accounts

Results 51 - 75 of 290Sort Results By: Published Date | Title | Company Name
Published By: Lieberman Software     Published Date: Mar 27, 2012
Lieberman Software offers a solution today that helps secure unmanaged privileged accounts in your datacenter and prevent data breaches. Watch how we do it in this brief two minute video.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: Onbase     Published Date: Feb 18, 2016
Today’s increasingly competitive global economy requires businesses to make decisions faster than ever. Businesses need instant insight into the status of their people and processes. But manual, paper-based processes undermine decision-making. Paper makes it difficult for businesses to make smart decisions about their operations and their working capital. Manual processes also are costly and inefficient, create headaches for front-line staff, introduce compliance and security risks, and stymie collaboration with trading partners.
Tags : 
finance, decision-making, accounts payable, business practices, finance management
    
Onbase
Published By: Onbase     Published Date: Feb 18, 2016
During the past 10 years, organizations have adopted accounts payable (AP) automation technologies at an accelerating pace. Document imaging, data capture, and other solutions are radically transforming the way AP departments work with their traditionally most common medium, paper. At the same time, the promise of electronic transactions is quickly becoming more of a reality, with growth year after year in the number of transactions sent and received electronically.
Tags : 
accounts payable, account management, business practices, optimization strategies
    
Onbase
Published By: Onbase     Published Date: Feb 18, 2016
Accounts payable has been talking about end-to-end integrated automation for at least 40 years. Today, the technology exists, but resources are limited and end-to-end AP automation is still not standard. Some AP departments have automated pieces of the AP process, but an end-to-end solution should include the ability to capture, integrate, measure, process, store, and access information.
Tags : 
accounts payable, business management, business practices, accounting, finance
    
Onbase
Published By: CA Technologies     Published Date: Aug 26, 2016
Virtualization and cloud computing adoption are elevating the importance and complexity of an age-old problem: effectively managing and protecting passwords for privileged accounts.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
For sales teams to be successful in the age of the customer, they need tools that help them close more deals, faster. Some CRM tools are underused because they’re not geared to helping reps sell in the modern era. This may be because they’re complicated to use; because they’re isolated from the apps your reps use every day; or because they don’t give reps the information they need. Today, sales automation is not (just) about managing accounts, contacts, and activities. It’s about gaining insight that provides a competitive edge, having access to predictive information, being able to collaborate in real time, creating quotes in front of the customer, updating forecasts. All at any time, from any place, using mobile devices—all helping to drive sales and pipeline.
Tags : 
sales, mobile, analytics, customer data, sales automation, accounts, contacts, predictive information
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
After evaluating all the options on the market, one company chose Automation Anywhere RPA to start its digital transformation journey and automate its invoice processing, help desk, and internal financial reporting processes. The company achieved its initial goals—and more. It got the first initiative—automating accounts payable—up and running in less than 6 months, and increased the efficiency of the operation by 300%.
Tags : 
efficiency, rpa, roi, digital workforce, ocr
    
Automation Anywhere APAC
Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
As a B2B Marketer, you spend a lot of your time coming up with new ways to reach the right prospect, at the right time, with the right message. Account-Based Marketing (ABM) is a tried-and-true strategy to help you do all three. By treating each account as a market of one, you can deepen your relationships with individuals at key accounts and ultimately increase revenue. For more ways ABM can help you up your marketing game, download this eBook.
Tags : 
    
Oracle Marketing Cloud
Published By: Schneider Electric     Published Date: May 20, 2019
Developing an optimal arc flash protection strategy for a given facility can be difficult due to the number of solutions and system variables involved. Effective arc flash hazard reduction is best achieved by establishing an overall system protection strategy that accounts for safety and operational requirements as well as system reliability and availability. An overview of available solution categories and application guidance based on experience in a wide variety of facility types is presented in order to assist engineers trying to implement “safety by design” principles to help deal with arc flash hazards. The approach provided addresses the complexities of the trade-offs between competing priorities and provides tools that help users develop effective protection strategies for the unique circumstances in a given facility.
Tags : 
consulting, protection strategy, schneider electric
    
Schneider Electric
Published By: Mimecast     Published Date: Aug 16, 2018
Email. You use it constantly. And it’s the number-one application to keep your organization functioning, lines of communication flowing, and productivity seamless. Organizations need email to stay up-and running all the time. After all, it’s supposed to just work, right? This is where trouble often sets in. Cybercriminals use email constantly, too. It’s the number-one vector used to initiate attacks like malware delivery (think ransomware), impersonations and phishing attacks. In fact, almost 90% of organizations* have seen the volume of phishing attacks either rise or stay the same over the past 12 months. Internal threats have also been on the rise: Most organizations have encountered internal threats driven by careless employees (88%), compromised accounts (80%) or malicious insiders (70%) over the last year.
Tags : 
    
Mimecast
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Das Management privilegierter Anwender war schon immer eine wichtige Aufgabe. Jetzt, wo sie immer mehr werden, wird es zu einer noch wichtigeren und komplexeren Herausforderung.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Das Privileged Access Management umfasst Funktionen für Kontrolle, Monitoring und Auditing, mit denen die Risiken im Zusammenhang mit privilegierten Anwendern, Accounts und Anmeldeinformationen gemindert werden sollen. In den letzten Jahren hat sich herausgestellt, dass diese Aufgabe für Unternehmen aller Arten hohe Priorität hat. Diesem Anstieg an Interesse und Aufmerksamkeit liegen mehrere Faktoren zugrunde:
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diebstahl und Missbrauch sensibler administrativer Anmeldeinformationen verursachen Sicherheitsverletzungen und Betriebsunterbrechungen. CA Privileged Access Manager verbessert die IT-Security, Unternehmenseffizienz und Compliance durch den Schutz privilegierter Anmeldeinformationen und Ressourcen sowie durch die effiziente Überwachung, Kontrolle und Verwaltung der Aktivitäten privilegierter Anwender.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: Concur ENT     Published Date: May 11, 2018
Business travel accounts for the majority of your employee expenses. Travel and expenses are intrinsically linked, so why not manage them together? When you combine travel and expense, some questions are easier to answer: • Where can I find a full picture of travel and expense spend? • Are expense claims aligned to my travel policy? • Can I reclaim some VAT? To connect travel and expense management, businesses usually look for software that can manage both processes from beginning to end. This is commonly referred to as an integrated solution. The results could be cost savings, faster delivery or improved employee adoption and satisfaction
Tags : 
    
Concur ENT
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Le présent rapport fournit un schéma directeur permettant de déterminer les coûts directs, indirects et cachés du déploiement d’une telle solution au fil du temps.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: Millennia Patient Service     Published Date: May 05, 2014
Learn about 3 key points and statistics that you will need to understand and manage the impact ObamaCare and PPACA will have on the medical provider revenue cycle.
Tags : 
millennia patient services, patient receivables, patient accounts receivables, obamacare, ppaca, medical support service, medical provider revenue cycle, patient a/r, revenue cycle management
    
Millennia Patient Service
Published By: NetApp     Published Date: Dec 09, 2014
Although the cost of flash storage solutions continues to fall, on a per-gigabyte capacity basis, it is still significantly more expensive to acquire than traditional hard drives. However, when the cost per gigabyte is examined in terms of TCO, and the customer looks past the pure acquisition cost and accounts for “soft factors” such as prolonging the life of a data center, lower operating costs (for example, power and cooling), increased flexibility and scalability, or the service levels that a flash solution enables, flash solution costs become increasingly competitive with spinning media.
Tags : 
flash storage, netapp, tco, flash storage solutions, soft factors, flash solution
    
NetApp
Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox, authentication, two-factor authentication
    
Vectra Networks
Published By: FICO     Published Date: Jun 07, 2016
As IT departments’ lists of backlogged application development projects keep growing, so does the speed of new development requests from line-of-business personnel. For many IT departments, the speed of business — the speed of requests for additional developments — can’t be met under current practices. This inability to keep pace with critical development requests, supporting timely strategy modifications, seriously impacts an enterprise’s profitability. The solution FICO advocates — one that accounts for budget constraints, legacy operational realities and quality assurance — is to empower line-of-business personnel as Citizen Developers, giving them the right set of technology assets to quickly, safely and cost effectively participate in application development.
Tags : 
    
FICO
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library