esi

Results 176 - 200 of 2926Sort Results By: Published Date | Title | Company Name
Published By: Alere Wellbeing     Published Date: Nov 09, 2011
Today, many employers have considered offering a reward or penalty to encourage employees to reduce their BMI. Yet weight bias is prevalent in the workplace even before incentives for BMI reduction are introduced. This white paper, derived from a presentation given by Dr. Rebecca Puhl and Dr. Jennifer Lovejoy, discusses weight bias, reviews well-known examples of employers who offer incentives tied to BMI, and offers practical strategies to promote a supportive worksite environment.
Tags : 
alere, human resources, employee bmi, employee incentive, reward program, whitepaper
    
Alere Wellbeing
Published By: Alere Wellbeing     Published Date: Feb 15, 2012
Dr. Ron Goetzel of Emory and Thomson Reuters discusses the rising health and productivity-related expenditures that employers face, the top 10 most costly chronic conditions, and the role obesity plays in creating these conditions.
Tags : 
obesity, workplace, economics, chronic conditions, exacerbating, success factors, weight loss, worksite health, alere, human resources
    
Alere Wellbeing
Published By: Alere Wellbeing     Published Date: Mar 30, 2012
In this webinar, Yuki Yang, Alere Wellbeing's Vice President of Client Services, and a panel of human resources professionals from clients Sherwin-Williams, Family Dollar, and WellPoint, shared lessons learned and best practices. You'll learn how to plan, launch, and implement a premium differential for your organization.
Tags : 
alere, human resources, hr management, tobacco cessation, employee program, performance management
    
Alere Wellbeing
Published By: Alere Wellbeing     Published Date: Apr 06, 2012
This white paper, based on a webinar presented by Dr. Ron Goetzel of Emory University and Thomson Reuters, discusses the cost of health and productivity-related expenditures that employers face, the role obesity plays in creating or exacerbating these conditions, and employer strategies for how to offer the best support for obese and overweight employees.
Tags : 
alere, human resources, hr management, employee, talent management, employee management
    
Alere Wellbeing
Published By: Alere Wellbeing     Published Date: Oct 16, 2012
This white paper, based on a webinar presented by Dr. Robert F. Kushner, provides an overview of DASH, compares it to other top ranked diets, and offer insights into the evidence behind their design.
Tags : 
worksite wellness, weight loss programs, corporate weight loss programs, diabetes, alere, human resources, hr management
    
Alere Wellbeing
Published By: Alere Wellbeing     Published Date: May 02, 2012
Join us for our latest Clear Insights webinar, Deconstructing DASH: How Your Workforce Would Benefit from America's #1 Rated Diet, presented by Robert F. Kushner, MD, Clinical Director of the Northwestern Comprehensive Center on Obesity and one of the 22 expert panelists who rated the Best Diets for 2012. Dr. Kushner will provide an overview of DASH, compare it to other top ranked diets, and offer insights into the evidence behind their design. Dr. Kushner will also discuss the keys to sustainable weight loss and best practices for employers to choose an effective worksite weight loss plan.
Tags : 
    
Alere Wellbeing
Published By: Alert Logic     Published Date: Sep 03, 2014
As more organizations consider a move to the cloud, security remains a top concern. Learn how Alert Logic’s suite of security solutions are designed to provide infrastructure and application security and compliance through a cloud-native model that takes advantage of the AWS business model and elastic scaling capabilities.
Tags : 
alert logic, amazon web security solutions, aws business model
    
Alert Logic
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 05, 2016
Download the full report to explore: The History of "SEM, SIM, or SIEM?" What's Wrong with SIEM? What Options Organizations Have Besides SIEM? AlienVault's Unified Security Management platform AlienVault Labs Threat Intelligence and Open Threat Exchange
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks. In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber community. However, these researches can also make hasty conclusions before all the facts are gathered, and dismiss the most important clues during investigations. This evaluation guide is designed to help you evaluate threat intelligence service providers, so that you can effectively put threat intelligence to work for you. You’ll learn: • The 3 characteristics to look for when evaluating threat intelligence vendors • The most important questions to ask when evaluating threat intelligence vendors and what to listen for
Tags : 
    
AlienVault
Published By: Allscripts     Published Date: Apr 19, 2012
Allscripts solutions, designed for physicians by physicians, deliver insights that our community of clients turns into clinical and financial outcomes. Join 180,000 physicians currently leveraging Allscripts solutions to improve outcomes. Why wait?
Tags : 
    
Allscripts
Published By: Alteryx, Inc.     Published Date: Apr 21, 2017
The traditional multiple-step, multi-tool legacy approach is a slow, time-consuming, and in most cases, a costly process that prevents organizations from making faster decisions with confidence. Data analysts today need an agile solution that empowers them to take charge of the entire analytics process. Download The Definitive Guide to Self-Service Data Analytics to: Understand why traditional analytic tools designed for data scientists are not ideal for data analysts like you Learn how self-service data analytics delivers the ease of use, speed, flexibility, and scalability you require See how Alteryx stacks up against traditional data prep and analytics tools
Tags : 
    
Alteryx, Inc.
Published By: Alteryx, Inc.     Published Date: Apr 21, 2017
Analysts struggle to incorporate new sources of data into their analysis because they rely on Microsoft Excel or other tools that were not designed for data blending. Deleting columns, parsing data, and writing complicated formulas to clean and combine data every time it changes is not an efficient way for today’s analysts to spend their time. Download The Definitive Guide to Data Blending and: Understand how analysts are empowered through data blending Learn how to automate time-consuming, manual data preparation tasks Gain deeper business insights in hours, not the weeks typical of traditional approaches
Tags : 
    
Alteryx, Inc.
Published By: Alteryx, Inc.     Published Date: Sep 06, 2017
According to Forrester, the level of analytic satisfaction within organizations is on the decline.* The traditional multiple-step, multi-tool legacy approach is a slow, time-consuming, and in most cases, a costly process that prevents organizations from making faster decisions with confidence. Data analysts today need an agile solution that empowers them to take charge of the entire analytics process. Download The Definitive Guide to Self-Service Data Analytics to: Understand why traditional analytic tools designed for data scientists are not ideal for data analysts like you Learn how self-service data analytics delivers the ease of use, speed, flexibility, and scalability you require See how Alteryx stacks up against traditional data prep and analytics tools Find out how self-service data analytics bridges the gap across skills, speed, and depth of analysis to empower you to achieve ever-greater insights without coding or depending on other departments.
Tags : 
    
Alteryx, Inc.
Published By: Amazon     Published Date: Nov 07, 2013
This planning and implementation guide discusses planning topics, architectural considerations, and configuration steps relevant before and after launching the necessary AWS services such as Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Virtual Private Cloud (Amazon VPC) to run a high-availability and site-resilient Exchange architecture.
Tags : 
amazon web services, microsoft exchange, aws cloud, cloud, web services, servers, processor, memory, storage, log replication, network traffic, resiliency, availability, configuration, deployment
    
Amazon
Published By: Amazon Web Services     Published Date: Oct 09, 2017
The following insights should be used as a resource for Chief Financial Officers (CFOs) as they lead or support their organisation through a cloud adoption journey. It is designed to provide an overview of cloud adoption drivers, costs, risks, and benefits, as well as raise important questions about staffing and technology decisions that are critical to success. It is also intended to help inform business cases, while surfacing measurements and indicators specific to cloud environments that impact the bottom line. The foundational guidance provided is a collection of insights captured and distilled from direct conversations and engagements between Amazon Web Services (AWS) and customer CFOs representing an extensive range of industries.
Tags : 
global expansion, mergers and acquisitions, business agility, real estate, tax exposure, talent acquisition, operations investment
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Jul 25, 2018
Organisationen müssen heute mit immer größeren Datenmengen zurechtkommen, die aus mehr Datenquellen stammen und mehr Datentypen enthalten als jemals zuvor. Angesichts massiver, heterogener Datenmengen stellen viele Organisationen fest, dass sie eine Datenspeicher- und Analyselösung benötigen, die höhere Geschwindigkeit und mehr Flexibilität als ältere Systeme bietet, um rechtzeitig geschäftliche Erkenntnisse liefern zu können. Ein Data Lake ist eine neue und zunehmend populäre Möglichkeit zur Speicherung und Analyse von Daten, die viele dieser Herausforderungen meistert, indem sie es einer Organisation ermöglicht, alle Daten in einem zentralen Repository zu speichern. Da Daten in ihrem ursprünglichen Format gespeichert werden können, besteht kein Bedarf, sie vor der Übernahme in ein vordefiniertes Schema zu konvertieren, wodurch Sie die Möglichkeit erhalten, all Ihre Daten, sowohl strukturiert als auch unstrukturiert, mit minimaler Vorlaufzeit zu speichern.
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Big data alone does not guarantee better business decisions. Often that data needs to be moved and transformed so Insight Platforms can discern useful business intelligence. To deliver those results faster than traditional Extract, Transform, and Load (ETL) technologies, use Matillion ETL for Amazon Redshift. This cloud- native ETL/ELT offering, built specifically for Amazon Redshift, simplifies the process of loading and transforming data and can help reduce your development time. This white paper will focus on approaches that can help you maximize your investment in Amazon Redshift. Learn how the scalable, cloud- native architecture and fast, secure integrations can benefit your organization, and discover ways this cost- effective solution is designed with cloud computing in mind. In addition, we will explore how Matillion ETL and Amazon Redshift make it possible for you to automate data transformation directly in the data warehouse to deliver analytics and business intelligence (BI
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. It’s designed for speed and ease of use — but to realize all of its potential benefits, organizations still have to configure Redshift for the demands of their particular applications. Whether you’ve been using Redshift for a while, have just implemented it, or are still evaluating it as one of many cloud-based data warehouse and business analytics technology options, your organization needs to understand how to configure it to ensure it delivers the right balance of performance, cost, and scalability for your particular usage scenarios. Since starting to work with this technolog
Tags : 
    
Amazon Web Services
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.