article thumbnail

Case Study: Improving ID and Access Management

Data Breach Today

What are some of moves that organizations can make to improve their identity and access management? Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview.

Access 145
article thumbnail

[Podcast] Pepsi's AP Automation Case Study

AIIM

On this episode of the AIIM on Air Podcast , we take a look at this interesting case study. Click here to access our full library of episodes. The company's four largest European entities were still keying invoicing and credit memo data manually for all of their accounts payable processes. Want more episodes like this?

Libraries 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Learning, work and flexibility: a case study

CILIP

Learning, work and flexibility: a case study As part of our look at CILIP accredited courses we talk to Oona Ylinen, a part-time LIS student at UCL and Academic Support Librarian at University of Essex. Here she explains how she chose her course and her career and how an employer’s support with flexible working hours opened the door.

article thumbnail

George Mason University Makes a Smooth Jump to Mobile Access

HID Global

Read our latest case study to discover how George Mason University worked with HID to develop a better alternative to its card-based credential program.

Access 52
article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

Microsoft’s case study: Emotet took down an entire network in just 8 days

Security Affairs

Microsoft declared that an Emotet attack took down an organization’s network by overheating all the computers and bringing its Internet access down. “We are glad to share the DART Case Report 002: Full Operational Shutdown. The virus halted core services by saturating the CPU usage on Windows devices. Pierluigi Paganini.

Phishing 119
article thumbnail

[Podcast] Achieving Cloud Content Harmony – Access with Control

AIIM

There must be harmony between access to the information and control of the information. Also on this episode, hear a case study on how Qualcomm worked with Automation Anywhere to improve and automate their key business processes. Cloud Content Management has the power to change the game for businesses of all sizes and types.

Cloud 125