hr solutions

Results 301 - 325 of 473Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn why Mr. and Mrs. Evans decided to go with a more flexible and cost effective alternative for their human resources system, AsureForceT Time & Labor Management Solutions.
Tags : 
workforce management, time and attendance automation, human resources, payroll solutions
    
Asure Software
Published By: Asure Software     Published Date: Sep 10, 2012
Key financial stakeholders for Lowenstein Sandler were looking for a solution for tracking employee time that would eliminate paperwork and increase efficiency and productivity. As a result, they settled on AsureForce Time & Labor Management.
Tags : 
time and labor management, human resources, payroll solutions, web-based solutions, workforce management
    
Asure Software
Published By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll discover how Nixon Peabody cut operational costs, improved efficiency within the HR department and improved employee productivity with self-service with the help of AsureForceT Time & Labor Management Solutions.
Tags : 
hr costs, human resources, payroll solutions, workforce management, benefits
    
Asure Software
Published By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn how AsureForceT Time & Labor Management offered a comprehensive solution to all of Security First Bank's needs.
Tags : 
workforce management, human resources, payroll management, time and labor management, web-based solutions
    
Asure Software
Published By: McAfee     Published Date: Nov 12, 2014
This paper characterizes web threats and explains why most security solutions in place today are ineffective.
Tags : 
web security, web protection, mcafee web gateway, mcafee saas web protection, mcafee data loss prevention, it management
    
McAfee
Published By: DocuSign     Published Date: May 29, 2014
In this fast-changing environment, more HR and Staffing professionals are looking to solutions to empower them and their employees. Yet with over 2000 solutions, how do you know which ones are the best? Read this whitepaper and find out the 4 must have tools for HR and Staffing departments in order to streamline workflows, increase efficiencies and help employees help themselves to a better work experience.
Tags : 
docusign, hr technology, staffing professionals, streamline workflows, esignatures
    
DocuSign
Published By: Oracle     Published Date: Apr 22, 2014
This eBook is a short introduction on how IT helps drive value for the business through cloud-based customer service solutions.
Tags : 
customer service, service in the cloud, cloud computing, oracle
    
Oracle
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension
Published By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : 
apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
    
Dyn
Published By: Globalscape     Published Date: Mar 21, 2014
Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is an easy one: Providing quick, high-quality care wins every single time.
Tags : 
globalscape, healthcare, digitalized assets, healthcare technology, ehr, file sharing solutions, electronic health records, healthcare it, patient data, medical data, hipaa, mft, managed file transfer
    
Globalscape
Published By: Adobe     Published Date: Mar 16, 2016
Competition is the number one pressure faced by today’s HCM teams – by a 69% margin! Of all the pressures that contemporary HR teams face, finding and keeping quality talent ranks above everything else. As a part of that, Best-in-Class organizations need to focus on optimizing the employment experience, from hiring and onboarding, to ongoing management and transition. This report from Aberdeen explores how electronic signature solutions, as well as other digital HR technologies, can improve the employment experience throughout the journey. Read this report to learn: • Why Best-in-Class HR departments are investing in employee-friendly technologies • How digital solutions can impact employee experience, and why that matters for HR • How electronic signatures complement HRIS applications and streamline many HR processes
Tags : 
hr organizations, hris, esignature, customer management, sales effectiveness, human capital management, knowledge management
    
Adobe
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions, it management
    
Alert Logic and Sungard Availability Services
Published By: Soonr     Published Date: Sep 03, 2014
Download this guide for a critical look at 6 EFSS products - Accellion, Anchor/eFolder, Citrix Sharefile, Google Drive, Microsoft OneDrive and Soonr Workplace. In each of the first five, you'll discover 10 reasons why they are not well-suited for business. Then see how Soonr Workplace delivers mobile file sharing and collaboration in an enterprise-grade solution.
Tags : 
soonr, file sharing, mobile file sharing, file synchronisation, mobile collaboration, file storage, cloud file sharing, hybrid cloud, file sharing security, it management, knowledge management, efss solutions, hybrid cloud, data center
    
Soonr
Published By: Oracle Primavera     Published Date: Oct 09, 2015
As the oil and gas pipeline industry grapples with change at every level — including increasing pipeline operations and expanding regulatory oversight infrastructure —cost savings and operating efficiencies have become more important than ever. Both pipeline operators and contractors can benefit from utilizing EPPM solutions to help them pinpoint the best strategies to develop and implement projects from conception through execution to end game — thereby helping to reduce risk and manage cost. In the end, it’s all about smartly using an approach, such as EPPM solutions, like those from Oracle, to help pipeline operators and contractors reduce costs at the project, portfolio, and enterprise levels through the project lifecycle. The midstream companies that are able to implement the best approach to managing risk to their operations in the most cost - effective way will be the ones to best weather another tumultuous decade to come for the oil and gas industry.
Tags : 
oracle, oil and gas, oil and gas pipeline industry, cost savings, eppm solutions, midstream oil industry, project management, project portfolio management
    
Oracle Primavera
Published By: NetApp     Published Date: Dec 05, 2016
All-flash storage is increasingly being used to consolidate multiple workloads onto a single platform to reduce complexity, enhance agility and lower costs. Learn how these three factors are shaping the use of all-flash storage and find out the evaluation criteria when considering all-flash storage solutions.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: WePow     Published Date: Sep 02, 2015
Most organizations ignore key signs that determine whether or not their recruiting process needs improvement. Read this free article to learn about new HR solutions, like video interviewing platforms, which make recruiting processes more efficient.
Tags : 
video interview, hr technology, recruitment, recruiting, candidate screening, talent acquisition, digital interviewing, interview tips, video interviewing, hiring acceleration
    
WePow
Published By: SAP     Published Date: Mar 25, 2011
Read the article about SAP Rapid Deployment Solutions for SAP CRM. The article answers three important questions about these solutions, discussing what functionality is available, why you can be sure the implementation will bring rapid benefits, and where you can find more information. (SAPinsider, Jan - March 2011 )
Tags : 
sap rapid deployment solutions, sap crm, rds for sales, rds for marketing
    
SAP
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, it management
    
Centrify Corporation
Published By: IBM     Published Date: Feb 11, 2015
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
criminal fraud detection, authentication methods, ibm, criminal detection software, software development
    
IBM
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? Perhaps you went with something you had used at a previous job. Maybe you even went so far as to read a few product reviews and third-party test results or evaluations. But, did you test the anti-malware solution yourself? In this book, we explain how artificial intelligence (AI) can help your enterprise combat malware threats in a more preventative, proactive, and radically better way than legacy anti-malware products. We explain why you shouldn't just believe a vendor's marketing. Instead, you should test different solutions for yourself, just as you would with any other major security investment. Read more in this eBook.
Tags : 
anti, malware, testing, generation, data, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.