hr organizations

Results 1 - 25 of 462Sort Results By: Published Date | Title | Company Name
Published By: ISC2     Published Date: Oct 14, 2015
Selling cloud solutions to government organizations can be a complicated task with all of the political hoops you have to jump through. Firms known as 3PAOs (3rd-Party Assesment Organizations) have helped make it easier for cloud and government to mix, but it still can be a confusing landscape to navigate.
Tags : 
cloud security provider, fedramp, government, 3pao, data center
    
ISC2
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Dell EMC     Published Date: Feb 14, 2019
Artificial intelligence (AI) is a transformative technology that will change the way organizations interact and will add intelligence to many products and services through new insights currently hidden in vast pools of data. In 2017 alone, venture capitalists invested more than $11.7 billion in the top 100 Artificial Intelligence startups, according to CB Insights1, and the breadth of Artificial Intelligence applications continues to grow. While human-like intelligence will remain the stuff of novels and movies for the near future, most organizations can and should explore practical Artificial Intelligence projects. This technology has the potential to: • Improve productivity of internal applications • Increase revenue through enhanced customer interacton and improved customer acquisiiton • Reduce costs by optimizing operations • Enhance products and services with "smart" functionality such as vision and voice interaction and control This paper provided by Dell and Intel® gives executi
Tags : 
    
Dell EMC
Published By: Tenable     Published Date: Feb 27, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
    
Tenable
Published By: Mimecast     Published Date: Mar 19, 2019
The Latest Threats, Confidence Killers And Bad Behaviors – And How To Fix Them Email. You use it constantly. And it’s the number-one application to keep your organization functioning. Organizations need email to stay up-and-running all the time. After all, it’s supposed to just work, right? But if email isn’t part of an organization’s core security strategy, it can become a major vulnerability. Get this report to learn: -How employees are your first and last line of defense in attacks -Ways to adjust your approach to prioritize educating the riskiest employees -The magnitude of growth around impersonation attacks and phishing
Tags : 
    
Mimecast
Published By: MicroStrategy     Published Date: Jan 23, 2019
The MicroStrategy 2018 Global State of Enterprise Analytics Report, which surveyed 500 decision-makers from around the globe, reveals that leading organizations create a competitive edge through their use of data, with 63% experiencing improved efficiency and productivity, 57% realizing faster, more effective decision making, and 51% achieving better financial performance. Other top benefits include improved customer experiences, improved customer acquisition and retention, and the identification and creation of new revenue streams—all keys to digital transformation. What else did the 2018 report reveal? Read all the insights with both global and geo-specific views here. This infographic shares a few highlights from the new 44-page report which serves as a benchmarking resource for all data-driven organizations.
Tags : 
    
MicroStrategy
Published By: HireVue     Published Date: Mar 05, 2019
The AI-in-recruiting space has exploded, leaving many recruiting leaders feeling overwhelmed and poorly qualified to evaluate vendors. Our AI Buying Guide is designed to help TA leaders cut through the hype and misinformation that surrounds artificial intelligence, and make highly qualified, informed buying decisions. YOU’LL LEARN: • What AI is, and what makes it different from previous technological innovations • Why different types of organizations see different levels of success with AI - and how to prep yours to maximize the impact • How to evaluate vendors across the 3 steps of the buying process • How to build a rock-solid business case for AI-driven recruiting technology Download the guide now.
Tags : 
    
HireVue
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: CrowdStrike     Published Date: Feb 14, 2019
A SANS Review of CrowdStrike Falcon X While threat intelligence can transform an organization's security posture, it can also be complex and costly for organizations to adopt and operationalize. With that in mind, SANS Analyst Dave Shackleford tested CrowdStrike Falcon XTM threat intelligence and the report of his findings is now available. Falcon X enables cybersecurity teams to automatically analyze malware found on endpoints, find related threats and enrich the results with customized threat intelligence. The SANS Review of Falcon X encapsulates and explains the analyst’s findings and details how CrowdStrike can help your security operations center (SOC) team make predictive security a reality. Download this report to learn: • How intelligence automation, built into the Falcon endpoint protection platform, enables teams, of all skills and sizes, to make better decisions and respond faster • How Falcon X performs investigations and delivers actionable intelligence with custom indicat
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 14, 2019
How adopting a framework can optimize cybersecurity Today’s threat landscape has created new challenges for security analysts and incident responders, as the number of alerts and their complexity have increased significantly. Organizations with small IT teams are overwhelmed, often lacking the time or resources to investigate every alert. Failing to do so means a high-risk threat might go unnoticed. This can result in a devastating breach, damaging an organization's finances and reputation. This white paper discusses how CrowdStrike is solving these challenges, by implementing the MITRE ATT&CK™ Framework across multiple CrowdStrike processes and product features to help improve analyst’s productivity and prevent breaches. This provides many benefits, including time savings; adding advanced context to security alerts and information; and enabling a common, shared language. However, it also provides some hidden advantages, especially concerning cybersecurity. Read this whitepaper to lear
Tags : 
    
CrowdStrike
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg
    
Mimecast
Published By: Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
Cylance
Published By: Cisco EMEA     Published Date: Jun 01, 2018
Digital transformation has arrived, and it’s creating unprecedented opportunities for companies of all sizes to become market leaders through the evolution of business processes and the creation of new products and services. Organizations that master digital transformation will see a dramatic increase in revenues and profitability by converging people, processes and technologies; those that do not will struggle to survive. Evidence of this is clear to see by looking at the churn in the biggest companies in the world. For example, a Capgemini study found that since 2000, 52% of the Fortune 500 has disappeared through acquisitions or bankruptcies. The study also found that digital organizations control 70% of market share in all industries today. Therefore, making the shift to a digital business must be a top initiative for IT and business leaders. Download this whitepaper to see how Cisco has become the Market Share Leader in Online Meetings.
Tags : 
cisco, digital transformation, collabaration
    
Cisco EMEA
Published By: Veritas     Published Date: Sep 30, 2016
Learn how a typical organization could save over $120,000 in three years with Veritas NetBackup™ Appliances over traditional build-your-own (BYO) media servers. Veritas provides the industry’s only integrated and purpose-built backup and recovery appliances to address the financial challenges organizations face today.
Tags : 
    
Veritas
Published By: Coupa     Published Date: Dec 14, 2018
What P2P Leaders Do That You Can, Too Purchase-to-pay (P2P) organizations are under high-stakes stress. With constant changes in market volatility, fierce competition, and disruptive technology, P2P teams need to re-think their approach to balancing traditional cost concerns and emphasize agility. The question is: how? To help companies discover the answer, The Hackett Group looked at P2P organizations across a variety of industries and areas over a 12-month period to identify what top performers had in common—and what set them apart. Read this report to gain insight into three key areas: Ensuring stakeholder needs guide day-to-day decisions Digitizing information to increase availability and agility Automating processes to accelerate response to change
Tags : 
    
Coupa
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Sage     Published Date: Nov 26, 2018
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape. We surveyed over 500 HR leaders in leading organizations to explore their views around these challenges, and to find out how they are supporting people and leveraging people data to help them achieve their growth goals. Read our report to learn more and discover what you can do to become a People Company.
Tags : 
    
Sage
Published By: Oracle     Published Date: Nov 28, 2017
Today’s leading-edge organizations differentiate themselves through analytics to further their competitive advantage by extracting value from all their data sources. Other companies are looking to become data-driven through the modernization of their data management deployments. These strategies do include challenges, such as the management of large growing volumes of data. Today’s digital world is already creating data at an explosive rate, and the next wave is on the horizon, driven by the emergence of IoT data sources. The physical data warehouses of the past were great for collecting data from across the enterprise for analysis, but the storage and compute resources needed to support them are not able to keep pace with the explosive growth. In addition, the manual cumbersome task of patch, update, upgrade poses risks to data due to human errors. To reduce risks, costs, complexity, and time to value, many organizations are taking their data warehouses to the cloud. Whether hosted lo
Tags : 
    
Oracle
Published By: Cherwell Software     Published Date: Apr 07, 2016
B/E Aerospace is the worldwide leading manufacturer of aircraft passenger cabin interior products and the leading global distributor of aerospace fasteners for commercial, business jet, and military markets. The company has leading worldwide market shares in all major product lines and serves virtually all of the world’s airlines, aircraft manufacturers, and leasing companies through its direct global sales and customer support organizations. Headquartered in Wellington, Florida, B/E Aerospace has grown to nearly 12,000 employees and 220 sites around the world and a true follow-the-sun model for global customer support.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Red Hat     Published Date: Aug 22, 2018
Unlike surveys that just look at what respondents say at a specific point in time, the BPTrends survey has been asking questions of process practitioners for over a decade. Thus, we are in a good position to generalize about ongoing trends in process work. Broadly speaking, the interest in business process change has evolved slowly. For some organizations the progress has been dramatic, but for most, their process initiatives are best described by the phrase “two steps forward; one step back.” An amazing number of organizations have focused on process work for several years, made significant progress, then, seemingly forgotten all about their process work, regressed, and then, a few years later, started up again.
Tags : 
    
Red Hat
Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Modern networks and their components are constantly evolving and traditional next-generation firewalls are not able to provide the level of protection organizations require. In this paper you will learn: • Why typical next-generation firewalls that focus primarily on application visibility and control offer an incomplete approach to threat defense • What organizations need to defeat advanced threats in a resource-constrained environment • What benefits you can gain with the Cisco Firepower™ Next-Generation Firewall (NGFW), the industry’s first fully integrated, threat-focused NGFW
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
Delivering exceptional customer experiences has become a key differentiator for top organizations today. Now you can see where your peers and competitors stand in the new Forbes Insights report Data Elevates the Customer Experience. This report is a comprehensive follow-up to an October 2015 preliminary pulse survey conducted among 105 executives of large global organizations. It identifies three categories of organizations – leaders, explorers and laggards – and measures the progress they have made with the data-driven customer experience based on three key pillars: organization (people), openness (data) and orchestration (processes). Read the results, find out where you stand and glean some new ideas from your peers about how to elevate the customer experience.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 17, 2018
For organizations to succeed with the onslaught of devices, sensors and tools that innovation garners, data must no longer be treated as a byproduct but instead as an asset. And data-driven innovation must start at the top. That's what Michael Schrage, Fellow at MIT Sloan School's Initiative on the Digital Economy, said during the Harvard Business Review webinar, Leadership and Big Data Innovation. Find out why data experimentation, governance and culture are part of the next leadership challenge for organizations.
Tags : 
    
SAS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.