aco

Results 26 - 50 of 144Sort Results By: Published Date | Title | Company Name
Published By: Veracode     Published Date: Jun 26, 2019
As DevSecOps changes the way software is created and distributed, it is also changing the roles and responsibilities of the development and security teams.
Tags : 
    
Veracode
Published By: Veracode     Published Date: Jun 26, 2019
DevSecOps is the future of Software Development
Tags : 
    
Veracode
Published By: Veracode     Published Date: Jul 01, 2019
The demand on software development teams is greater than ever. With the cultural move towards DevOps, the implementation of CI/CD systems, and the desire to operate in an agile manner, developers are being asked to push out more software - and in shorter periods of time - than ever before. In turn, developers are increasingly relying on open source libraries, or pre-built pieces of code available online, which allow them to add functionality to their code without having to build it from scratch. As a result, software today is rarely completely made of first-party code and is more often "assembled" from other sources.
Tags : 
    
Veracode
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
This webinar, hosted by Palo Alto Networks, focuses on deployment of 'Zero Trust Network Segmentation' in industrial control systems in large scale, mult-plant environments. We begin with an explanation of the concepts behind 'Zero Trust', scalability, the best ways to adapt existing networking and segmentation without needing to reconfigure infrastructure, and how Palo Alto's platform adresses these needs. Speakers Lionel Jacobs is the Sr. ICS Security Architect at Palo Alto Netowrks Jonathan S. is an Information Security Architect at a Global F&B Manufacturer Del Rodillas (Moderator) is the Sr. Manager of ICS Initiative at Palo Alto Networks
Tags : 
zero trust, networking, network segmentation, ics, scale, infrastructure, enterprise
    
Palo Alto Networks
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security
    
Veracode
Published By: Veracode     Published Date: Oct 27, 2016
Veracode’s State of Software Security report provides security practitioners with tangible Application Security benchmarks with which to measure their own programs against. The metrics presented here are based on real application risk postures, drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. Download the report now!
Tags : 
veracode, security, software security, application security, security benchmark
    
Veracode
Published By: Veracode     Published Date: Oct 28, 2016
The Ultimate Guide to Getting Started with Application Security Application-layer attacks are growing much more rapidly than infrastructure attacks. Yet many organizations remain hesitant to create an application security program, believing it will require excessive time and resources. The reality is that any organization, of any size, can and should develop an applications security program. Download the Ultimate Guide to Getting Started With Application Security now for details!
Tags : 
veracode, security, devops, appsec, application security
    
Veracode
Published By: Veracode     Published Date: Oct 28, 2016
Trends and Tactics: How IT Professionals are Approaching AppSec Today
Tags : 
veracode, security, devops, appsec
    
Veracode
Published By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : 
veracode, security, devops, appsec
    
Veracode
Published By: Veracode     Published Date: Oct 28, 2016
DevOps practices, while relatively new, are spreading rapidly. And there are sound business reasons for executives to embrace these changes. This e-book from Veracode provides background into the evolution of DevOps and proposes five principles that must be addressed for those seeking to integrate AppSec into DevOps.
Tags : 
veracode, security, devops, appsec
    
Veracode
Published By: Juniper Networks     Published Date: Aug 07, 2017
Cybersecurity Is Not About Technology: It's about the Business of Cyber Crime. Everywhere.
Tags : 
    
Juniper Networks
Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
Wholly relevant and personalized customer service is no longer an optional preference, so much as an inevitable reality. Through the right data management technology, marketers can pave the way for their customers to reach the right ticket for their chosen journey, through the channels they prefer, in a way which means something to them in that particular moment. Airlines don’t have to make use of beacon technology and IoT to begin uplifting their outreach, but should choose a solution which is ready as soon as they are, to plug into, embrace and deliver actions with a shifting landscape of consumer touchpoints.
Tags : 
customer, marketers, technology, management
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX
Published By: athenahealth     Published Date: Sep 05, 2013
The large family practice located near Boston, MA leverages athenaCommunicator, an on-demand, automated and live patient communication service that supports and streamlines patient-physician interactions outside the exam room.
Tags : 
athenahealth, suite of services, athenacommunicator, live patient communication service, patient-physician interactions
    
athenahealth
Published By: athenahealth     Published Date: Apr 09, 2012
As health care costs rise, patients are required to pay more of those costs out of their own pockets. Learn 7 tips on how to deploy a self-pay strategy to help patients pay the balances.
Tags : 
patient payments, self-pay, patient payment, patient responsibility, health care self-pay, medical billing, practice management, athena health, athenacommunicator
    
athenahealth
Published By: Allscripts     Published Date: Jun 05, 2013
This paper explores the unique perspectives of both types of organizations. The participants include two of the original 32 Pioneer ACOs; the nation’s largest commercial ACO; a major IDN that is pursuing its own ACO pathway; a large stand-alone hospital that has yet to take the formal step of creating an ACO but is experimenting with the model; and a large, independent, multispecialty physician group that is wary of stepping into the ACO waters.
Tags : 
aco, idn, accountable care organization, medicare, reimbursement
    
Allscripts
Published By: SAP     Published Date: Nov 04, 2015
Download this whitepaper to discover how global companies are using innovative technologies such as beacons, dynamic pricing and adaptive analytics to flourish in the modern-day, next-generation retail world. Learn what they believe they’re doing well and where they’re struggling as they adapt to today’s rapidly evolving marketplace. These insights can help your business thrive in an increasingly disruptive retail landscape.
Tags : 
consumer behaviors, sap, dynamic pricing, beacons, adaptive analytics, marketplace, fulfillment, customer experience, emerging marketing, crm & customer care
    
SAP
Published By: Mitel     Published Date: Apr 07, 2017
L'expérience client est un facteur clé de différenciation dans l'environnement ultraconcurrentiel actuel. Plus que jamais, cette expérience est façonnée et proposée via des interactions numériques. Bien que la majorité des communications se font toujours par téléphone, les consommateurs comptent maintenant davantage sur les méthodes numériques, telles que le courrier électronique, les SMS, le chat en ligne et les réseaux sociaux. Les consommateurs se sont habitués au confort de pouvoir contacter l'entreprise par le média qui leur convient, où qu'ils soient. Ils s'attendent également à pouvoir basculer sans difficulté d'un moyen de communication à l'autre lorsqu'ils sont en déplacement.
Tags : 
    
Mitel
Published By: IBM Watson Health     Published Date: Nov 30, 2015
The transition from fee-for-service to value-based reimbursement has been a challenge for many providers. Financial incentives that favored high service volumes must now be re-focused to accommodate alternative models such as bundled payments and accountable care organizations (ACOs).
Tags : 
ibm, watson health, phytel, population, health management, accountable care organizations, finances, value-based
    
IBM Watson Health
Published By: Jamf     Published Date: May 04, 2017
The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. This white paper from Jamf—the Apple Management Experts—will show you how to best implement the independent organizations’ recommendations
Tags : 
    
Jamf
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Vorresti creare innovazione, accelerare la release delle applicazioni e approfittare di nuove opportunità: ma le applicazioni e le infrastrutture legacy ti ostacolano. Passa ad un'architettura moderna scomponendo applicazioni monolitiche in microservizi agile, creati, gestiti e ridimensionati in modo indipendente. Il tuo business potrà muoversi più velocemente e gli sviluppatori apprezzeranno la semplicità di accesso alle API, che consentirà loro di concentrarsi sulla customer experience.
Tags : 
ca technologies, innovazione, microservices, microservizi, api, customer experience
    
CA Technologies EMEA
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users, primary motivator, secondary motivator, implementing iam, security goals, regional perceptions, it management, cloud resource, enforcement, iam adoption, deploy iam
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : 
mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information, steal information, secure data, secure passwords, security breaches, broken privacy, reputational damage, cyber-security, business closures, business security, insider rights, threat environment
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction, in-house directories, management challenges, cloud-based services, b2b, b2c, cloud services, it applications, source of identity, bring your own identity, iam-as-a-service
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : 
mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders, in-house deployments, cost of ownership, external interaction, identifiable data, security services, access management, identity governance, drivers and blockers
    
CA Technologies
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: