accounts

Results 51 - 75 of 246Sort Results By: Published Date | Title | Company Name
Published By: Concur ENT     Published Date: May 11, 2018
Business travel accounts for the majority of your employee expenses. Travel and expenses are intrinsically linked, so why not manage them together? When you combine travel and expense, some questions are easier to answer: • Where can I find a full picture of travel and expense spend? • Are expense claims aligned to my travel policy? • Can I reclaim some VAT? To connect travel and expense management, businesses usually look for software that can manage both processes from beginning to end. This is commonly referred to as an integrated solution. The results could be cost savings, faster delivery or improved employee adoption and satisfaction
Tags : 
    
Concur ENT
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Le présent rapport fournit un schéma directeur permettant de déterminer les coûts directs, indirects et cachés du déploiement d’une telle solution au fil du temps.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: Millennia Patient Service     Published Date: May 05, 2014
Learn about 3 key points and statistics that you will need to understand and manage the impact ObamaCare and PPACA will have on the medical provider revenue cycle.
Tags : 
millennia patient services, patient receivables, patient accounts receivables, obamacare, ppaca, medical support service, medical provider revenue cycle, patient a/r, revenue cycle management, information technology
    
Millennia Patient Service
Published By: NetApp     Published Date: Dec 09, 2014
Although the cost of flash storage solutions continues to fall, on a per-gigabyte capacity basis, it is still significantly more expensive to acquire than traditional hard drives. However, when the cost per gigabyte is examined in terms of TCO, and the customer looks past the pure acquisition cost and accounts for “soft factors” such as prolonging the life of a data center, lower operating costs (for example, power and cooling), increased flexibility and scalability, or the service levels that a flash solution enables, flash solution costs become increasingly competitive with spinning media.
Tags : 
flash storage, netapp, tco, flash storage solutions, soft factors, flash solution, it management
    
NetApp
Published By: Vectra Networks     Published Date: Aug 03, 2015
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Tags : 
malware, data, malware, banking, malware sandbox, authentication, two-factor authentication, business intelligence, data quality
    
Vectra Networks
Published By: FICO     Published Date: Jun 07, 2016
As IT departments’ lists of backlogged application development projects keep growing, so does the speed of new development requests from line-of-business personnel. For many IT departments, the speed of business — the speed of requests for additional developments — can’t be met under current practices. This inability to keep pace with critical development requests, supporting timely strategy modifications, seriously impacts an enterprise’s profitability. The solution FICO advocates — one that accounts for budget constraints, legacy operational realities and quality assurance — is to empower line-of-business personnel as Citizen Developers, giving them the right set of technology assets to quickly, safely and cost effectively participate in application development.
Tags : 
    
FICO
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Fiserv     Published Date: Nov 06, 2017
The right kind of insurtech can modernize the financial close, freeing up time, money and resources so businesses can focus on strategic efforts and specific customer needs. Reconciliation of transactions and accounts across large organizations is one area where automation and digitization can have a major impact on the balance sheet. In the article, Not Ready for Insurtech? Here’s Proven Automation You Can Use Now!, learn how one of the top ten major insurance carriers has used digitization for the past decade to streamline their reconciliation efforts - saving time and money - while increasing their bottom line.
Tags : 
insurtech, financial automation, financial close, insurance reconciliation, insurance bottom line, insurance automation, digitization, digitalization
    
Fiserv
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
Published By: SmartLink Health     Published Date: Oct 25, 2018
EHR integration has never been a greater conundrum for clinical labs. On the one hand, it’s simply unaffordable. On the other, it’s quickly becoming a business requirement that will determine your lab’s long-term viability in an increasingly competitive market. Download this white paper and you’ll discover a new, affordable, and innovative front-end integration approach that can: • Reduce incomplete lab orders and associated labor costs • Improve customer satisfaction and “stickiness” in your accounts • Grow both new and existing customer revenue
Tags : 
    
SmartLink Health
Published By: IBM     Published Date: Jul 08, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance, knowledge management, data management, data center
    
IBM
Published By: CareCloud     Published Date: Apr 27, 2015
Learn 6 best practices to make the most of your medical accounts receivables. Get CareCloud’s new white paper: “6 Key Strategies for Medical A/R Management” to ensure you’re getting paid what you deserve.
Tags : 
carecloud, a/r management, healthcare reimbursement system, affordable care act, medical billing process, profitability, us economy
    
CareCloud
Published By: NetApp     Published Date: Sep 11, 2014
Although the cost of flash storage solutions continues to fall, on a per-gigabyte capacity basis, it is still significantly more expensive to acquire than traditional hard drives. However, when the cost per gigabyte is examined in terms of TCO, and the customer looks past the pure acquisition cost and accounts for “soft factors” such as prolonging the life of a data center, lower operating costs (for example, power and cooling), increased flexibility and scalability, or the service levels that a flash solution enables, flash solution costs become increasingly competitive with spinning media.
Tags : 
flash technologies, total cost of ownership, flash storage, data center, increased flexibility
    
NetApp
Published By: Fiserv     Published Date: Mar 02, 2018
According to the report, Benchmarking the Accounting Function 2015, only 56% of companies currently use automation to reconcile accounts. While many finance leaders want to change the process of reconciliation, the task can seem overwhelming. However, developing a plan does not have to be complicated or time-consuming – and the benefits far outweigh the risks. A smooth, stress-free financial close adds qualitative value to the company by freeing employees to focus on strategic initiatives and ways to grow business. A CFO’s Guide to Transforming the Financial Close shares how to build a center of excellence to streamline reconciliation so you can align objectives to overall business goals. Leading-edge automation tools can stop the madness of shuffling papers, sorting emails and searching spreadsheets, turning the reconciliation process from a cost center to a value-add for the company.
Tags : 
automating financial close, streamlining reconciliation, data integrity, single version of truth, reconciliation process
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations. In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: • Global payment initiatives • Open Banking standards • Artificial intelligence and machine learning • Consumer demand for real-time fraud prevention and detection
Tags : 
cyber crime, financial crime, financial security, customer experience, financial crime risk management, global payments, open banking standards, artificial intelligence, machine learning, fraud prevention, fraud detection
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
Does your company still rely on a time-consuming and error-prone manual approach to reconciliation? Does it consolidate multiple data sources from disparate systems to close the books? Find out how one of the top 10 multi-line insurers automated the reconciliation process for over 3,000 accounts, resulting in fewer errors and quicker close times. Plus, the insurer now has visibility into all reconciliation items rather than reviewing 300 different Excel reconciliation documents!
Tags : 
manual reconciliation, automated reconciliation for insurers, automated reconciliation, automated insurance reconciliation, automated reconciliation system, non-compliance, data reconciliation
    
Fiserv
Published By: Fiserv     Published Date: Mar 13, 2018
The right kind of insurtech can modernize the financial close, freeing up time, money and resources so businesses can focus on strategic efforts and specific customer needs. Reconciliation of transactions and accounts across large organizations is one area where automation and digitization can have a major impact on the balance sheet. In the article, Not Ready for Insurtech? Here’s Proven Automation You Can Use Now!, learn how one of the top ten major insurance carriers has used digitization for the past decade to streamline their reconciliation efforts - saving time and money - while increasing their bottom line.
Tags : 
insurtech, financial automation, financial close, insurance reconciliation, insurance bottom line, insurance automation, digitization, digitalization
    
Fiserv
Published By: Vindicia     Published Date: Oct 04, 2017
If your company provides subscription based online services or softwareas-a-service (SaaS), your business success depends upon improving two key metrics: customer acquisition and customer retention. At Vindicia, our in-depth experience in handling more than 240 million accounts that have transacted over $21 billion for our clients enables us to provide unique insights into how well companies performs relative to industry standards. Such business insights can help your company improve your online services business, potentially leading to millions in incremental revenue through increased acquisition and retention numbers.
Tags : 
    
Vindicia
Published By: SpyCloud     Published Date: Mar 30, 2018
Because of widespread password reuse, Account Takeover (ATO) attacks have become an extremely lucrative business for cybercriminals. Organized crime rings are performing ATO attacks at a massive scale by leveraging botnet-infected armies to attempt credential-stuffing attacks against various web and mobile applications. Cyber criminals exploit compromised accounts for financial gain by pilfering financial or personally identifiable information (PII) directly or by selling access to these accounts on underground markets. Download our report to understand: The Underground economy driving these attacks The tools criminals are using to automate ATO Remediation Strategies to prevent ATO in your organization
Tags : 
    
SpyCloud
Published By: Oracle OMC     Published Date: Nov 30, 2017
Your marketing budget and sales staff provide a finite set of parameters around how your business creates revenue. You need a way to get the most out of them while delivering on the brand promise and experience your customers expect. Enter Account-Based Marketing (ABM), the truest way to align your sales organization and marketing operations to drive holistic account interactions that yield higher returns. It’s the next generation of B2B marketing automation. According to Demandbase, “ABM is the process of identifying the companies most likely to buy, and then marketing to them. B2B companies understandably want to focus their marketing dollars on accounts with the highest potential to deliver sustainable revenue.”
Tags : 
    
Oracle OMC
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
    
uberVU via HootSuite
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept