tools

Results 351 - 375 of 2248Sort Results By: Published Date | Title | Company Name
Published By: Carbon Black     Published Date: Apr 11, 2018
Adversaries, and cybercriminal organizations in particular, are building tools and using techniques that are becoming so difficult to detect that organizations are having a hard time knowing that intrusions are taking place. Passive techniques of watching for signs of intrusion are less and less effective. Environments are complicated, and no technology can find 100 percent of malicious activity, so humans have to “go on the hunt.” Threat hunting is the proactive technique that’s focused on the pursuit of attacks and the evidence that attackers leave behind when they’re conducting reconnaissance, attacking with malware, or exfiltrating sensitive data. Instead of just hoping that technology flags and alerts you to the suspected activity, you apply human analytical capacity and understanding about environment context to more quickly determine when unauthorized activity occurs. This process allows attacks to be discovered earlier with the goal of stopping them before intruders are able t
Tags : 
    
Carbon Black
Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s security battle is being waged on the endpoint, and traditional tools are ineffective against today’s sophisticated attackers. Every analyst firm is producing research about Next-Generation Endpoint Security (NGES), and they all reach the same conclusion: every organization needs to upgrade their endpoint security to a modern solution. Download this white paper to learn more.
Tags : 
next generation, endpoint security, nges, next generation endpoint security, security, security solutions
    
CarbonBlack
Published By: Carbonite     Published Date: Oct 05, 2017
Not long ago, the biggest concern for IT decision makers considering moving workloads to the cloud was security. That’s no longer the case. Today, the main obstacle to cloud adoption is different but familiar: the pain of migrating data. Traditional data migration causes major headaches: • Hours or days of downtime while servers replicate and stakeholders verify functionality • Data loss and migration failures due to inadequate tools and inability to test • Key internal resources diverted from strategic initiatives
Tags : 
data migration, cloud security, carbonite, data security, cloud platform, cloud adoption
    
Carbonite
Published By: Cardinal Health     Published Date: Dec 28, 2017
Data driven tools and analytics can uncover a wealth of new savings opportunities for surgery centers and surgical hospitals. And you usually don’t have to search far to uncover the savings. You can immediately tap into one source of data to find these opportunities. Every Electronic Health Record (EHR) and Practice Management System offers a set of standard reports. Stored inside are at least five ways to save. Download this whitepaper to learn about these five opportunities
Tags : 
    
Cardinal Health
Published By: CareCloud     Published Date: Jul 28, 2014
Deliver more efficient patient care with an MU-certified EHR that features patient engagement, decision support and task management tools built in. Plus, charting features like templates and order sets let you focus on your patients, not your EHR.
Tags : 
carecloud, single solution, patient engagement, order sets, templates, ehr, task management
    
CareCloud
Published By: Castelle     Published Date: Nov 01, 2006
Computer-based, network fax servers offer a high quality, low maintenance enterprise fax solution, well-suited for organizations involved in fax-intensive industries. From first-rate administration and development tools to comprehensive integration with existing network resources, fax servers can accelerate document processing and turnaround time while reducing communication costs.
Tags : 
ip faxing, faxing, enterprise faxing, ip networks, document management, communications convergence, network management, messaging, castelle
    
Castelle
Published By: Castlight Health     Published Date: Aug 02, 2016
"In this eBook from Castlight Health and Jellyvision, you will learn: • How to influence employee behavior through careful and personalized messaging, curated content, creative incentives, and more. • What the top U.S. organizations are doing to boost benefits engagement and guide employees along the path of health care consumerism. • How to put your organization’s technology to work toward your communication goals to meet employees on their level."
Tags : 
castlight health, human resources, benefits, jellyvision
    
Castlight Health
Published By: Castlight Health     Published Date: Aug 02, 2016
"In this eBook from Castlight Health and Jellyvision, you will learn: • How to influence employee behavior through careful and personalized messaging, curated content, creative incentives, and more. • What the top U.S. organizations are doing to boost benefits engagement and guide employees along the path of health care consumerism. • How to put your organization’s technology to work toward your communication goals to meet employees on their level."
Tags : 
    
Castlight Health
Published By: Castlight Health     Published Date: Feb 14, 2017
Wish you could get more employees to use their benefits? (And use them wisely?) The Ultimate HR Guide to Promoting Benefits Programs, Tools, and Resources can help you get started. This handy eBook from Castlight Health and Jellyvision explains how to 1) avoid sounding like an insurance robot, 2) find incentives that work (and that don’t bust the budget) and 3) promote your benefit programs — everywhere.
Tags : 
    
Castlight Health
Published By: Catalyst SF     Published Date: May 05, 2008
This white paper is designed to provide the marketing generalist with the basics of the gaming industry and how to leverage game marketing tools to improve marketing effectiveness. It is not designed for a gaming expert but rather for the person who is curious about the space, believes that game marketing may have value for their brand, but is not well versed in the opportunities available or the dynamics of the industry.
Tags : 
game, gaming, video game, video gamings, catalyst, catalyst sf, game marketing
    
Catalyst SF
Published By: CCMI     Published Date: Sep 19, 2012
In this whitepaper, you'll discover the five essential elements to consider when evaluating tools for telecom management.
Tags : 
information technology, telecommunications, telecom, telecom management
    
CCMI
Published By: CDW     Published Date: Nov 12, 2012
This white paper will explain DCIM as well as provide technology advice on teh tools and practices for its implementation and use, and how to take advantage of DCIM to improve energy efficiency and effectiveness in the data center.
Tags : 
data center, infrastructure
    
CDW
Published By: CDW     Published Date: Jun 18, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program.
Tags : 
cdw, byod, bring your own device, mobile computing, smartphones, tablets, wireless
    
CDW
Published By: CDW     Published Date: Jul 11, 2013
New platforms and business-user tools are helping to defray the consequences of a less than robust economy.
Tags : 
cdw, business intelligence, internal organizational performance, external data
    
CDW
Published By: CDW     Published Date: Jul 18, 2013
Managing essential enterprise tools for greater productivity and cost savings.
Tags : 
cdw, software management, software lifecycle, software affects
    
CDW
Published By: CDW     Published Date: Jul 18, 2013
Managing software may seem more challenging than ever, but discipline and good tools can ease the burden.
Tags : 
cdw, software management, cloud, cloud provider, software organization
    
CDW
Published By: CDW     Published Date: Jul 30, 2013
Social tools can motivate location-independent collaboration and help staff engage in anyone-to-anyone communications.
Tags : 
cdw, unified communication, social media, social tools, social media collaboration
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data, storage encryption, encryption prevention, mobile policy
    
CDW
Published By: CDW     Published Date: Feb 24, 2015
Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.
Tags : 
software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
IT departments must contend with an array of devices, operating systems and cellular carriers as well as new security threats. Even if IT departments can get a handle on the complex mobility landscape, the technology is so fluid that the picture is constantly changing. That means the IT staff has to devote time to learning about, procuring, deploying and supporting an array of devices. Busy IT departments now have another option for addressing these challenges: a monthly subscription package that provides a customizable web-based portal to automate mobile device procurement, expense management and support.
Tags : 
mobile, data, communication, tablet, smartphone, device, enterprise, tools, efficiency
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Mobile devices are ubiquitous. The wide variety of functions they provide on the go — everything from making phone calls to checking email to literally millions of applications — has created widespread demand around the globe for this technology. With the right tools, an organization can extend the workplace far beyond its own physical walls. And employees can be active at any time within the 24-hour cycle; whenever inspiration strikes, a smartphone or tablet can quickly harness their productivity.
Tags : 
mobile, help desk, phone call, productivity, smartphone, tablet, email, applications
    
CDW
Published By: CDW     Published Date: Jun 30, 2015
Learn how working with Adobe Creative Cloud for teams enhances the creative process with new tools, features, and simplified integration with existing IT infrastructure and applications.
Tags : 
adobe, application, cloud
    
CDW
Published By: CDW     Published Date: Aug 07, 2015
Take control of your virtual environment with VMware vCenter™ Operations Management™
Tags : 
converge, infrastructure, servers, networking, virtualization
    
CDW
Published By: CDW     Published Date: Oct 01, 2015
Mobile devices and software deliver the capability for workers to remain productive in new ways and places.
Tags : 
analytics software, application management, application performance, application security, cdw (cdw), cloud applications
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.