ap study

Results 276 - 300 of 374Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance
Published By: Diskeeper Corporation     Published Date: Jun 07, 2007
This paper presents the results of a Diskeeper Corporation study that examines the effects of disk fragmentation on virus scan time to verify and measure the magnitude of virus scanning speed improvement.
Tags : 
diskeeper, defrag, defragmentation, cleanup, disk clean, disk sweeper, maintenance, diskkeeper
    
Diskeeper Corporation
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Jordan & Skala Engineers is a growing company with 5 offices.  It needed a scalable solution to optimize their network and their resources as more and more work was distributed across sites. Using GlobalSCAPE WAFS files mirror instantly in real time using byte-level differencing.  So as soon as a file is saved or closed, the file deltas appear in every other location on the network. Users are never waiting for files to upload, download, or open across a network.
Tags : 
wide area networks, wan, wans, wafs, wafs, file transfer, file transmission, globalscape
    
GlobalSCAPE
Published By: Lotame     Published Date: Jun 01, 2010
Lotame's whitepaper presents the first ever study of brand equity measures (including brand awareness, favorability, ad recall, and purchase intent, and viewership intent) and their mathematical relationships to clicks, interaction rates, and time spent.
Tags : 
lotame, metrics, branding, brand awareness, clicks, interaction rates, clicks, romi
    
Lotame
Published By: IBM     Published Date: Apr 23, 2013
The current business environment is still characterized by skittishness, tenuous demand and sporadic growth. It’s no surprise then, that 60% of CFOs plan to make major changes to critical finance practices and processes, according to the 2010 IBM Global CFO Study. In fact, 70% of CFOs claim to be taking a more prominent role in enterprise decision making beyond the traditional role of finance. Yet many CFOs admit to significant gaps in their ability to deliver on this expanded agenda, particularly in their ability to measure and monitor business performance. The IBM study found that those companies that invest in capabilities to expand their business insight are better able to anticipate and react to the unpredictable external forces affecting the economy.
Tags : 
dynamic planning, forecasting, financial forecasting, finance, cfo, enterprise
    
IBM
Published By: Esker     Published Date: Jun 29, 2015
So why are so many organizations’ accounts payable (AP) departments still using antiquated invoicing tools? A new IOFM study aimed to find out exactly that.
Tags : 
measuring, reporting, technology adoption, accounts payable, asset management, futures, options, investment software
    
Esker
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs
    
Symantec
Published By: Fujitsu Healthcare     Published Date: Nov 04, 2013
In 2010, Queens Pediatrics began evaluating Electronic Health Record (EHR) solutions to improve access to patient records. The practice’s affiliation with North Shore LIJ prompted it to evaluate solutions from Allscripts. North Shore LIJ is the largest user of Allscripts system and provides a financial subsidy to its affiliated practices that adopt the solutions. The challenge for Queens Pediatrics was the small size of its offices, which didn’t provide enough room for multiple workstations or to move mobile computer carts through the hallways. “There were only two options. The physicians either had to use a laptop or we had to have a PC in each room, and that doesn’t work well in a pediatric office,” said Janette Finn, the Practice Manager at Queens Pediatrics. Download this Case Study to find out the Solution to the challenges Queens Pediatrics faced.
Tags : 
electronic health record, ehr, best practices, solutions, medical mobility, case study
    
Fujitsu Healthcare
Published By: Coveo     Published Date: Nov 13, 2013
Where does a $5.5 billion technology company with 15,000 employees and a $1 billion annual R&D spend turn for a more effective way to tap existing research & engineering knowledge and avoid duplicating work? Harris Corporation turned to Coveo. read this case study to learn how Harris has improved productivity, communications and innovation.
Tags : 
advanced enterprise search, increasing productivity, knowledge assets, unified enterprise search, enterprise search solutions
    
Coveo
Published By: QTS Data Centers     Published Date: May 01, 2017
Discover the simplest and most cost-effective approach to hybrid cloud using a highly scalable, fully managed open cloud like Ubuntu OpenStack. Watch this on-demand webinar to find out from our experts how Canonical’s and QTS’ proven reference architectures, deployment methodologies, and unrivaled support offer IT organizations the biggest bang for their buck plus... • Why the evolution of technology and complexity of managing your hybrid clouds increases IT costs. • How open clouds can be designed to meet your anticipated growth needs. • Build versus buy? Why private open cloud is a financially sound choice. • Why companies like yours are choosing Canonical and QTS to build, operate and fully manage their OpenStack cloud. • A customer case study detailing the economic impact of open cloud.
Tags : 
    
QTS Data Centers
Published By: IBM     Published Date: Feb 24, 2015
Mobile capture is quickly becoming an important differentiators for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is vitally important, pointing to the competitive need for improved process agility and customer service across the board. Discover the top 10 questions to ask before you make your investment in mobile capture.
Tags : 
mobile capture, ibm, process agility, customer service
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper evaluates the market’s readiness for Zero Trust concepts and technologies, based on Forrester’s own market data and a custom study of the same audience.
Tags : 
intrusion prevention system, encrypted tunnels, it security, security management, network analysis, visibility capabilities
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Uncovering the Risks of SAP Cyber Breaches by Ponemon Institute How are organizations truly managing cybersecurity risks in their SAP ecosystem? Ponemon Institute’s latest study of 607 global IT security practitioners reveals senior level perceptions about SAP, its security challenges, and the risk of data breaches and cyberattacks.
Tags : 
ibm, security, ponemon institute, technology, fraud, sap, cyber breaches
    
IBM
Published By: IBM     Published Date: Feb 23, 2017
Open Source application servers aren't "free." Download the Total Economic Impact of Migrating From Open Source Application Servers to IBM WAS Liberty, a Forrester Consulting Total Economic Impact Study commissioned by IBM to learn how much you can save by migrating away from open source. WebSphere Liberty can deliver 122% ROI, reduce infrastructure costs by $350K and improve developer productivity by 12% over open source application server alternatives.
Tags : 
ibm, cloud, middleware, ibm was liberty, open source application servers
    
IBM
Published By: Adobe     Published Date: May 25, 2017
Marketing and technology partners must collaborate as never before in order to delight and engage customers “in the moment.” Previously stove-piped functions are starting to work together to take a holistic approach to create great digital experiences at enterprise scale, but organizations see the need for more work to create relevant, integrated digital customer experiences in real time. IBM commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly, and seamlessly. The study found that while the mandate to collaborate has been heard, there is still work to be done to move to the next level and put in place technology, processes, and culture to create digital customer experience in real time.
Tags : 
    
Adobe
Published By: IBM     Published Date: May 25, 2017
Marketing and technology partners must collaborate as never before in order to delight and engage customers “in the moment.” Previously stove-piped functions are starting to work together to take a holistic approach to create great digital experiences at enterprise scale, but organizations see the need for more work to create relevant, integrated digital customer experiences in real time. IBM commissioned Forrester Consulting to discover how developers and marketers are working together to provide customers exceptional digital experiences reliably, quickly, and seamlessly. The study found that while the mandate to collaborate has been heard, there is still work to be done to move to the next level and put in place technology, processes, and culture to create digital customer experience in real time.
Tags : 
marketing, ibm, digital experience, collaboration, customer experience
    
IBM
Published By: IBM     Published Date: May 08, 2018
Our recent Ponemon Institute report reveals key findings from organizations' ability to protect their mobile and IoT apps.
Tags : 
iot application security, iot apps, security
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes. The companies represented in this study say their SAP platform has been breached an average of two times in the past 24 months.
Tags : 
cyber breach, data security, information theft, security risk, risk management
    
IBM
Published By: Seagate Technology     Published Date: Apr 14, 2015
Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.
Tags : 
surveillance, security system, virtual management software, cameras
    
Seagate Technology
Published By: VMS     Published Date: Jul 16, 2009
As a marketer you know that there is no singular silver bullet that will suddenly elevate your communications to a point where everyone runs out to buy your product. That's why it is important to understand the importance of an integrated approach for your communications strategies and learn how to monitor them. Read this study to learn how major brands address the issue and coordinate their Advertising and PR efforts.
Tags : 
advertising, marketing, vms, social media, roi, vantage
    
VMS
Published By: GoToWebinar     Published Date: Jul 08, 2011
"Like any relationship, leads need nurturing. But what if your prospect list has grown cold? Is it too late to revive it? This MarketingSherpa white paper explores how to optimize your lead nurturing campaign with five steps to boost conversions and includes a case study that reveals how one company was able to revive a cold prospect list."
Tags : 
citrix gotowebinar, lead nurturing campaign, cold prospect list, marketingsherpa, conversion boost, lead conversion, webinar marketing program
    
GoToWebinar
Published By: GoToMeeting     Published Date: Jul 08, 2011
Distributed workers - just like their on-site counterparts - need to collaborate with coworkers, partners and customers to stay productive. But in today's global business climate, frequent travel is no longer a viable option. This new SandHill Group white paper explores recent study findings to better understand the powerful advantages of SaaS technologies in addressing the challenges of a global market, virtual teams and an ever-changing business climate.
Tags : 
citrix gotomeeting, business collaboration, cloud computing, saas technologies, business climate, productivity, competitive edge, geographic reach
    
GoToMeeting
Published By: IBM     Published Date: Apr 26, 2013
This Magic Quadrant assesses the APM market. First, we will define the market and explain why it's important to treat the five functional dimensions that together constitute its technology foundation in an integrated manner and to distinguish the APM market from others that are closely related to it. Next, we will set out the qualifying criteria for inclusion in this research and then survey some general characteristics of each of the resulting quadrants. This research will then conclude with a brief study of each participating vendor's APM strengths and weaknesses.
Tags : 
gartner, magic, quadrant, application, performance, monitoring, apm, market
    
IBM
Published By: IBM     Published Date: Sep 27, 2013
As companies become more reliant on critical applications to manage business processes and to interact with their customers, the time to market for new solutions becomes a key success factor for the business. Over half of the organizations in the study cited accelerating new application development and deployment as an operational objective for deploying IBM PureSystems solutions. IBM PureSystems family is a portfolio of expert integrated systems built from the ground up to deliver an optimized hardware and software platform. Integrated systems combine compute, storage, networking, and management into factory pre-configured and pre-integrated solutions.
Tags : 
ibm, ibm pureflex system, ibm flex system, applications, application delpoyment, application integration, integration, integrated system
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library