admin

Results 301 - 325 of 790Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Feb 21, 2018
Few industries have seen as much change in recent years as the healthcare sector. Sweeping legislation, a new incentive structure, a raft of regulations, and an emphasis on wellness rather than mere “sick care” have altered the clinical and administrative landscapes. Oracle is helping healthcare organizations deliver great patient experiences with a cloud-based strategy that uses innovative technology to meet the needs of everybody involved in the continuum of care.
Tags : 
     Oracle
By: Forcepoint     Published Date: May 03, 2016
Todos nuestros productos están disponibles para una demostración personalizada. Por favor complete el formulario de la derecha. Algunos de nuestros productos —que se enlistan a continuación— también están disponibles para evaluaciones gratuitas (en inglés) para que pueda probarlos en su propio entorno de TI. De cualquiera de estas dos opciones, un representante de Forcepoint™ trabajará con usted para asegurarse de que esté evaluando exactamente el producto adecuado con las opciones adecuadas para usted. Para evaluaciones gratuitas, escoja el paquete de evaluación correspondiente abajo y complete el registro. Recibirá un mensaje de correo electrónico que lo guiará para configurar y administrar su evaluación. El soporte del producto estará disponible durante el tiempo que dure la evaluación del producto. Visite nuestra sección de soporte si tiene alguna pregunta.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 03, 2016
Todos os nossos produtos estão disponíveis para uma demonstração personalizada, basta preencher o formulário à direita. Alguns produtos — listados abaixo — também estão disponíveis para avaliação gratuita (em inglês) para que você possa testá-los em seu próprio ambiente de TI. Em qualquer caso, um representante da Forcepoint™ trabalhará com você para garantir que avalie o produto certo e com as opções mais adequadas para você. Para avaliações gratuitas, escolha o pacote de avaliação apropriado abaixo e conclua o registro. Você receberá um guia por e-mail sobre como configurar e administrar a avaliação. O suporte do produto estará disponível durante a avaliação. Acesse a seção Suporte se tiver perguntas.
Tags : 
     Forcepoint
By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: • Seamless, secure end-user access to applications and files • Easy-to-use enterprise app store • Management security • Fully integrated infrastructure stack • Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
     VMware
By: Jamf     Published Date: Aug 12, 2019
IT administrators must not only respond quickly to security issues, but also proactively guard against them. And, while Apple has invested a great deal in its security features, no operating system is immune to security challenges. But don’t worry. Jamf put together a comprehensive Apple security guide to ensure your Mac, iPad, iPhone and Apple TV devices remain protected.
Tags : 
     Jamf
By: HP Inc.     Published Date: Jul 03, 2019
hile Bitcoin took a bit of a beating in August 2018, it did little to dampen interest in the obviously volatile cryptocurrency market. Bitcoin lost 20 percent of its value in just two weeks in August, according to some reports1 , and yet there appears to be substantial optimism in the currency. According to one report2 , there were 96 new crypto hedge funds launched in the first seven months of 2018 and when the Turkish Lira plummeted 20 percent in August 2018, there was a surge in Bitcoin trading3 . Cryptocurrency is clearly here to stay and while that may whet the appetite of brave investors, it’s also a magnet for crime. Unsurprisingly perhaps, hackers are targeting4 cryptocurrency exchanges but what many businesses and individuals may not realize is that there is serious money to be made in actually performing admin functions for the currencies themselves. Called cryptomining, it can be big business. Some reports5 have suggested that profits from mining have hit over $4 billion b
Tags : 
     HP Inc.
By: Kronos     Published Date: Sep 20, 2018
A As the healthcare industry shifts focus from volume to value, standardization is needed to accurately benchmark labor resource utilization. This is the premise of a survey conducted by HealthLeaders Media and sponsored by Kronos. What constitutes direct patient care? Hands-on patient assessment, administering medications, and performing procedures clearly top the list. But can other activities be considered direct care too—even those not conducted in a patient’s presence?
Tags : 
     Kronos
By: Excellus BlueCross BlueShield     Published Date: Apr 03, 2018
Help your team get access to the care they need from the office, the road, or the comfort of their own homes, with telemedicine.
Tags : high deductible health plan, excellus, bluecross, blue shield, medicine, doctor, benefits administration, benefits management
     Excellus BlueCross BlueShield
By: Excellus BlueCross BlueShield     Published Date: Sep 20, 2018
When employees don’t understand their high deductible health plans (HDHPs), they’re less likely to use them. Educate your team with this.
Tags : high deductible health plan, voluntary benefits, benefits administration, benefits management, pharmaceuticals, pharmacy/prescriptions, customer satisfaction, pharmacy benefits manager
     Excellus BlueCross BlueShield
By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Viele Unternehmen möchten sich in stark umkämpften Märkten einen Ruf als Innovatoren erarbeiten und streben daher die Flexibilität an, die erfolgreiche Internet-Unternehmen auszeichnet. Die Komplexität der Anwendungsentwicklung nimmt dadurch jedoch schnell stark zu. Der umfangreiche und oft monolithische Quellcode herkömmlicher Unternehmensanwendungen ist keine geeignete Basis für die schnelle Einführung neuer Services. Voneinander isolierte und möglicherweise auch geografisch verteilte Entwickler- und Administratoren-Teams bringen zusätzliche Herausforderungen auf organisatorischer Ebene mit sich. Gleichzeitig steigen die Ansprüche der Anwender. Unternehmen müssen ihre Anwendungen effektiv skalieren und überwachen können, um eine gleichbleibend hohe Leistung und Benutzerfreundlichkeit zu gewährleisten. Dabei gilt es inzwischen als selbstverständlich, dass Services rund um die Uhr uneingeschränkt verfügbar sind.
Tags : 
     AstuteIT_ABM_EMEA
By: Google Chrome Enterprise     Published Date: May 07, 2018
Browsers combined with cloud-based services have effectively replaced desktop software, with an average of 1,053 cloud services in user per enterprise. This guide identifies key security features for IT administrators to consider when selecting a browser.
Tags : 
     Google Chrome Enterprise
By: Bluewater Learning     Published Date: Apr 09, 2018
As great as Cornerstone OnDemand is, anyone could use a little help solving more of their learning and talent management challenges. With the right partner, you can achieve greater business results with Cornerstone almost immediately.
Tags : bluewater, bluewater assurance, cornerstone ondemand support, cornerstone ondemand administration, cornerstone ondemand assurance, cornerstone ondemand reporting, cornerstone ondemand ux workflows, cornerstone ondemand content
     Bluewater Learning
By: Oracle     Published Date: Oct 20, 2017
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems. Many existing data protection solutions fail to meet the demands of critical databases because they treat them as generic files to copy as opposed to specialized resources. Taking a generic approach to database backup and recovery not only exposes you to the risk of data loss, it also negatively impacts performance and makes it difficult to recover within acceptable timeframes.
Tags : 
     Oracle
By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how one of the UK’s leading charities used the Webroot® Web Security Service to resolve problems with its existing Web security solution, which revolved mainly around administration and reporting. In addition, since the vast majority of Scope’s workers are mobile the organization needed a solution to protect them.
Tags : scope charity, disabled, services, opportunities, complex, support, peer-to-peer suppot, education and learning
     Webroot UK
By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : email security, cyber threats, it security, phishing
     Mimecast
By: VMware AirWatch     Published Date: Nov 12, 2015
VMware continues to raise the bar in business mobility. It offers the most streamlined process for deployment and management of business mobility solutions through its EUC products, and has given IT administrators the perfect set of options to efficiently manage the challenges of business mobility. The company continues to grow by bringing complete solutions that go beyond simply providing basic client or desktop monitoring services. Frost & Sullivan believes that VMware is in an ideal position to help its customers execute on their next-generation business mobility strategies; based on this analysis Frost & Sullivan recognizes VMware with the 2015 Visionary Innovation Leadership Award.
Tags : vmware, business mobility, euc products, end user computing, it management, enterprise applications
     VMware AirWatch
By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : byod, policy, guide, mobile, security, cloud, apps, administration
     Absolute Software
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
     Centrify Corporation
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
     Centrify Corporation
By: Okta     Published Date: Dec 15, 2010
This paper focuses on the challenges of integrating Salesforce.com logins for single sign-on (SSO) and automating provisioning/de-provisioning from on-premise directories like Active Directory.
Tags : okta, user management automation, single sign-on, salesforce.com, active directory, access management, application administrator, application integration
     Okta
By: Okta     Published Date: Jul 05, 2012
For many organizations, portals are an increasingly important way of providing critical application access to partners and/or customers. Assembled from multiple web applications, portals introduce unique identity management challenges, because unlike internal employees, users from customers or partners aren't typically stored in the corporate directory. This forces administrators to maintain multiple user-stores and end-users to register, and manage logins for, each app individually.
Tags : okta, partner portals, enterprises, target applications, it management
     Okta
By: Okta     Published Date: Jan 30, 2013
Read this whitepaper to learn about moving beyond user names and passwords, and how Okta's MFA solution for on premises and cloud apps provides both the highest security and simplest administration possible.
Tags : okta, multifactor, authentication, user names, passwords, beyond users, okta multifactor authentication, security
     Okta
By: Ambrose Group     Published Date: Nov 29, 2010
Professional Employer Organizations partner with businesses to manage payroll, employee benefits, and back-office HR administration. The PEO solution involves a legal arrangement called "co-employment" which allows the PEO to make payroll, deposit employment taxes, and provide insurance benefits from its own account, rather than as an agent or on behalf of its client.
Tags : ambrose, peo, hedge funds, management, professional employer organizations, fixed fee, esac, audited statements
     Ambrose Group
By: Ambrose Group     Published Date: Nov 23, 2010
Professional Employer Organizations partner with businesses to manage payroll, employee benefits, and back-office HR administration. The PEO solution involves a legal arrangement called "co-employment" which allows the PEO to make payroll, deposit employment taxes, and provide insurance benefits from its own account, rather than as an agent or on behalf of its client.
Tags : ambrose, peo, hedge funds, management, professional employer organizations, fixed fee, esac, audited statements
     Ambrose Group
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com