     IBM
By: Taleo     Published Date: Apr 11, 2011
Do you know how your company is measuring up against the competition? It's imperative to uncover every distinction that sets your company apart. Your people, or talent, is a valuable asset you can use to impact success.
Tags : taleo, talent management, competition, employees, talent, asset, top peformers, engagement
     Taleo
By: EMC Corporation     Published Date: Oct 01, 2014
With ScaleIO you can easily deploy a flexible, scalable and high performance software defined Server SAN - delivering elastic, converged storage to your business on a ‘pay as you grow’ model. This converged infrastructure delivers hyper scalability and increased performance levels whilst reducing storage TCO.
Tags : storage, scalable performance software, converged storage, elastic storage, increase storage performance, storage tco
     EMC Corporation
By: athenahealth     Published Date: Apr 09, 2012
As health care costs rise, patients are required to pay more of those costs out of their own pockets. Learn 7 tips on how to deploy a self-pay strategy to help patients pay the balances.
Tags : patient payments, self-pay, patient payment, patient responsibility, health care self-pay, medical billing, practice management, athena health
     athenahealth
By: Workday     Published Date: Mar 02, 2018
Before Workday, Panera Bread’s payroll processes were manual, inefficient, and error-prone, and payroll nightmares and compliance risks were a regular occurrence. Complex systems and costly integrations made it impossible for the company to keep up with its rapid growth or gain valuable insights into global labor expenses. See the infographic to learn why unifying HR, payroll, time tracking, and absence management in a single system allows Panera to use one consistent, flexible, and scalable system across the U.S. and Canada.
Tags : panera bread, payroll, unifying
     Workday
By: Salesforce.com     Published Date: Oct 28, 2013
Just 7% of consumers say that customer service experiences they have with companies typically exceed their expectations. Now think about how you could succeed and profit as a business if you not only continually offered good service to your customers, but also frequently offered more than what they expected. Discover: The secrets to lining up your customer service with your brand. The best way to train employees. How to make employees feel good about giving great service. The significance of monitoring customer interactions. Which customer metrics you should pay attention to. The cheapest way to earn new customers. Download this ebook to learn what you need to do to give customers what they want and earn a customer for life!
Tags : customer service, best practices, 6 secrets, managing expectations, employee training, metrics, customer interactions
     Salesforce.com
By: Oracle     Published Date: Apr 29, 2014
This white paper examines how advanced controls can substantially improve the bottom line, the scope of the issues addressed by advanced controls, and the reasons why leading companies and experts who monitor cash leakage are increasingly looking to advanced control solutions.
Tags : oracle, cash leakage, cash management, improve the bottom line, vendor payments, advanced controls
     Oracle
By: CIC Plus     Published Date: May 28, 2014
How can payroll make sure the onboarding experience is a great one for new employees? This CIC Plus brief will show how payroll can flex its strategic muscles to make the onboarding process smooth and easy.
Tags : payroll, payroll processing, payroll company, payroll strategy, pay stubs, online pay stubs, online hr forms, onboarding
     CIC Plus
By: CIC Plus     Published Date: Sep 23, 2014
Learn three reasons that being a competitive employer of choice demands that you take advantage of a cloud-based, paperless system for generating and storing pay stubs and the increasing amount of data they contain.
Tags : payroll, payroll processing, multigeneration workforce, payroll company, payroll strategy, pay stubs, online pay stubs, online hr forms
     CIC Plus
By: McAfee     Published Date: Sep 15, 2014
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultaneously across multiple and rarely used protocols. Once inside, AETs reassemble to unleash malware and continue an APT attack.
Tags : hacker detection, advanced evasion techniques, network security, it security, security management
     McAfee
By: Workforce Software     Published Date: Feb 02, 2015
Effective workforce management starts with in an accurate, efficient and user-friendly method for capturing work hours, pay rates and absences. Those critical details inform you of whether you are overstaffing particular roles, shifts or locations (or the opposite), provide a true gauge of worker performance through productivity and attendance rates, and – when fully automated – keep your payroll spend in check. In short, there’s immense value in getting the right time and attendance system.
Tags : workforce software, software, automation, budgets, costs, compliance, visibility, labor
     Workforce Software
By: Workforce Software     Published Date: Feb 02, 2015
There’s lots of great research on the cost savings that better time, attendance, scheduling, and leave management solutions can bring to your business. Problem is, you may not have the time to dig that research up… even when it can help make the case for new investments. If you’re stretched for time but still looking for answers, this paper’s for you.
Tags : workforce software, software, automation, budgets, costs, compliance, visibility, labor
     Workforce Software
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics