government

Results 126 - 150 of 493Sort Results By: Published Date | Title | Company Name
Published By: AON     Published Date: Dec 07, 2017
While the Affordable Care Act (ACA) increased the number of Americans with access to health insurance, U.S. employers and employees continue to struggle with rising health care costs and changing workforce demands. Recent Aon research shows that 20% of health care consumers cite high health care costs as the major reason they have either declined health care coverage, stopped taking medications, or avoided care altogether. If the U.S. health care system is to succeed, stakeholders across the health ecosystem must influence change in each market—employer, individual, and government (Medicare, Medicaid, and Tricare). While each part of the three-legged stool is important, this paper focuses on five strategies Aon believes will strengthen the employer-based system—a system that provides health care coverage to well over half of Americans (61%, or 177 million).
Tags : 
health insurance, employer – provided health benefits, aon hewitt, health ecosystem, well – being initiatives
    
AON
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: SAP     Published Date: Nov 22, 2017
To keep up with sweeping global economic and societal changes, public services organizations are undergoing significant technology-driven transformation. Aging populations, rapid urbanization, political instability, concerns about sustainability and resiliency, and changing worker and resident expectations are driving public services organizations to radically improve operations and service delivery. At the core of this transformation is the ability to collect and process vast amounts of data to help to improve outcomes and services. One way to generate this data is through the Internet of Things (IoT) — which IDC defines as a network of networks of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity. The IoT is a transformational technology that can reshape the public sector, enabling improved outcomes and new services such as remote patient monitoring, advanced traffic solutions and predictive policing.
Tags : 
global, economic, societal, technology, driven, transformation, political
    
SAP
Published By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
In this report 1,500 Australians describe how they currently use and rate digital public sector services across all levels of government, and what they expect from them today and into the future. The survey shows that Australians regularly engage with government through digital services, with half of respondents saying they do so on a quarterly basis, and 30 per cent accessing them fortnightly; but that the quality of the digital experience is paramount.
Tags : 
digital, experience, australia, public, sector, transition, hardware, software
    
Riverbed ANZ DWA IT Leads GTM
Published By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
What do Australians think? 1,500 Australians described how they use and rate digital public sector services across all levels of government and outlined current and future expectations for the platforms.
Tags : 
australians, confidence, experiences, public sector, improvement, government, digital
    
Riverbed ANZ DWA IT Leads GTM
Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: Adobe     Published Date: Oct 25, 2017
With the right foundation, the road to digital transformation is easy. Find out the steps you can take to start your journey – and start delivering experiences that truly put your customers at the center. Read the guide, Customer-centric Digital Transformation: What You Need to Know to learn: • Five steps toward customer-centric digital transformation • Four key components that make up excellent customer experiences • Tips and inspiration from industry experts and digital government agencies
Tags : 
public sector, digital innovation, customer-centric, digital government, customer experience
    
Adobe
Published By: Adobe     Published Date: Oct 25, 2017
Outdated, manual services aren’t just frustrating for citizens, they slow government processes down and increase costs. The Governing Institute recently analyzed how well state governments deliver digital experiences for citizens, employees, and businesses. Read Delivering on the Digital Experiences that Drive Efficiency to learn: • How digital experiences measure up in all 50 states • About our new customer experience maturity model for state governments • Best practices for improving digital processes in your own state
Tags : 
customer experience, digital government, digital maturity, customer-centric, customer engagement
    
Adobe
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
As the use of cloud solutions in government increases, both business and IT leaders are recognizing that the safety and success of their business depend on finding ways to take full advantage of cloud innovation while ensuring consistent service levels, data management and privacy, and user experiences. Hybrid IT management includes aligning the organization around service levels, cost control, security, and IT-enabled innovation.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Big Data is not just a big buzzword. Government agencies have been collecting large amounts of data for some time and analyzing the data collected to one degree or another. Big data is a term that describes high volume, variety and velocity of information that inundates an organization on a regular basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and better services.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: Singularity University     Published Date: Oct 17, 2017
Agile and innovative companies like Netflix, Instagram, Amazon, Airbnb, and Uber have used exponential technologies to completely disrupt their industries. But some of the largest industries in the world have fallen prey to these and other disruptive companies. And most of them didn’t even see it coming. The convergence of exponential technologies, along with bold thinking and the willingness to take risks, is completely altering the business landscape. And that landscape is changing at an accelerating pace. Disruption is occurring far more quickly than ever before. On average, an S&P 500 company is being replaced every 2 weeks, and over 40% of today’s Fortune 500 companies on the S&P 500 will no longer exist within 10 years. The only options are to disrupt yourself or be disrupted by your competition. Which will you choose? If you choose the former, do you know how to proceed? This guide shares strategies you can employ today to start future-proofing your company.
Tags : 
innovation, disruption, technology, business, management, leadership, strategy, revenue, retail, healthcare, manufacturing, government, financial services, learning, future of work, artificial intelligence
    
Singularity University
Published By: Canon Solutions America     Published Date: Oct 17, 2017
Transforming government processes starts with laying the right foundation for your organization’s workflow. Many government agencies have embarked on transformation initiatives; however, there is still room for improvement to build a more stable transformation foundation.
Tags : 
pii security, pii breach, pii compliance checklist, how to protect pii, pii information security, pii data compliance, pii data protection, pii data breach, pii encryption, pii encryption best practices, public sector printing, secure public sector printing, security breach in public sector
    
Canon Solutions America
Published By: Justworks     Published Date: Sep 27, 2017
Business owners and entrepreneurs create their businesses for a number of reasons: to grow an idea, build and inspire a team, make a difference. And all too quickly, those business owners can face the other side of running a business: paying employees, negotiating the best benefits for your teams, keeping up with myriad government regulations. Workplaces are getting even more complicated - for good reasons. Teams have more flexibility to work remotely. And the gig economy is exploding; in fact, about a third of the U.S. workforce works on something other than a full-time basis.
Tags : 
    
Justworks
Published By: Dell     Published Date: Sep 26, 2017
Government organizations need a workforce approach that not only enables employees to make informed decisions and work more efficiently, but also promotes engagement and satisfaction. Download this whitepaper to learn more about how to enable employees to better focus on their core roles and expertise and how to access the right information on demand to be more productive. As well, determine best practices for selecting the right devices to enable the organization as a whole to accomplish its mission, meet citizens’ needs, and attract and retain the workforce it needs for the future.
Tags : 
    
Dell
Published By: Dell     Published Date: Sep 26, 2017
Government leaders have the unprecedented opportunity to accelerate the path to IT modernization. Download this whitepaper to learn more about the IT trends driving digital transformations and the considerations to be made in determining a successful strategy toward effective and compliant IT modernization. With the right approach, organizations can create an efficient and future-ready launching pad to agilely, cost-effectively and securely meet the needs of constituents, employees and internal customers; accommodate increasing data volumes; and comply with regulatory requirements.
Tags : 
    
Dell
Published By: Exabeam     Published Date: Sep 25, 2017
Most enterprises and government organizations that experience data breaches have traditional security point solutions, log management, and security information and event management (SIEM) solutions in place. However, SIEM is not a comprehensive solution on its own. There has been a great deal of focus on the attack-chain – or kill-chain – of steps in the process leading to these breaches.
Tags : 
    
Exabeam
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
DDoS attacks seem to constantly be in the news, continually evolving and growing in complexity. You may have heard about the big, volumetric attacks that took down Donald Trump’s campaign website and Brazilian government sites during the Olympics. But while volumetric attacks still reign supreme, there are other, more insidious, low-level DoS attacks that can also damage your site, your applications, and your business. If you think you’re ready for a DDoS attack—or that you don’t need to worry about one—make sure you’re not buying into some of these popular myths.
Tags : 
    
F5 Networks Inc
Published By: Datastax     Published Date: Aug 23, 2017
Enterprises today continue to differentiate themselves with cloud applications – any application that needs to be always-on, distributed, scalable, real-time, and contextual. With DataStax Enterprise, DataStax delivers comprehensive data management with a unique always-on architecture that accelerates the ability of enterprises, government agencies, and systems integrators to power the exploding number of cloud applications. DataStax Enterprise (DSE) powers these cloud applications that require data distribution across data centers and clouds, by using a secure, operationally simple platform. At its core, DSE offers the industry’s best distribution of Apache Cassandra™. This paper provides a summary of the features and functionality of DataStax Enterprise that make it the best choice for companies that are looking to leverage the promise of Apache Cassandra™ for production environments.
Tags : 
cloud, adoption, application, migration, performance
    
Datastax
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Juniper Networks
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Increased access to data and more channels of communication have given citizens renewed civic power. Public-sector agencies must be just as responsive as any other enterprise with which citizens interact. If you’re an optimist, imagining the results of a hyperconnected citizenry is exciting. As long as government is responsive, greater citizen involvement could help reduce problems that plague modern society, including poverty, disenfranchisement and even crime.
Tags : 
data access, technology development, public sector, data security
    
Hewlett Packard Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee