id management

Results 251 - 275 of 2609Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Aug 09, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based human capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : hcm, cloud, cloud services
     Oracle
By: Oracle     Published Date: Aug 15, 2013
This e-book draws on the insights of independent researchers, Oracle Human Capital Management (HCM) product and industry experts, and Oracle HCM customers. It aims to provide both inspiration and practical roadmaps to simplify workforce management, build the best talent, and help HR leadership make a major contribution to their companies’ overall success.
Tags : driving, hcm, oracle, enterprise applications
     Oracle
By: Oracle     Published Date: Aug 15, 2013
Talent management has moved to the top of the CEO’s agenda. In a 2012 global survey of CEOs and CFOs by the Economist Intelligence Unit, 53 percent of these leaders said that insufficient talent within their organization could harm them financially over the next 12 months. The number expressing financial concerns rose to 67 percent at organizations with more than 1,500 employees. Moreover, a full 83 percent of HR and business executives believe that talent programs need to be improved, according to Deloitte’s 2012 report Talent Edge 2020. With statistics like these, it’s no wonder there’s more pressure than ever on HR leaders to make the right talent decisions for their organizations and to source the right talent management systems to maximize the value of their workforce.
Tags : oracle, talent cloud, cloud, talent management, enterprise applications
     Oracle
By: Oracle     Published Date: Aug 15, 2013
The beauty of the cloud is that you can get up and running fast. The following e-book will provide you a greater insight into Oracle HCM Cloud Services that are a new generation of cloud-based juman capital management applications from the global leader in HR management software. Oracle HCM Cloud Services offer many powerful features and capabilities to accelerate your time to value.
Tags : hcm, cloud, cloud services, enterprise applications
     Oracle
By: GE Healthcare     Published Date: Aug 27, 2015
Healthcare organizations are facing uncertain times, which are putting enormous strains on their revenue cycle management (RCM). Automation is proven to improve RCM measures, and even small improvements can significantly impact the bottom line. This whitepaper details how providers can embrace automation to help drive financial performance.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims, denials, cost to collect, patient accounting
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
Children’s Mercy is not only one of the nation’s top pediatric medical centers, they have a strategy that improves organizational profitability in the face of constant change – all while delivering world-class care for their patients. Children’s Mercy accomplished what many have tried: integrating hospital and ambulatory revenue cycle activities with complete integration of all processes on a single IT platform.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims, denials, cost to collect, patient accounting
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
Sharp is leading the way in the shift to shared risk. In this journey, they manage to the right financial metrics while still delivering appropriate care to their patient population. Watch the video to learn how GE Healthcare is helping Sharp make a difference.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims, denials, cost to collect, patient accounting
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
Centricity™ Business Performance Manager service helps Schumacher Group make significant workflow improvements and reduce rework costs by approximately $3.8 million per year.
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims, denials, cost to collect, patient accounting
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
The shift to value-based reimbursement (VBR) entails more financial risk for providers. Successful management of the transition to VBR can only be achieved when healthcare organizations are clinically and financially integrated to ensure tight care coordination and efficient resource utilization. That level of integration requires the aid of a robust IT infrastructure to support the enterprise. This whitepaper offers the opportunity to learn about new tools for healthcare providers to manage financial challenges associated with value-based reimbursement
Tags : centricity business, financial management, revenue cycle, hospital billing, hospital finance, patient billing rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims denials, cost to collect, patient accounting, practice management
     GE Healthcare
By: GE Healthcare     Published Date: Aug 27, 2015
This paper will explore some of the market dynamics driving the financial volatility in healthcare and will explore how advanced analytics, with the right IT backbone and organizational competencies, can help organizations successfully identify ways to manage revenue cycle profitability.
Tags : centricity business, financial management, analytics, revenue cycle, hospital billing, hospital finance, patient billing, rcm, episodic payment, accountable care, icd-10, healthcare reform, shared savings, capitation, payment reform, risk based contracting, hospital consolidation, [mjm] claims, denials, cost to collect
     GE Healthcare
By: Venafi     Published Date: Mar 26, 2015
Public key infrastructure (PKI) is the foundation of today’s enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation. This leads to errors and missed system updates that result in policy violations and costly business interruptions. You can solve these issues with a PKI refresh that delivers automated key and certificate security and management.
Tags : pki refresh, public key infrastructure, system errors, system updates, automated key securit, certificate security
     Venafi
By: Akamai Technologies     Published Date: Apr 25, 2018
How Lowe’s, a Fortune 50 retailer, transformed into a omnichannel commercial success with digital performance management. In this case study, learn how Lowe’s transformed into a performance culture and delivered: Over USD$1 billion in eCommerce sales driven with growth in traffic and conversion Slashed average page load speed by half Correlated site performance with sales impact using predictive analytics Established data-driven decision making for increased customer focus and revenue
Tags : lowes, omnichannel, foundation, akamai, digital, performance, management, ecommerce
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 02, 2019
Loyalty and rewards programs are powerful tools for brands to boost member engagement, acquisition, and retention. Learn why leading brands are turning to modern customer identity and access management (CIAM) solutions to scale their loyalty programs, improve user experience, and maximize ROI. In this paper, we identify the challenges associated with transforming, expanding, and scaling customer loyalty and rewards programs and related membership initiatives, and present solutions based on real-world case studies from four industries. We explore the requirements for an enterprise-grade CIAM solution and address related issues such as build vs. buy and CIAM vs. IAM. By examining four diverse case studies — and the resulting identity management solutions that were implemented by the respective companies — this paper provides valuable insight for any enterprise wishing to expand or uplift its customer loyalty program to meet membership needs in the age of the consumer.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Jul 02, 2019
Customer identity and access management (CIAM) is increasingly important for brands to deliver the seamless, secure digital experiences demanded by empowered consumers. As part of its Identity and Access Management Playbook, Forrester Research provides guidance to build a customer-obsessed IAM team that has the technical skills, business influence, and interpersonal attributes to architect a CIAM strategy and roll it out across functional groups. Read the full report to learn critical considerations to make your CIAM team effective. Report highlights: ? Four essential roles for your CIAM team ? Why sharing and integrating customer data across organization barriers is critical for success ? The most important technical, business, and interpersonal skills to look for in CIAM candidates
Tags : 
     Akamai Technologies
By: Pega     Published Date: May 24, 2016
Customers are evolving. They are evolving in the way they get information about products, what goes into making their purchase decision and ultimately how they buy. Businesses need to evolve and adapt how they manage their customer relationships. Customer Relationship Management (CRM) software was supposed to improve front-end customer engagement across marketing, sales and service. Unfortunately, most systems have the opposite result. Companies spend too much time integrating and maintaining disconnected systems and too little time nurturing relationships. Organizations need to transform their organizations from the inside out—embracing new processes and technologies that gathers, stores and gives them access to customer data so they gain more insight into their customers and therefore create more effective marketing and service programs. Download this Ebook and gain a better understanding of how a more robust CRM system can improve customer management.
Tags : 
     Pega
By: Secureworks     Published Date: Nov 11, 2016
This paper explores why the older “all or nothing” kind of relationship between business organisations and information security services providers (ISSPs) is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Tags : managed security services, cybersecurity, issps, security, threat and vulnerability management
     Secureworks
By: Workfront     Published Date: Mar 10, 2017
This guide gives an in-depth view into Marketing Work Management (MWM), a groundbreaking work approach that addresses how marketing and creative teams can be most productive in every phase of the marketing workflow.
Tags : workfront, marketing work management, buyers guide, mwm, marketing workflow
     Workfront
By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : data breach, it security, malicious spyware, security management, cloud security, system protection
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : cloud security, cloud management, it protection, api integration, credential verification, security efficiency
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
     CA Technologies
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
     MalwareBytes EMEA
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com