reserve

Results 51 - 71 of 71Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Mobile applications have swept across geographic boundaries, cultures, and enterprises faster than any previous technology innovation. Consumers around the world use them to find their way when they travel by car and verify flight details when they travel by air. They check bank balances and sports scores, reserve theater tickets and dining reservations, shop online, pay bills, download entertainment, and participate in dozens of other everyday activities—using convenient portable devices like smart phones and tablets. The demand for this kind of convenience has spilled over into the world of work as well, and employees today expect to use their mobile devices to check email, participate in meetings, access files—even use enterprise applications, like ERP and CRM, that drive business processes.
Tags : 
mobile application, mobile convenience, business opportunities, travel
    
HP - Enterprise
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Oracle Social Cloud     Published Date: May 02, 2014
The Olympics provided clear examples of how media companies and brands can magnify their marketing efforts using social media. These strategies and tactics are not just reserved for events of this magnitude and can be applied to any major campaign.
Tags : 
oracle, srm, social marketing, tv social marketing, broadcast network social marketing
    
Oracle Social Cloud
Published By: Fiserv     Published Date: Oct 27, 2017
With the recent Financial Accounting Standards Board vote to proceed and the final Accounting Standards Update now published, the Current Expected Credit Loss (CECL) standards remain top of mind for the C-suite in financial institutions. Even though the official adoption deadline has been pushed back to after December 2019, financial institutions should take actions today to help prepare for the new rules. Data is a great place to start.
Tags : 
cecl compliance, cecl consulting, allowance for loan loss calculator, fasb, cecl, current expected credit loss, alco, reserve, alll, allowance for loan and lease loss, loan segmentation, loan pooling credit loss trends, loan reserve
    
Fiserv
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley, hipaa, hitech, ssae
    
McAfee
Published By: AWS     Published Date: Dec 19, 2018
Migrations to the cloud sometimes face difficulties in transitioning apps, operational inconsistencies, and incongruent networks. VMware Cloud on AWS is an on-demand hybrid cloud service designed to preserve existing investments and legacy applications, while reaping the rewards of cloud scalability and flexibility. But what are the right use cases for VMware Cloud on AWS, and how do you best approach this new solution? Download our webinar to find answers to both questions, and to see specific use cases like migration, disaster recovery, and M&A integration. Download our webinar to learn How to prepare and validate your environment for integration The right circumstances for and expected benefits of deploying VMware Cloud on AWS The value of deploying a right-sized VMware Cloud on AWS environment based on your application needs
Tags : 
    
AWS
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
State University of New York Upstate Medical University faces the same challenges as many other hospital organizations—increased pressure to improve efficiency and preserve capital. Read this case study to learn how SUNY Upstate increases efficiency and reduces costs with STANLEY Healthcare’s AeroScout® Solutions, making every second and dollar count for patient care.
Tags : 
efficiency, cost reduction, patient care, healthcare, medicine, hospital organizations, wi-fi, asset management, information technology
    
STANLEY Healthcare
Published By: SAS     Published Date: Mar 31, 2016
In every industry today, businesses feel a fierce urgency to become customer-centric. They want to know what they can do to preserve and expand existing customer relationships and attract the best new customers.
Tags : 
best practices, customer relations, business intelligence, analytics, big data, data management, customer data management, marketing, sales, data warehousing
    
SAS
Published By: Progress     Published Date: Mar 26, 2018
Digital transformation has changed the face of business across the globe. New digital technologies— specifically, mobile devices—are opening new avenues for companies to engage their prospects and manage their operations with greater effectiveness and efficiency. However, in the healthcare space, the response to these technological innovations has been reserved. While it’s undeniable that digital transformation could bring great change to the healthcare space just as it has in other industries, obstacles like regulatory compliance and rigid systems of record discourage the adoption of new tools and technology. This has led to frustration from all sides of the healthcare ecosystem. Many people are accustomed to using intuitive digital applications in their everyday lives, so when healthcare applications deliver archaic user experiences, everyone is left wanting more. Patients and members want applications that enable them to manage their health more easily. Providers want to provide new
Tags : 
    
Progress
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Fiserv     Published Date: Oct 27, 2017
" The Impact of CECL and Financial Institution Readiness When it comes to CECL compliance, top financial consultants agree that extensive amounts of historical data, including different lengths of portfolio histories, will be needed. In addition, this research reveals that a majority of financial institutions do not understand how their risk management methodology needs to change. Nor do they comprehend the impacts of the changes that will need to be made to calculate Allowance for Loan and Lease Losses (ALLL). This represents a significant opportunity for top-tier consultancies to provide valuable thought leadership and guidance now, before financial institutions find themselves scrambling to meet the new standard. Learn more in our survey results."
Tags : 
cecl compliance, cecl consulting, allowance for loan loss calculator, fasb, cecl, current expected credit loss, alco, reserve, alll, allowance for loan and lease loss, loan segmentation, loan pooling credit loss trends, loan reserve
    
Fiserv
Published By: Extensis     Published Date: Mar 07, 2008
The Photography Department at The National Gallery of London wanted to give other Gallery departments better visibility into its archived library of images and reduce the administrative workload for its photographers. Read how Portfolio Server and Portfolio SQL-Connect painted the perfect solution to this challenge.
Tags : 
extensis, portfolio server, sql, asa, dam, digital asset management, business intelligence
    
Extensis
Published By: Motorola Solutions     Published Date: Jul 02, 2018
We all want our nation’s schools to be safe, secure learning environments where students can realize their full potential. This requires reliable, continuous communication among school personnel, both onsite and district-wide, plus the ability to instantly connect with first responders in an emergency. This seamless communication must be delivered over any network, from any location, using any device. Team Communications from Motorola Solutions provides this seamless integration, helping schools preserve the all-important safety of their students. Team Communications empowers educational institutions to transform how they communicate, enabling individuals to share real-time information to make schools safer and staff more productive. Schools across the U.S. use Team Communications from Motorola Solutions to deliver unified voice and data to administrators, teachers, maintenance, security, coaches, and other personnel, improving decision making, increasing visibility into school activit
Tags : 
    
Motorola Solutions
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Amazon EC2 Reserved Instances can appear complicated, but finding a solution that best suits your company doesn't mean becoming an expert yourself; you just need to know how to approach Reserved Instances and where they can make the biggest impact. This free guide delivers a collection of proven best practices to help you successfully manage Amazon EC2 Reserved Instances. The benefits include: -A breakdown of reservation types and offerings, including Convertible Reserved Instances -How to calculate the payback period -How to modify and exchange existing reservations to match cloud usage over time -How to maximize savings with automated RI management and optimization
Tags : 
cloud management, amazon web services, multicloud management, amazon ec2
    
CloudHealth by VMware
Published By: ABB     Published Date: Feb 27, 2019
European energy markets are undergoing many changes in order to adapt themselves to dynamically-evolving market conditions. Renewable generation capacity continues to rise in the Western European market, bringing more intermittency to the power system. Meanwhile, conventional power plants, fuelled by coal, lignite or uranium, are being decommissioned more often among western countries, affecting the security of supply and reserve margin levels. These changes need to be introduced and maintained by system operators, and each country has a slightly different approach to the challenges. To find out more, download this whitepaper today!
Tags : 
    
ABB
Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan, firewall, virtual private network, vpn, security, support costs, isdn, wifi, slas, tco, it management
    
WebEx
Published By: AWS     Published Date: Nov 12, 2018
VMware Cloud on AWS makes it easier for your organization to run VMware workloads on AWS, giving you a simple path to hybrid cloud deployment. Adopting this service will allow your organization to preserve your investments in existing applications, licenses, and processes, while taking advantage of the advanced capabilities that AWS has to offer. With just a few clicks, you will be able to rapidly provision and scale AWS resources that are operationally consistent with vSphere. VMware Cloud on AWS delivers workload portability powered by the VMware technology in your on-premises data center, combined with the cloud-scale resources and global footprint of AWS. It is truly a next-generation solution that gives you the best of both worlds.
Tags : 
    
AWS
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: Computhink     Published Date: Dec 10, 2007
The job of a Records Management Office is to take all paper documents that need to be preserved, from all county offices, and implement a strategy to preserve them. When the law changed on January 1, 2001 to allow digitally scanned copies to be legal documents (The Illinois Electronic Records Act), the challenge to find a preservation system that would be both efficient and cost effective increased dramatically.
Tags : 
document management, records management, information, electronic document management, computhink, viewwise, viewise, government, records office, information management
    
Computhink
Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept