pts

Results 101 - 125 of 353Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Nov 22, 2013
Three IT transformations can help IT get its own house in order to become the proactive partner of the business. By applying these concepts, IT departments at major enterprises are changing the way they engage with their business peers.
Tags : 
servicenow, enterprise it, service automation, applications, service consolidation, standardization globalization, consumerized service experience, customer retention, managing service relationships, infrastructure, foundation or transformation, it cloud, future of it
    
ServiceNow
Published By: Elsevier Inc.     Published Date: Apr 16, 2014
InOrder by Elsevier is an intuitive, cloud-based order set solution that enables physicians, clinicians and informaticists to manage order sets in a collaborative environment. The Adaptive Terminology Platform enables localization and bi-directional integration with the EMR/CPOE.
Tags : 
actionable orders, allscripts, cerner, clinical decision support, clinical order sets, cpoe, ehr, ehr integration, emr, epic, evidence based order sets, integration, informaticist, joint commission, order entry software, order set, order sets, physician order set, physician orders, quick orders
    
Elsevier Inc.
Published By: McAfee     Published Date: Sep 15, 2014
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultaneously across multiple and rarely used protocols. Once inside, AETs reassemble to unleash malware and continue an APT attack.
Tags : 
hacker detection, advanced evasion techniques, network security, it security, security management
    
McAfee
Published By: NetSuite     Published Date: Apr 22, 2016
This report highlights these and other trends, and it also reveals what distributors are planning to do in 2016 to build revenue and cut costs, while also improving their technological capabilities as the industry adapts to a new economy and evolving workforce.
Tags : 
    
NetSuite
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Secureworks     Published Date: Oct 04, 2017
Fifty-two percent of security leaders rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems. Yet, 36 percent also say their organizations were victims of ransomware in the past year. And 57 percent say they are more likely to be a ransomware target in 2017.
Tags : 
    
Secureworks
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
One way to shift testing practices earlier in your software lifecycle is by using multi-layered visual models to specify requirements in a way where all ambiguity is inherently removed. With unambiguous and complete requirements, developers introduce less defects into their code and manual test cases, automated test scripts and required test data can be automatically generated based on the requirement, without manual intervention.
Tags : 
data manager, data requirements, test automation, service virtualization, risk manager, continuous testing, testing effort, delivery ecosystem
    
CA Technologies EMEA
Published By: Abacus Labs     Published Date: Jul 25, 2018
We’ve all been there: staring at a pile of receipts at the end of a business trip, dreading the process of filling out a report just to get your money back. Wouldn’t it be great if all your expenses automatically entered into the system and you got reimbursed the next day? At Abacus, we thought so too. Meet real time expense reporting.
Tags : 
abacus, sales, report, system
    
Abacus Labs
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Published By: Abacus Labs     Published Date: Jan 11, 2019
Artificial intelligence is no longer the stuff of science fiction. Led by advances being made in academia and Silicon Valley, computing power is growing at an unprecedented and accelerating rate. As AI becomes more prevalent in finance software, the question facing you, the finance leader, isn’t whether it will change your job, but how to prepare for its arrival. This paper is a primer designed to help you develop an AI strategy for your finance team. You’ll understand key concepts about this revolutionary technology, including how it works, why finance specifically stands to benefit, and how to apply AI in a way that returns the most value to your team.
Tags : 
    
Abacus Labs
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos
Published By: Zscaler     Published Date: May 15, 2019
Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.
Tags : 
    
Zscaler
Published By: IBM     Published Date: Jan 27, 2017
While any number of reasons can prompt a change in data warehouse solutions, there are four key facts you need to know to help you make the right choice: 1. Complexity stifles business 2. Speed is business-friendly 3. Cost reduction is crucial 4. Analytics: The key to current and future success This e-book will explore those facts and explain why they are essential when evaluating your data warehouse options.
Tags : 
    
IBM
Published By: Trend Micro     Published Date: Jul 08, 2013
Superior Detection with Trend Micro Custom Defense
Tags : 
apt, c&c, communication, apts, defense, trend micro
    
Trend Micro
Published By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : 
bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern, detection, bpm, business process management, latency, soa, smartblocks, apama, correlator, event processing technical society, epts, rfid, scada
    
Progress Software Corporation CEP
Published By: Allscripts     Published Date: Apr 19, 2012
Hear how solutions from Allscripts have helped clients achieve Meaningful Use and capture Stimulus funds. To date, more than $300 million in Stimulus funds have been received by Allscripts clients. There is still time to receive full Stimulus incentives. Why wait?
Tags : 
allscripts, healthcare, funds, stimulus funds, incentives
    
Allscripts
Published By: Allscripts     Published Date: Apr 19, 2012
Listen to a Meaningful Use Journey Webinar to learn about the Allscripts roadmap to achieving Meaningful Use Stages 1 and 2. To date, more than $300 million in Stimulus funds have been received by Allscripts clients. Have you received your Stimulus funds yet? Why wait?
Tags : 
allscripts, healthcare, webinar, stimulus funds, stimulus incentives
    
Allscripts
Published By: Allscripts     Published Date: Apr 19, 2012
Allscripts solutions, designed for physicians by physicians, deliver insights that our community of clients turns into clinical and financial outcomes. Join 180,000 physicians currently leveraging Allscripts solutions to improve outcomes. Why wait?
Tags : 
    
Allscripts
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library