RecruitingBlogscom

Follow Us:

 

groups

Results 26 - 50 of 171Sort Results By: Published Date | Title | Company Name
Published By: CEB     Published Date: Nov 08, 2013
How is your company managing risk? Download the whitepaper to learn how cross-functional groups can work together to uncover broader enterprise-wide risks that might go unforeseen.
Tags : 
risk, compliance, audit, risk management, cyber security, fraud
    
CEB
Published By: LifeLock     Published Date: Mar 02, 2015
Every interaction, every communication, every touch point creates a digital breadcrumb — a piece of data that can put people at greater risk of identity theft. This paper from Forrester Research compares various segments and demographics to understand which groups are at the greatest risk of identity theft.
Tags : 
    
LifeLock
Published By: Okta     Published Date: May 11, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
    
Okta
Published By: LifeLock     Published Date: May 10, 2016
Affinity groups, human resources organizations, and customer-facing companies search regularly for new ways to engage their targets. But how does that human resources organization, affinity group, or customer-facing company settle on that perfect “something extra”? Download now and find out how an out of the box idea can help maintain customer loyalty and protect your brand.
Tags : 
    
LifeLock
Published By: Progress     Published Date: Mar 06, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
digital marketing, operations, big data, analytics, web content management, content management systems, it management, data management
    
Progress
Published By: Progress     Published Date: Oct 09, 2017
The Digital Marketing Maturity Guide helps organizations determine the level of sophistication within their digital marketing operations. Dimensional Research to conducted a global survey of 700 marketing professionals gauging the level of digital marketing maturity across various verticals and company sizes. Use these findings to benchmark your organization against other groups.
Tags : 
    
Progress
Published By: Bluecore     Published Date: Mar 04, 2019
Historically, this diversity in both product assortment and customers presented unique challenges for Discount School Supply when it came to matching unique groups of customers to the products that fit their needs. Recognizing the importance of overcoming this challenge, Peter Walter, Director of eCommerce Marketing at Discount School Supply, began the search for a solution. That search led him directly to Bluecore.
Tags : 
    
Bluecore
Published By: athenahealth     Published Date: Sep 05, 2013
Healthcare mergers and acquisitions and medical group growth have been strong industry trends for years. One reason is the desire for critical mass to gain leverage with payers as reimbursement declines and costs increase. Healthcare mergers and acquisitions may offer benefits for many medical groups; it is not without its challenges. Read this whitepaper to learn how to successfully manage growth of your medical group.
Tags : 
group practice growth, strategies for success, healthcare mergers, medical group growth, medical group
    
athenahealth
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: VMware     Published Date: Jun 24, 2019
Management is demanding more efficiency and cost optimization from internal IT groups. Independent research data shows VMware’s HCI offering provides better economics than other solutions. Leveraging current IT skills, infrastructure and operational processes creates a foundation for both Capex and Opex savings that will continue for years to come, with increased operational simplicity that will allow IT to better respond to business demands.
Tags : 
    
VMware
Published By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : 
physician, revenue cycle, technology, physician compensation, billing, reimbursement
    
Allscripts
Published By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: PwC     Published Date: Jun 13, 2019
A CEO scans the competitive landscape, and decides it’s time to implement new strategies or to examine internal factors that are limiting growth. With buy-in from senior leadership, the company makes a significant investment in a months-long process designed to yield actionable insights. A few areas may be singled out for a deep-dive examination of how work is performed and where pain points exist. After interviewing employees at various levels, creating detailed documentation, and making recommendations, the company is ready to pilot changes, measure results, and roll out strategies to larger groups of stakeholders.
Tags : 
    
PwC
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
    
Juniper Networks
Published By: Oracle     Published Date: Jan 28, 2019
Databases tend to hold an organization’s most important information and power the most crucial applications. It only makes sense, then, to run them on a system that’s engineered specifically to optimize database infrastructure. Yet some companies continue to run their databases on do-it-yourself (DIY) infrastructure, using separate server, software, network, and storage systems. It’s a setup that increases risk, cost, complexity, and time spent deploying and managing the systems, given that it typically involves at least three different IT groups.
Tags : 
    
Oracle
Published By: CA WA 2     Published Date: Oct 01, 2008
Featuring an expert from Enterprise Management Associates, this webcast discusses some tactical steps towards automation of various IT processes, showing how even in processes with interdependent tasks, IT Process Automation can start IT groups down the path of reducing complexity and error rates, two of the leading drivers of cost and chaos.
Tags : 
ca wa, ca wa 2, process automation, it process, bpa, business process automation, it management, webcast
    
CA WA 2
Published By: Nutanix, Inc.     Published Date: May 07, 2013
This report defines storage-centric virtualized infrastructure, its opportunity and use cases, and the emerging vendor landscape that IT infrastructure and operations groups should evaluate as they purse the software-defined data center.
Tags : 
converged infrastrucutres, storage, virtualization, server, storage-centric, lun, modular expansion
    
Nutanix, Inc.
Published By: CareCloud     Published Date: Sep 09, 2014
In an increasingly complex business environment, U.S. physicians are banding together into mega groups that gain leverage with payers without sacrificing independence. Innovative technology platforms are playing a major role in making it happen. One leading mega-group shares its story.
Tags : 
carecloud, mega group, complex business environments, us physicians, innovative technology platforms, information technology, practice management
    
CareCloud
Published By: CEB     Published Date: Dec 03, 2014
As deal complexity has risen, so too has customers' risk aversion and the number of stakeholders dedicated to a given purchase. The best companies build consensus among diverse groups by tapping into the right values and fostering an environment of collective learning.
Tags : 
b2b marketing insights, b2b sales insights, consensus marketing, b2b branding, b-to-b decision-makers, leading marketing and sales teams, sales executives, sales leaders, sales
    
CEB
Published By: DrFirst     Published Date: Mar 13, 2015
Secure, efficient communication between doctors and staff is key to reliable patient care. For Groves Community Hospice, every situation involving patients requires rapid response; this poses a particular challenge, as more than 80 percent of the hospice staff work in the field. With so many doctors and staff off-site or on-call, and considering the inherent urgency of hospice care, Groves needed to streamline staff communications and enable a better way for physicians and staff to connect and discuss critical patient issues within a secure environment.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario, backline, teams, groups, text, secure, patient experience, response
    
DrFirst
Published By: DrFirst     Published Date: Mar 13, 2015
Long-term care facilities are highly regulated institutions that are often reluctant to implement new health technology. Cedar Creek Nursing Center chose Akario Backline® secure chat to help improve care transition processes by minimizing phone calls and faxes.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario, backline, teams, groups, text, secure, patient experience, response, message, regulation, staff
    
DrFirst
Published By: athenahealth     Published Date: Jun 08, 2015
We convened top academic medical center leaders for our AMC Advisory Roundtable in October of 2013. We also conduct regular discussions with a wide array of health care executives, including leaders of health systems, medical groups, insurance companies, and academic institutions. This whitepaper shares some of the key themes that have emerged from those meetings.
Tags : 
academic medical center, clinical activities, research activities, education, practice management
    
athenahealth
Published By: Okta     Published Date: Jul 25, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, business technology
    
Okta
Published By: IBM     Published Date: Mar 29, 2017
To learn more about how SaaS is helping companies gain competitive advantage as opposed to simply reducing costs, we segmented survey respondents into three groups: • Pacesetters, who have the highest level of SaaS adoption and are gaining competitive advantage through their broad efforts • Challengers, who have adopted SaaS more narrowly but are gaining competitive advantage through the SaaS deployments they do have • Chasers, who have been slower to adopt SaaS and gain competitive advantage through its use Download now to learn more!
Tags : 
ibm, software, competitive advantage, cloud, saas, pacesetters, chasers
    
IBM
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top