practices

Results 176 - 200 of 3192Sort Results By: Published Date | Title | Company Name
By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
Transitioning from MSP to MSSP is a well-trodden path and there are a lot of best practices to increase chances of success. Success is due to people, processes, and tech in equal proportions. Generally, new MSSPs should pick a core set of competencies and branch outward from there. In this white paper, Garrett Gross, Director of Field Enablement, AlienVault and Tim Foley, Sr. Manager of Information Security, Dataprise discuss the current state of the market for MSSPs and best practices for new MSSPs.
Tags : 
     AlienVault
By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : physician, revenue cycle, technology, physician compensation, billing, reimbursement
     Allscripts
By: Allscripts     Published Date: May 01, 2014
Pottstown Medical Specialists, Inc. (PMSI), is one of the earliest adopters of the Patient Centered Medical Home (PCMH). Allscripts TouchWorks enabled the organization to exceed at meeting PCMH standards, exponentially raising their level of care while receiving significant financial incentives.
Tags : allscripts, pottstown medical specialists, pmsi, patient care, finanicla advantages, touchworks, ehr, best practices, patient centered medical home, open integration, community of health, quality of care, patient empowerment, eprescribing requirements
     Allscripts
By: Allscripts     Published Date: Sep 16, 2014
Download this ebook to understand the basic foundation that every practice needs in an EHR moving in to 2015 and beyond. Use the easy to follow checklist of criteria to ensure the vendor meets your individual practice’s needs as well.
Tags : ehr replacement, electronic medical record replacement, electronic medical record, electronic health record, electronic health record replacement, ehr ambulatory practice, ehr physician practice, ehr practice, ehr strategy, ehr needs, ehr, practice management, practice management solution, icd-10, meaningful use, mu2, improved outcomes, measuring quality outcomes, population health, fqhc ehr
     Allscripts
By: Allscripts     Published Date: Oct 14, 2015
Download this white paper to learn how small practices can earn Chronic Care Management revenue while providing the complex patient better care, the clinician knowing that they are providing higher quality care, and CMS reducing its overall costs and rewarding the practice financially.
Tags : chronic care management, small practices, complex patients, clinicians, high quality care, cms, healthcare spending
     Allscripts
By: Allscripts     Published Date: Oct 14, 2015
Independent physician practices are weighing their options as fee-for-service reimbursement models shift to value-based-care models, such as Accountable Care Organizations (ACOs). Download this white paper to learn more about forming ACOs.
Tags : accountable care organizations, acos, independent physician practices, fee-for-service, reimbursement, healthcare finance
     Allscripts
By: Alteryx, Inc.     Published Date: Sep 06, 2017
Organizations that want to apply consistent data management, governance and security practices across their organization can learn a lot from Ford Motor Company. Data-driven decision making led Ford Motor Company to perfect the vehicle assembly line in 1913. A century later, Ford had more than 4,600 data sources, and a wide range of analytical tools, methods, and processes in use throughout the company, and needed a more strategic approach to decision-making.
Tags : 
     Alteryx, Inc.
By: Amazon     Published Date: Mar 20, 2013
In the third installment of our Best Practices series, we talk to retailers about the various strategies they use to deal with excess stock.
Tags : surplus, amazon webstore, surplus stock, discounts, webstore, amazon, retail buying, business technology
     Amazon
By: Amazon Web Services     Published Date: Jul 25, 2018
Organizations are collecting and analyzing increasing amounts of data making it difficult for traditional on-premises solutions for data storage, data management, and analytics to keep pace. Amazon S3 and Amazon Glacier provide an ideal storage solution for data lakes. They provide options such as a breadth and depth of integration with traditional big data analytics tools as well as innovative query-in-place analytics tools that help you eliminate costly and complex extract, transform, and load processes. This guide explains each of these options and provides best practices for building your Amazon S3-based data lake.
Tags : 
     Amazon Web Services
By: Amazon Web Services     Published Date: Sep 05, 2018
Today’s businesses generate staggering amounts of data, and learning to get the most value from that data is paramount to success. Just as Amazon Web Services (AWS) has transformed IT infrastructure to something that can be delivered on-demand, scalably, quickly, and cost-effectively, Amazon Redshift is doing the same for data warehousing and big data analytics. Amazon Redshift offers a massively parallel columnar data store that can be spun up in just a few minutes to deal with billions of rows of data at a cost of just a few cents an hour. Organizations choose Amazon Redshift for its affordability, flexibility, and powerful feature set: • Enterprise-class relational database query and management system • Supports client connections with many types of applications, including business intelligence (BI), reporting, data, and analytics tools • Execute analytic queries in order to retrieve, compare, and evaluate large amounts of data in multiple-stage operations
Tags : 
     Amazon Web Services
By: AMD     Published Date: Jul 23, 2012
With the right foundation in place, virtualization has the potential to be a game changer in allowing organizations to dramatically improve business continuity.
Tags : best practices, virtualization, business continuity, data management, business technology, data center
     AMD
By: Anaplan     Published Date: Apr 06, 2016
A Harvard Business Review Analytics Services White Paper Finance is constantly tested to keep pace in today’s business environment. To keep up, planning needs to become a continuous process that spans departmental boundaries and enables managers to collectively realign resources to respond to market changes. Organizations must streamline disparate sales and operational planning with traditional financial planning and analysis by using technology to connect people, data, and processes across the organization. Download this white paper to discover the three steps to moving towards finance-led integrated business planning recommended by the Harvard Business Review.
Tags : analytics, planning, cfo, operations, business practices, revenue, growth, enterprise business, finance trends, business analytics, business process, harvard business review, hbr, financial planning, corporate finance, fp&a, budgeting, integrated business planning, ibp, finance
     Anaplan
By: Anaplan     Published Date: Nov 27, 2017
"The pressure on sales to meet and exceed ever-increasing revenue targets is higher than ever before. At the heart of this challenge lies a complex analytical and modeling problem that involves data spread across many rigid–and usually disconnected–systems, teams, and geographies. Leading companies handle this problem by focusing first on creating a sales performance plan that is data-driven and tied to business objectives. The research report conducted by Harvard Business Review provides you with how today's sales executives: • Overcome technology weaknesses to uncover sophisticated analytics • Change ingrained, cultural tendances of sales organizations • Adopt dynamic practices to respond to change quicker"
Tags : 
     Anaplan
By: Anaplan     Published Date: Nov 27, 2017
"Your sales compensation plan must align to market practices to attract, motivate, and retain the right talent. But only 20 percent of companies surveyed reported complete alignment between the sales compensation program and company objectives. To achieve the full benefit of an aligned sales compensation plan and a productive sale force, it is best to streamline the many siloed sales planning processes, including: • Revenue • Cost of sales • Account potential • Sales capacity • Territory and quota • Sales forecasting Download this white paper to see how successful compensation programs can collate numerous data inputs and align processes to meet business goals."
Tags : 
     Anaplan
By: Anaplan     Published Date: Mar 29, 2018
As businesses grow more optimistic about opportunities for growth, the pressure is on for sales organizations to meet ever higher revenue targets. In a global survey on sales performance optimization by CSO Insights, 94 percent of respondents said their 2014 revenue targets were higher than last year’s. It’s no wonder that “capture new accounts,” cited by 60 percent of respondents, topped the list of objectives for 2014 in the study. At the same time, many sales reps are struggling to meet even their current quotas. And in an Aberdeen Group survey, nearly half identified insufficient revenue growth as the top pressure motivating them to pursue sales management initiatives ranging from building out the capabilities of sales teams to improving management practices and investing in technology tools.
Tags : sales, performance, revenue, optimization, objectives, accounts
     Anaplan
By: Anaplan     Published Date: Mar 29, 2018
In recent months, leaders at some of the world’s largest consumer packaged goods (CPG) companies have spoken publicly about how ZBB is helping them save on overhead costs, which can then be used to reinvest in growth through innovation or bolster their margins. As consumers increasingly have more choices, these companies are finding their margins squeezed, and with direct expenses already trimmed back to the bare minimum, the only place to look is sales, general and administration (SG&A), and other overhead expenses.
Tags : zero, based, budgeting, investments, consumers, margins
     Anaplan
By: Anaplan     Published Date: Apr 02, 2019
5 best practices for world-class zero-based budgeting A traditional budgeting process based on extrapolating the previous year’s spend fails to provide the detailed insight needed to achieve a material change in the cost base, particularly when line item expenses are already high-aggregated. But zero-based budgeting (ZBB) can—and that’s what’s driving its increasing adoption in these volatile economic times. Download this white paper to discover: • Benefits of implementing a ZBB process at your organization • 5 best-practice approaches to implementing ZBB • Tips for leveraging ZBB in your organization in today’s volatile economy
Tags : 
     Anaplan
By: Anaplan     Published Date: Apr 09, 2019
5 best practices for world-class zero-based budgeting A traditional budgeting process based on extrapolating the previous year’s spend fails to provide the detailed insight needed to achieve a material change in the cost base, particularly when line item expenses are already high-aggregated. But zero-based budgeting (ZBB) can—and that’s what’s driving its increasing adoption in these volatile economic times. Download this white paper to discover: • Benefits of implementing a ZBB process at your organization • 5 best-practice approaches to implementing ZBB • Tips for leveraging ZBB in your organization in today’s volatile economy
Tags : 
     Anaplan
By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
     APC by Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com