accounts

Results 26 - 50 of 290Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 29, 2019
LTI’s REDaxis Solution has helped a Global CPG Major attain Improved Cash Collection and Accounts Receivable Productivity by Identifying opportunity areas and enabled workflow-driven approach. It also helped in DSO reduction, reduced TCO and more than 40% productivity improvement.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Socialbakers     Published Date: Mar 27, 2015
Social has the power to help your clients achieve larger marketing and business goals. But only 5% of brands use social to it’s fullest potential - do your clients and prospects? In this study we discuss social trends agency reps just have to know to stay ahead and ways you can leverage social to pitch prospects and preserve accounts.
Tags : 
the key agency success, social trends, social, social media, agencies, importance and content, social media marketing trends, social data, social analytics, videos
    
Socialbakers
Published By: Puppet     Published Date: Jul 13, 2016
If you’re new to Puppet on Windows, one of the first things you’ll want to do is start managing users and groups. In this webinar, we’ll demonstrate how to manage both local groups and Active Directory membership. The demo will include: - Managing administrator accounts - Managing local groups - Setting up a domain controller - Managing Active Directory membership Puppet can do a lot, but we always recommend starting small and building on your success. Managing users and groups is a great way to get started. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Published By: SAP Concur     Published Date: Sep 25, 2019
"Digital trends have impacted almost every aspect of today’s business world, from operational performance to customer service satisfaction. The payments department – the cash flow and working capital lifeline for an organisation – is no exception. Yet in Singapore and Malaysia, many organisations still have limited automation of the accounts payable (AP) process, or a heavy reliance on manual paper work. This report analyses the current AP landscape in Singapore and Malaysia, through surveys and interviews of 100 organisations in each country, across various industries. Download this Deloitte study to understand why automation is the top initiative for organisations today. "
Tags : 
    
SAP Concur
Published By: UNIT4 CODA     Published Date: Jul 13, 2011
IKEA uses one common finance system globally making accounting quicker and easier. Their standard Chart of Accounts updates information in real time from IKEA's operational systems, so each store has on-demand access to real-time performance data.
Tags : 
unit4 coda, coda financials, financial software, best-of-class, ikea, chart of accounts, system consolidation, capital, technology
    
UNIT4 CODA
Published By: ThingWorx     Published Date: Dec 03, 2015
By all accounts, the Internet of Things (IoT) is a vast, fast-developing opportunity for the enterprise and everyone connected to the enterprise. This IoT market analysis roundup by Postscapes shows the wide range of numbers that represent the IoT market.
Tags : 
thingworx, iot developer, enterprise, postscapes
    
ThingWorx
Published By: KPMG     Published Date: Sep 04, 2019
Key considerations when developing a strong and customer-friendly approach to intelligent authentication. Bank fraud is on the rise. In fact, according to a recent survey of 43 major banks around the world, it’s not just the number of fraud cases that is going up; so, too, is the value of fraud overall. In large part, this increase in fraud is the result of identity theft scams. Rather than attempting some sort of high-stakes virtual bank heist for all the gold in the vault, most online thieves seem content simply stealing money from every-day customer’s accounts when they aren’t looking.
Tags : 
    
KPMG
Published By: Availity     Published Date: Aug 08, 2013
Carolinas HealthCare System was growing, and as claim volumes mounted, claim error rates doubled. Find out how they recovered $8 million, brought claim edit backlog to zero, and reduced claim edits by 97 percent.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield, realmed, availity, practice billing, health plans, eligibility and benefits, denial management, health network, clearinghouse, denials, claims, transactions, hipaa
    
Availity
Published By: Availity     Published Date: Aug 08, 2013
Adventist Health System was troubled by inconsistent billing practices and disparate systems across seven central billing offices. Find out how they reduced time-to-payment by 17 percent -- bringing days in accounts receivable to an all-time low -- by standardizing processes and improving workflow with RealMed (now known as Availity Revenue Cycle Management).
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield, realmed, availity, practice billing, health plans, eligibility and benefits, denial management, health network, clearinghouse, denials, claims, transactions, hipaa
    
Availity
Published By: Availity     Published Date: Aug 08, 2013
Asheville Anesthesia Associates faced a growing accounts receivable file and a payment collection process that was too slow. Learn how they used RealMed (now known as Availity Revenue Cycle Management) to reduce time-to-payment by 75 percent, and reduce their average days in A/R by 62.5 percent.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield, realmed, availity, practice billing, health plans, eligibility and benefits, denial management, health network, clearinghouse, denials, claims, transactions, hipaa
    
Availity
Published By: Availity     Published Date: Aug 08, 2013
American Health Network faced one of the most vexing problems in health care: Claim denials. Learn how this physician-owned practice realized an ROI of 200 percent and recovered $1.4 million.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield, realmed, availity, practice billing, health plans, eligibility and benefits, denial management, health network, clearinghouse, denials, claims, transactions, hipaa
    
Availity
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security, security access
    
Entrust Datacard
Published By: Epicor     Published Date: Apr 04, 2016
To succeed in today’s challenging climate, distributors must keep pace with change, manage the complexities of growth, and keep their current accounts happy while attracting new customers. Download this white paper to learn how you can smoothly and efficiently grow a modern, integrated distribution business that customers will love. You’ll discover the five goals you can pursue to ensure your company’s secure growth: • Attract and sell to eCommerce shoppers • Convert one-time shoppers into business accounts • Become the preferred supplier in your field • Optimize for business efficiency • Defend your current accounts
Tags : 
epicor, distribution, business efficiency, ecommerce
    
Epicor
Published By: Dynatrace     Published Date: Apr 26, 2017
Digital business accounts for nearly a quarter of the world’s economy today, but many organizations still lack a complete view of the digital customer experience they’re delivering. That lack of clarity impedes business success. In this executive brief, MIT Technology Review describes how DPM can help bridge that gap.
Tags : 
customer experience, digital perforamnce, it performance, digital experience, digital experience monitoring
    
Dynatrace
Published By: SAP     Published Date: May 05, 2016
Leading experts share insights in new e-book from Accounts Payable News
Tags : 
sap, ariba, finance, purchase, pay, accounts payable
    
SAP
Published By: SAP Ariba     Published Date: May 05, 2016
Leading experts share insights in new e-book from Accounts Payable News
Tags : 
sap, ariba, finance, purchase, pay, accounts payable
    
SAP Ariba
Published By: SAP Ariba     Published Date: Jun 09, 2016
Chapter four from Ardent Partners’ in-depth study
Tags : 
sap, ariba, epayable, ardent partners, accounts payable
    
SAP Ariba
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager protects an organization’s business and empowers its people. The solution protects critical accounts and endpoints while providing a seamless user experience. CA commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) and enterprises may realize by deploying its Privileged Access Manager solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the CA Privileged Access Manager solution on their organizations.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA
Published By: Stitch Labs     Published Date: Sep 05, 2014
With 237 million active customer accounts, Amazon is often an appealing way for retailers to expand online sales. Learn how teaming up with this online marketplace can take your business to the next level.
Tags : 
stitch labs, stitch labs guide, platform, tips, retail, warehouse, management, optimize, organize, inventory, shipments, orders, data, stock, fulfillment, products, streamline, productivity, intuitive, efficient
    
Stitch Labs
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library