• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

keys

Results 51 - 75 of 206Sort Results By: Published Date | Title | Company Name
By: Aerohive     Published Date: Jun 01, 2015
Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security, access control, anti spam, anti spyware, application security, firewalls, wifi, wireless infrastructure
    
Aerohive
By: RelayHealth     Published Date: Apr 01, 2013
Statements can be a great opportunity to improve the patient experience and expedite collections, or they can lead to frustrated patients, lower self-pay revenue and increased bad debt. As pioneers of the healthcare industry’s patient-friendly initiative nearly 10 years ago, RelayHealth continues to research and innovate. Its most recent patient focus group provided input on how statement design impacts their satisfaction with the hospital, post-discharge experience and willingness to pay. Learn the critical components to creating patient statements that get results and help compel patients to pay: Download the 10 Keys to Creating Engaging Patient Statements today.
Tags : 
statements, patient statements, healthcare, collection, patient experience
    
RelayHealth
By: IBM     Published Date: Feb 02, 2016
Advanced analytics can provide extremelyvaluable insight into today’s media viewers. This must-read report details the top 10 best practices for successfully implementing data analytics for driving profit, attracting new viewers, and increasing viewer loyalty.
Tags : 
ibm, big data, analytics, media, entertainment, data analytics, analytical applications, business intelligence
    
IBM
By: Oracle     Published Date: Feb 09, 2017
Like so much industry jargon, it’s a catchy moniker that some might dismiss as just another trendy phrase that’s all the rage today and gone tomorrow.
Tags : 
    
Oracle
By: Kaseya     Published Date: May 13, 2015
At the same time that organizations are moving many of their IT assets to the cloud, the problem of how to manage all of an organization’s IT assets has, in many ways, become more complex.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, network architecture, network management, network performance, cloud computing
    
Kaseya
By: NetApp     Published Date: Feb 19, 2015
This report examines the most common hybrid cloud architectures and the storage management factors required for IT to extend their data center with efficiency. Learn about the keys to successfully implementing a hybrid cloud approach.
Tags : 
    
NetApp
By: Brainshark     Published Date: Aug 02, 2017
Coaching is a top priority for sales organizations – but most managers tasked with coaching admit they’re not sure how to develop or maintain an effective coaching program. Whether you’re starting a coaching initiative or making modifications to one, you won’t get far without the right buy-in, processes and resources. This exclusive eBook offers 11 must-haves for effective sales coaching. Inside you’ll find: • How to develop a comprehensive coaching plan • The difference between coaching and training (and why you need both) • Tips to make your current coaching program more effective Ready to see better coaching results? Download your free copy today. Download your free copy and start enabling your sales managers to reach their maximum coaching potential.
Tags : 
sales, sales coaching, coaching initiative, sales sucess
    
Brainshark
By: CA Technologies EMEA     Published Date: Aug 07, 2017
Ubiquitous connectivity and mobile devices have changed everything, opening up markets to millions of new consumers across the globe. Within the past few years, nimble upstarts have created mobile apps that have converted banking customers, cab riders and hotel guests at unprecedented rates. Large, established brands are scrambling to transform their businesses in order to maintain market share. To compete in this application economy, you must adapt or be left behind.
Tags : 
testing effort, delivery model, sdlc, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
By: Diligent     Published Date: Aug 05, 2016
This article provides an evaluation framework for directors and senior management. Focus is on three main factors: where data is stored, the strength of “locks” that provide access, and the control of “keys” for entry.
Tags : 
cybersecurity, security management, security, access control, anti spam, application security, security policies
    
Diligent
By: Zscaler     Published Date: May 15, 2019
Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.
Tags : 
    
Zscaler
By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : 
sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance, advanced persistent threats, apt, insider threat, security, cloud computing
    
Vormetric, Inc.
By: Entrust Datacard     Published Date: Jul 21, 2015
This paper reveals how Entrust Authority Security Manager, the world's leading public key infrastructure (PKI), helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
Entrust Datacard
By: MarkLogic     Published Date: Jun 21, 2017
Remember Y2K – the IT “problem” that should have brought businesses to a screeching half? Despite the hype, the preparation led to widely documented business benefits and uncovered new opportunities that transformed organizations worldwide. Similarly in today’s highly regulated Financial Services industry, enabling GRC by integrating data from silos can be the driver for future business use cases like machine learning and anti-fraud detection services. GRC can be your catalyst for new opportunities. Listen in as our panel of financial services experts discuss the keys to reinventing your data strategy. We’ll cover: How to align your GRC strategy with a business transformation agenda How to ensure your organization’s approach to data management isn’t just a one-off solution, but a comprehensive one adaptable to changing regulations How to navigate the increasing regulatory demands for granular data security How to turn your compliance spend into new opportunities to earn revenue
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting, business transformation, fraud, digital transformation
    
MarkLogic
By: NetApp     Published Date: Jun 01, 2017
Here are the five core principles for monetizing your storage like never before and winning more customer applications than ever for your cloud and hosted services. These are your keys to the next generation data center.
Tags : 
netapp, data center solutions, cloud storage
    
NetApp
By: MuleSoft     Published Date: Jan 25, 2016
Data is one of the most valuable business assets. Companies are using data to provide more personalized, tailored experiences to their customers, analyzing customer and operational behavior to make better decisions, and providing web and mobile apps to their customers, employees, and partners. As the keys to that data, APIs are poised to become valuable business assets in and of themselves. In this whitepaper, we'll learn how APIs are currently transforming the enterprise, and how they will become even more integral to how we do business in the future.
Tags : 
data management, business practices, data center. data application, enterprise applications, api management, application integration, application performance management, best practices, business activity monitoring, business intelligence, business management, content integration, content management system
    
MuleSoft
By: Oracle     Published Date: Jun 01, 2016
Many companies that sell online direct to consumers are evaluating whether they can better achieve their revenue and growth goals by either shifting their e-commerce infrastructure to the cloud, or by migrating to a more flexible and scalable SaaS solution that doesn't limit their growth. But what are some of the key considerations as you evaluate your options? Download this whitepaper to learn the 3 keys to igniting your business growth as you consider SaaS commerce solutions.
Tags : 
    
Oracle
By: Sitrion     Published Date: Oct 04, 2016
Download this white paper to learn more about these 5 keys to align employees with your company culture and values; 1. Repeat, repeat, repeat and then repeat again 2. Share stories 3. Build it in 4. Reach everyone, leverage every possible channel 5. Leverage modern technology
Tags : 
    
Sitrion
By: IBM     Published Date: Apr 21, 2016
Industry analysts expect North American sports industry revenue to grow at a compounded annual rate of 4.8% to reach $67.7 billion by 2017, with customer-generated data the most collected type of external data.1 IBM Fan Insight, a software as a service-based solution available in the IBM Softlayer Cloud, and offers sports teams the breakthrough customer intelligence they need to lead in their industry.
Tags : 
ibm, sports marketing, sports industry, fan insight, kpi dashboard
    
IBM
By: HotSchedules     Published Date: Apr 17, 2019
It’s harder than ever for restaurants to retain employees. Hourly workers have more job opportunities, especially with the rise of on-demand work in the gig economy. Now, restaurateurs don’t just have to worry about employees leaving to work at other restaurants — they need to worry about them leaving the industry altogether. In order to fight this turnover, restaurants need to provide employees with clear development opportunities in the workplace. In this ebook, we’ll explore: • How restaurants can invest in their people through innovative training programs • The core aspects of developing an engaging development program in your business • Success stories from three industry leaders in the field of talent development
Tags : 
    
HotSchedules
By: Oracle + Dyn     Published Date: Jun 27, 2017
"Most organizations have invested in improving the performance and resiliency of their on-premise Global Load Balancing (GLB) capabilities, but very few organizations are able to achieve the level of performance and high availability that a cloud-based anycast DNS network can offer. Enterprises across the globe have begun complementing their existing GLB with a DNS service that operates in an always-on manner and can effectively manage and balance internet traffic through intelligent steering capabilities. Download whitepaper and learn the keys to: • Maintaining availability - through global and regional load balancing • Improving digital experience in a hybrid cloud environment • Increasing performance and reliability through a secondary DNS solution Learn more! "
Tags : 
    
Oracle + Dyn
By: Vindicia     Published Date: Oct 04, 2017
Consumers and businesses can subscribe to a virtually infinite array of products and services. From meal delivery and financial advice to legal services and weight-loss coaching, people try to keep using services that fit their needs. The subscription business model is having an equally dramatic impact on businesses like yours. Instead of investing in customer acquisition in hopes that customers will simply make a one-time purchase, you entice people into making a recurring commitment to your offering.
Tags : 
    
Vindicia
By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
The implementation of a distributed order management (DOM) system no longer has to be a daunting endeavor. Gartner surveyed 17 DOM software vendors and interviewed 25 retail clients with recent DOM implementation experience to develop a best practices guide. Read the report to understand the keys to a successful DOMS implementation.
Tags : 
gartner, order management, supply chain, business application
    
Group M_IBM Q1'18
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
    
Group M_IBM Q2'19
By: Cranfield University     Published Date: Jan 28, 2015
This article provides information on the need that organisations should undertake a post-investment review and the keys to guarantee an effective post-investment review.
Tags : 
the need for post-investment review, undertake post-investment review, productivity
    
Cranfield University
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter