accounts

Results 1 - 25 of 144Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: Adobe     Published Date: Mar 03, 2017
Applying for and opening financial services accounts online is on the rise. And FSI marketers are feeling the pressure to make these new accounts higher quality. The Adobe guide, Acquisition Evolved, will give you three actionable ways to improve your ability to identify and convert high-value customers. Read the guide to learn: • The DNA of customer digital behavior • How to create unified customer segments with existing data • How to adopt onsite messaging to match offsite ads
Tags : 
fsi, adobe, customer behavior, customer segments, data
    
Adobe
Published By: Marketo     Published Date: Mar 16, 2017
This ebook highlights the benefits of ABM and illustrates how you can create and implement a lean and effective ABM initiative right now.
Tags : 
marketo, account based marketing, abm, lead generation, target accounts
    
Marketo
Published By: IBM     Published Date: Jan 09, 2017
Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users don’t retain access after they leave the organization. IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : 
ibm, security, identity governance and intelligence, identity governance, entitlements, compliance, enterprise applications, business technology
    
IBM
Published By: Site Pro PPC     Published Date: May 14, 2009
Often times hiring a professional to manage your PPC accounts actually saves you money. Check out our free whitepaper to find out why!
Tags : 
site pro, ppc, ppc management, adwords, google, yahoo, msn
    
Site Pro PPC
Published By: VMware AirWatch®     Published Date: Feb 24, 2017
The enterprise mobility management (EMM) software market continues to grow, and VMware AirWatch® accounts for 16.5 percent of the total EMM software market, the largest market share of any vendor today. IDC calls AirWatch a “top-tier vendor” with a “phenomenal growth rate,” increasing market share from 11.4 percent in 2014 to 16.5 percent in 2015.
Tags : 
    
VMware AirWatch®
Published By: Rackspace     Published Date: Feb 18, 2016
AN OVERVIEW OF THE ACCOUNT MANAGEMENT APPROACH
Tags : 
rackspace, data security, aws account, cloud, data, crm & customer care, data center
    
Rackspace
Published By: QTS     Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
Tags : 
healthcare, cyber security, data security, security
    
QTS
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell™ One Identity Privileged Password Manager and Privileged Session Manager from Dell Software, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, privileged accounts, priviliged passwords, civilian agencies, dell, dell privileged session manager, dell security
    
Dell Security
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell One Identity Privileged Password Manager and Privileged Session Manager, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, dell, dell privileged session manager, privileged passwords, two-factor authentication
    
Dell Security
Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing, it management, business technology, infrastructure management
    
Digital Realty
Published By: Canon Business Process Services     Published Date: Nov 08, 2013
Act now to gain important insight on the three key drivers for best-in-class Accounts Payable departments
Tags : 
blitzmedia, ap department, cycle times, high volumes, high-performance ap, transform accounts payable, market competition, accounts payable function
    
Canon Business Process Services
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: Socialbakers     Published Date: Mar 27, 2015
Social has the power to help your clients achieve larger marketing and business goals. But only 5% of brands use social to it’s fullest potential - do your clients and prospects? In this study we discuss social trends agency reps just have to know to stay ahead and ways you can leverage social to pitch prospects and preserve accounts.
Tags : 
the key agency success, social trends, social, social media, agencies, importance and content, social media marketing trends, social data
    
Socialbakers
Published By: Puppet     Published Date: Jul 13, 2016
If you’re new to Puppet on Windows, one of the first things you’ll want to do is start managing users and groups. In this webinar, we’ll demonstrate how to manage both local groups and Active Directory membership. The demo will include: - Managing administrator accounts - Managing local groups - Setting up a domain controller - Managing Active Directory membership Puppet can do a lot, but we always recommend starting small and building on your success. Managing users and groups is a great way to get started. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: UNIT4 CODA     Published Date: Jul 13, 2011
IKEA uses one common finance system globally making accounting quicker and easier. Their standard Chart of Accounts updates information in real time from IKEA's operational systems, so each store has on-demand access to real-time performance data.
Tags : 
unit4 coda, coda financials, financial software, best-of-class, ikea, chart of accounts, system consolidation, capital
    
UNIT4 CODA
Published By: ThingWorx     Published Date: Dec 03, 2015
By all accounts, the Internet of Things (IoT) is a vast, fast-developing opportunity for the enterprise and everyone connected to the enterprise. This IoT market analysis roundup by Postscapes shows the wide range of numbers that represent the IoT market.
Tags : 
thingworx, iot developer, enterprise, postscapes, software development, knowledge management, enterprise applications
    
ThingWorx
Published By: Availity     Published Date: Aug 08, 2013
Carolinas HealthCare System was growing, and as claim volumes mounted, claim error rates doubled. Find out how they recovered $8 million, brought claim edit backlog to zero, and reduced claim edits by 97 percent.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield
    
Availity
Published By: Availity     Published Date: Aug 08, 2013
Adventist Health System was troubled by inconsistent billing practices and disparate systems across seven central billing offices. Find out how they reduced time-to-payment by 17 percent -- bringing days in accounts receivable to an all-time low -- by standardizing processes and improving workflow with RealMed (now known as Availity Revenue Cycle Management).
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield
    
Availity
Published By: Availity     Published Date: Aug 08, 2013
Asheville Anesthesia Associates faced a growing accounts receivable file and a payment collection process that was too slow. Learn how they used RealMed (now known as Availity Revenue Cycle Management) to reduce time-to-payment by 75 percent, and reduce their average days in A/R by 62.5 percent.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield
    
Availity
Published By: Availity     Published Date: Aug 08, 2013
American Health Network faced one of the most vexing problems in health care: Claim denials. Learn how this physician-owned practice realized an ROI of 200 percent and recovered $1.4 million.
Tags : 
accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield
    
Availity
Published By: Entrust Datacard     Published Date: Dec 08, 2015
This case study illustrates how this government agency that employs over 100,000 people and delivers more than $140 billion in public services annually was able to replace a dated system and enable remote access to securely authenticate users logging into internal corporate websites and email accounts.
Tags : 
security, security application, pki, authentication, internet security, security access
    
Entrust Datacard
Published By: Epicor     Published Date: Apr 04, 2016
To succeed in today’s challenging climate, distributors must keep pace with change, manage the complexities of growth, and keep their current accounts happy while attracting new customers. Download this white paper to learn how you can smoothly and efficiently grow a modern, integrated distribution business that customers will love. You’ll discover the five goals you can pursue to ensure your company’s secure growth: • Attract and sell to eCommerce shoppers • Convert one-time shoppers into business accounts • Become the preferred supplier in your field • Optimize for business efficiency • Defend your current accounts
Tags : 
epicor, distribution, business efficiency, ecommerce, enterprise applications, business technology
    
Epicor
Published By: SAP     Published Date: May 05, 2016
Leading experts share insights in new e-book from Accounts Payable News
Tags : 
sap, ariba, finance, purchase, pay, accounts payable, enterprise applications, business technology
    
SAP
Published By: SAP Ariba     Published Date: May 05, 2016
Leading experts share insights in new e-book from Accounts Payable News
Tags : 
sap, ariba, finance, purchase, pay, accounts payable, enterprise applications, business technology
    
SAP Ariba
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.