Best Practices White Papers

Best Practice is a management idea which asserts that there is a technique, method, process, activity, incentive or reward that is more effective at delivering a particular outcome than any other technique, method, process, etc. The idea is that with proper processes, checks, and testing, a project can be rolled out and completed with fewer problems and unforeseen complications.
Results 1 - 25 of 859Sort Results By: Published Date | Title | Company Name
By: ADP AdvancedMD     Published Date: Nov 17, 2014

Private practices are now among the largest unsecured credit grantors in the country. As the money from insurance companies decreases, patient portions have increased. As a result, both patient liability and bad debt are on the rise and healthcare providers are experiencing unprecedented revenue and margin pressure. With this whitepaper, you can learn how to improve the process of patient payments.

Tags : adp, advancedmd, patient balance, balance collections, best practices, process payments, patient balance, medical debt
    
By: Skyword     Published Date: Nov 14, 2014

Eventually, you’ll want to move your content strategy past awareness-driven content creation and start converting leads. To show meaningful content ROI, you must have a framework in place to create a diverse array of custom content, and this free eBook will give you the tools and strategy to get started. Download it today!

Tags : content strategy, content marketing, b2c content, b2b content, content marketing platform, content marketing agency, brand content, branded content
    
By: IBM     Published Date: Nov 14, 2014

Data mining uncovers patterns in data through a variety of predictive techniques. By engaging in data mining, organizations like yours gain greater insight into external conditions, internal processes, your markets – and your customers.

Tags : ibm, data mining, data management, business results, predictive intelligence, business insights, best practices, business intelligence
    
By: IBM     Published Date: Nov 14, 2014

This document describes best practices for deploying GPFS in such environments to help ensure optimal performance and reliability.

Tags : ibm, big data, big data platform, hdfs, big data analytics, best practices, business analytics, analytical applications
    
By: McAfee     Published Date: Nov 12, 2014

This paper discusses the Office 365 platform, its applicability for organizations of all sizes, and the need for third-party solutions which complement the platform to maintain a strong security posture.

Tags : office 365, osterman research, security for office 365, security, best practices
    
By: McAfee     Published Date: Nov 12, 2014

This white paper outlines the best practices for better data loss prevention for healthcare organizations—from data discovery to classification to protection.

Tags : data loss prevention, dlp, healthcare, dlp best practices, data management, best practices, business activity monitoring
    
By: McAfee     Published Date: Nov 12, 2014

With noise about data loss prevention capabilities at an all-time high, this Gartner Magic Quadrant for Content-Aware Data Loss Prevention covers enterprise content-aware DLP solutions.

Tags : data loss prevention, dlp, healthcare, gartner magic quadrant, content-aware dlp, data management, best practices, business intelligence
    
By: SAS     Published Date: Nov 10, 2014

Learn how data is evolving and the 7 reasons why a comprehensive data management platform supersedes the data integration toolbox that you are using these days.

Tags : sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling
    
By: SAS     Published Date: Nov 10, 2014

Learn how this upcoming year should be the year you make your big data actionable and see what else you should be doing to maximize its potential.

Tags : sas, data integration, data evolution, comprehensive data, data management, data virtualization, data warehouses, data profiling
    
By: Fluke Networks     Published Date: Nov 05, 2014

This White Paper examines the need for AANPM and how it helps organisations to optimise the performance of business critical applications while speeding up network and application trouble-shooting and minimising downtime.

Tags : application trouble shooting, the need for aanpm, benefits of aanpm, networking, application integration, application performance management, best practices, business management
    
By: Fluke Networks     Published Date: Nov 05, 2014

This guide is intended for companies,organizations, and IT professionals who are looking for a network and application monitoring tool that provides a holistic view of application performance, including performance monitoring, from the end-user perspective.

Tags : aanpm, best practices guide, fluke networks, software development, application performance management, best practices
    
By: IBM     Published Date: Nov 05, 2014

How security and business continuity can shape the reputation and value of your company.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: ARMA     Published Date: Nov 04, 2014

All organizations depend on information to manage day-to-day operations, comply with regulations, gauge financial performance, and monitor strategic initiatives. This critical information resides in the organization's business records. As internal auditors conduct their annual risk assessment, they should consider how well business records are managed and assess the degree to which the risks to this information are understood.

Tags : value proposition, financial performance, internal auditors, annual risk assessment, it management, knowledge management, best practices, business intelligence
    
By: ARMA     Published Date: Nov 04, 2014

The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.

Tags : information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management, best practices
    
By: IBM     Published Date: Nov 03, 2014

Learn how to understand, manage and debug problems due to size, complexity and scale in operation of virtualized networks for modern data centers, including developer- and user-controlled software in clouds.

Tags : cloud management, virtualized networks, data centers, cloud it optimization, it management, knowledge management, data management, best practices
    
By: IBM     Published Date: Nov 03, 2014

Business critical applications must always be available and performing. Furthermore, the reality is in today's customer centric world, slow is the new broke. Compounding this challenge, IT complexity is rapidly increasing.

Tags : infrastructure visibility, it complexity, search analytics, problem identification, it management, knowledge management, data management, best practices
    
By: CA Technologies     Published Date: Oct 21, 2014

This paper provides new perspectives enabling today's operators to deliver quad play services and more in the face of intense competition

Tags : telco services, virtualization, application automation, quad play services, application integration, application performance management, best practices, business process automation
    
By: CA Technologies     Published Date: Oct 21, 2014

In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.

Tags : devops, software, training, project management, software development, application integration, application performance management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

As a retail security professional, you are challenged with maintaining a constant state of PCI compliance and keeping your infrastructure safe using best-of-breed security solutions that help, rather than hinder, your quest to validate your systems. Endpoint protection that is based on detecting known malware is demonstrably ineffective —and has the potential to create numerous inefficiencies across your organization. In addition, constant updating of security patches and antivirus software libraries can slow response times and leave endpoints vulnerable to APT attacks. Besides potential breaches of your customers’ personal information, as well as damage to your brand, a lack of endpoint control can also put you at risk for steep PCI noncompliance and regulatory penalties—fines that can range anywhere from $10,000 to $100,000 per month.

Tags : retail security, pci compliance, infrastructure security, endpoint protection, security, knowledge management, best practices, project management
    
By: Bit9     Published Date: Sep 30, 2014

Recent high-profile data breaches at brand name retailers, highlight the need to protect your company’s reputation and your customer’s personal information. The consequences of suffering a data breach are numerous, and none of them are positive — consumer mistrust, a drop in traffic and a decrease in sales, to name just a few.

Tags : data breach protection, it security, infrastructure protection, pci compliance, security, knowledge management, best practices, business activity monitoring
    
By: Bit9     Published Date: Sep 30, 2014

Most organizations must comply with multiple standards covering privacy, corporate financial data, Protected Health Information and credit card data. Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure. However, GRC requirements do not exist in a vacuum. Organizational objectives must also be supported. Critical functions can be disrupted if business needs are not considered when establishing compliance activities. In addition, providing evidence that the appropriate controls are in place and enforced is a requirement of any audit. Investing in selecting the right policies, controls and solutions leads to more successful audits and security that is more reliable.

Tags : security controls, risk compliance, it auditor, security, it management, best practices, business activity monitoring, risk management
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : data center security, server security, targeted attacks, data breaches, security, it management, knowledge management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

Regardless of how they initially enter the organization, most attackers today still aim to compromise internal servers to steal user credentials, steal sensitive data, and turn compromised servers into hosting platforms used to help attackers steal even more assets. This SANS whitepaper discusses the methodology of internal and external attacks on data center servers and the applications running on them. It also discusses why, even with our layers of security in place today, servers are still vulnerable, and how organizations can leverage application controls to permit what is known and trusted while denying everything else.

Tags : server security, platform protection, data center servers, server vulnerability, security, knowledge management, best practices, project management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.