IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >   Biometrics  >  

Voice ID

RSS Feed   
Voice ID White Papers (View All Report Types)
 
A Clinically-Driven Approach to ICD-10
sponsored by Nuance
WHITE PAPER: This white paper highlights a voice recognition solution that enables physicians to describe their diagnoses more accurately and enhance the collaborative relationship between themselves, documentation specialists, other clinical staff and HIM pros.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

Speech Enable the EHR
sponsored by Nuance
WHITE PAPER: This resource highlights a speech recognition solution that improves physician experience with electronic health records, saving them 20 minutes or more of documentation time per day.
Posted: 12 Mar 2014 | Published: 31 Jan 2014

Nuance

Endpoint Protection Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks are on the rise – both in terms of frequency and average cost per attack. This white paper provides a comprehensive look into how ransomware attacks work, how they can be stopped, and best practices for configuring your endpoints for the strongest protection possible – read on to get started.
Posted: 11 Jan 2021 | Published: 31 Jul 2020

Sophos

Why Lack of Application Security Skills and Experts Can Cripple Digital Transformation Initiatives
sponsored by Contrast Security
WHITE PAPER: Over the past year, 73% of organization had at least one intrusion or breach due to a gap in cybersecurity skills – 47% had three or more such events. Download this white paper to take a deep dive into this issue, all by the numbers, as well as some ways to overcome outdated modes of application security to push digital transformation initiatives.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Contrast Security

The True Cost of a DDoS Attack
sponsored by Radware
WHITE PAPER: Many executives make the mistake of viewing cybersecurity strictly as a cost center. Organizations must reevaluate how the balance investment vs. risk equation and alter how and when they implement cybersecurity. In this Radware guide, learn the true cost of a DDoS attack, and see why it makes sense to invest now, not pay later.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Security and Compliance Automation for Financial Services
sponsored by Red Hat
WHITE PAPER: A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Red Hat

Overcoming the Legacy VPN Dilemma: Zero-Trust Access with Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access models enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Enabling Partners With Simple, Private Application Access
sponsored by Axis Security
WHITE PAPER: Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Axis Security

Securing Remote Workers in the Age of Teleworking
sponsored by Infoblox
WHITE PAPER: Remote workers are seeking access to enterprise resources from a variety of endpoints, both work-provided and personal, as well as various mobile devices. But many of the cybersecurity procedures designed for enterprise facilities won’t work from remote locations. Explore this detailed guide to learn how to secure remote workers intelligently.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Infoblox
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info