aca

Results 126 - 150 of 248Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Aug 18, 2015
This is a guide about securing your website, online business or mail server.
Tags : 
best practics, security, vulnerabilities, ssl, tls, login credentials, mail server, online business, website, threats, coverage, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Aug 18, 2015
This is a whitepaper about the business value of extended validation.
Tags : 
extended validation, certificate, internet, browser, ssl, tls, it management, knowledge management
    
Entrust Datacard
Published By: CA Technologies     Published Date: Aug 10, 2015
No atual cenáriode negócios, variável e ultra-competitivo, acabaram os dias em que as empresas gastavam meses, ou mesmo anos, criando, testando e implementando um aplicativo, serviço ou novas ferramentas para o mercado. Os clientes, usuários de tecnologia e o mercado como um todo, são mais ágeis do que nunca, e suas exigências de uma nova funcionalidade inovadora têm crescido em consequência disso. Em outras palavras, os clientes não se contentam em esperar pelo próximo grande lançamento e não estão dispostos a lidar com falhas e deficiências quando ele chega. Neste documento você aprenderá como uma solução de Release Automation pode ajudar sua organização a simplificar e acelerar seus processos de entrega de aplicativos.
Tags : 
    
CA Technologies
Published By: Aon Hewitt     Published Date: Aug 06, 2015
Read this white paper to learn why it’s critical for employers to evaluate key differences between retiree exchanges— especially the level of support offered to retirees—when determining which model will best meet their organizational needs, as well as the needs of their retiree populations.
Tags : 
retirees, private exchange strategy, health care, ppaca, retiree exchanges
    
Aon Hewitt
Published By: Zane Benefits     Published Date: Aug 03, 2015
Learn how savvy business owners are using the ACA offer more affordable heath benefits
Tags : 
affordable care act, small businesses, affordable health benefits, aca, best health insurance decisions, health insurance providers, zane benefits
    
Zane Benefits
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2015
Download this white paper to learn more about the importance of a talent management succession strategy.
Tags : 
talent management strategy, succession, productivity, managers, c-suite, executive level, vacancies, talent pool
    
Cornerstone OnDemand
Published By: IBM     Published Date: Jul 23, 2015
Predict better academic outcomes with IBM SPSS Decision Management for Student Performance.
Tags : 
predictive analytics, performance management, student performance, spss, decision management, intervention measures, graduation rates, advanced placement courses, data analytics
    
IBM
Published By: Entrust Datacard     Published Date: Jul 21, 2015
This paper reveals how Entrust Authority Security Manager, the world's leading public key infrastructure (PKI), helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : 
entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2015
Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.
Tags : 
internet of things, authentication, security, identity, safety, technology, security technology, security infrastructure, software authentication platforms
    
Entrust Datacard
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network, networking, it management
    
CDW-Trend Micro
Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, it management, knowledge management, data management
    
Mimecast
Published By: athenahealth     Published Date: Jun 08, 2015
We convened top academic medical center leaders for our AMC Advisory Roundtable in October of 2013. We also conduct regular discussions with a wide array of health care executives, including leaders of health systems, medical groups, insurance companies, and academic institutions. This whitepaper shares some of the key themes that have emerged from those meetings.
Tags : 
academic medical center, clinical activities, research activities, education
    
athenahealth
Published By: Aerohive     Published Date: May 19, 2015
This case study reveals how Aerohive deployment has the capacity to support 10,000 devices, concurrently, on the network.
Tags : 
wi-fi solutions, network, aerohive wi-fi solutions, wlan, wireless network, connectivity, hiveap, wireless
    
Aerohive
Published By: Cisco     Published Date: May 15, 2015
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them.
Tags : 
cloud computing, erp, productivity, applications, efficiency, cisco
    
Cisco
Published By: SAS     Published Date: Apr 16, 2015
We often hear about how the massive volumes of data the US government collects hold a treasure trove of answers to our most challenging questions – be it on population health, national security, education or how to recoup losses from tax fraud. If only the government could figure out how to make use of all that information. Texas is one example of a government that is using analytics to solve complex problems. As the case studies here demonstrate, agencies and academia in the Lone Star State are putting big data and analytics to work to eliminate waste, improve productivity and, in some cases, even enhance transparency.
Tags : 
    
SAS
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate, b2b, application, browser, applications, saas, hack, web, website, sha-2, migration, implementation, ssl, business technology
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Tags : 
entrust, malware, history, threat, concern, virus, sql, stuxnet, botnets, zeus, blackhole, fraud, credentials, digital, information, business technology
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, business technology
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
entrust, ssl, certificates, security, professionals, management, lifecycle, certificate, issues, holes, verification, applications, domains, audit, scan, systems, policies, monitor, inventory, business technology
    
Entrust Datacard
Published By: Cisco     Published Date: Jan 05, 2015
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help technology managers select the right videoconferencing infrastructure or service for their environment.
Tags : 
it management, data management
    
Cisco
Published By: Polycom     Published Date: Dec 18, 2014
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help technology managers select the right videoconferencing infrastructure or service for their environment.
Tags : 
forrester, vmr, cloud-computing, scalability, interoperability, networking, it management, data management, business technology
    
Polycom
Published By: Sage     Published Date: Oct 14, 2014
The Patient Protection and Affordable Care Act (PPACA), signed into law by President Obama on March 23, 2010, and the amendments made by the Healthcare and Reconciliation Act of 2010 (together, known as the Affordable Care Act), have significant employment tax and information reporting implications. This survival guide will address the changes facing employers. You’ll find explanations of compliance issues, checklists of what your company should be doing, and a calendar of important effective dates.
Tags : 
sage, healthcare reform, ppaca, affordable care act, compliance, employment tax
    
Sage
Published By: CIC Plus     Published Date: Sep 23, 2014
Learn more about HR compliance under Section 6056 of the ACA, including: • New reporting requirements for 2015 • What those requirements mean for your business • What you can do to ensure compliance • Risks of noncompliance
Tags : 
aca, affordable healthcare act, aca compliance, obamacare, irs section 6056, hr compliance, online hr forms, onboarding, year-end benefits forms, online benefits forms, new-employee orientation, w-2, w-4, hr forms hosting
    
CIC Plus
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.