hr solutions

Results 351 - 375 of 476Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 28, 2014
From recruitment to onboarding and processing, HR teams spend hundreds of hours every year manually typing and processing documents. But what if you could eliminate tedious, manual processes to save valuable time - and get critical data across the organization faster? Employee Lifecycle Management solutions from IBM can help you integrate employees faster and simplify your daily task list, so you can get back to what's important - take the assessment to see how much time you could save.
Tags : 
online tool, employee lifecycle, employee onboarding
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
fraud detection, cybercrime, cyber threat, malware, it management, knowledge management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges, it management, business technology
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat, networking, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.
Tags : 
intelligence technology, security management, threat intelligence, intelligence protection, security solutions
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection, ibm solutions
    
IBM
Published By: IBM     Published Date: Feb 04, 2016
Disruptors are reinventing business processes and leading their industries with digital transformations. Learn more about personalized front-line decision making, real time insight driven processes, and ecosystem-based innovation.
Tags : 
ibm, middleware, solutions, digital, security, cyber threats, business technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
In this white paper we discuss what hybrid cloud is, why it’s inevitable, and how to take advantage of it. We look at some of the barriers to public-cloud adoption, while we cut through unnecessary technicalities to get to the heart of the matter. We also offer a brief overview of the sponsor of this paper and their relevant solutions.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business technology, hybrid cloud, hybrid
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centricity,
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centrici
Tags : 
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : 
webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
    
Group M_IBM Q1'18
Published By: Breakout Solutions     Published Date: Sep 24, 2008
Breakout Solutions is pioneering the way in which organizations utilize Social Media to meet their online promotional objectives. Our proprietary video contest platform provides a turnkey solution for organizations that value interacting and communicating directly with their target market through social media. Web 2.0, has led to a more interactive and social landscape where content is no longer king, conversation is. Breakout Solutions can help your brand become a part of these conversations so that you have a better understanding of how others view your brand and utilize your products and services.
Tags : 
breakout solutions, promotional contest, branded promotion, videos, photos, audio, myspace, facebook, youtube, social networks, social media, web 2.0
    
Breakout Solutions
Published By: Silverpop Engage B2B     Published Date: May 19, 2009
Smaller budgets. Fewer personnel. More pressure to show value. As the recession lingers on, B2B marketers are being called upon to deliver bigger, faster, cheaper results with less resources. But the current economic climate means even companies able to make high-dollar purchases will require more touch points to nurture them through the buying process. Today's business buyers are cautiously working to make smarter, more informed decisions.
Tags : 
silverpop, engage, roi, metrics, email marketing, opens, clicks, recession, b2b, b2c, roi, return on investment, engaging, recipient, communications, customers, prospects, customer relationship management, crm, click-through rates
    
Silverpop Engage B2B
Published By: SonicWall     Published Date: Sep 10, 2009
Hear real-world examples of how companies like yours consolidated their security to lower their total cost of ownership, optimized existing resources, increased their security and dramatically improved productivity!
Tags : 
sonicwall, free pcmagcast webinar, unified threat management, a different, efficient, costly bandwith, consolidating multiple solutions, run bandwidth on your web 2.0 apps, long term costs of owning solutions, potamac hospital, sonicwall clean wireless solution, integrates wireless access points, utm firewall, deep packet inspection technology
    
SonicWall
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2017
Changing demographics, labor shortages, and skill deficits are making it tough for recruiters in 2017. But all is not lost. Here are three big challenges—and three big solutions—to conquer talent acquisition in 2017.
Tags : 
recruiting, human resources, talent acquisition, demographic trends
    
Cornerstone OnDemand
Published By: SAS     Published Date: Nov 16, 2018
Instances of fraud have become commonplace in many industries, and it’s costing organizations millions of dollars annually and placing corporate brands at risk. But despite significant investments in staff and anti-fraud software, new and emerging fraud threats keep slipping through undetected. Why? Because it’s too costly to keep anti-fraud software current. Paying a vendor to make software changes dramatically increases total cost of ownership. This paper discusses how SAS addresses this challenge with next-generation fraud solutions like SAS Visual Investigator, a cloud-ready investigation and incident management platform that end users can easily configure and adapt to detect new and evolving types of fraud.
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, software development, it management, business technology
    
Cisco
Published By: Esker     Published Date: Dec 19, 2016
In today’s highly competitive business environment, many organizations are expanding through mergers and acquisitions (M&As). Unfortunately, success comes at a cost. Growth via M&A activity often involves absorbing disparate ERP applications, which, over time, can create significant inefficiencies — particularly in the accounts payable (AP) department. The good news is, AP automation is emerging as an end-to-end solution that forward-thinking organizations can use to eliminate AP-related silos and maximize their market potential. Businesses with a complex ERP environment have several choices when it comes to AP automation solutions. This white paper is intended to assist AP and finance leaders, along with ERP system administrators, in evaluating their options, simplifying the decision-making process, and getting the absolute most out of their AP automation investment.
Tags : 
    
Esker
Published By: SilverSky     Published Date: May 09, 2014
This paper provides an overview of the benefits of outsourced security solutions such as managed security services. The managed security services option saves money, improves the network security posture, and maximizes the efficiency of existing corporate resources.
Tags : 
silversky, business value, security services, the cloud, security conundrum, decrease threats, service providers, managed solutions, security solutions, it management
    
SilverSky
Published By: Oracle     Published Date: Nov 13, 2013
In a volatile and hyper-competitive market, delivering exceptional multichannel customer service consistently is essential. But delivering world-class service on tight budgets and to even tighter deadlines is a tough challenge for even the largest organizations. That’s why so many of the world’s most successful organizations choose to deliver customer service in the cloud. This eBook is a short introduction on how IT helps drive value for the business through cloud-based customer service solutions.
Tags : 
zenithoptimedia, oracle, customer service, the cloud, business benefits, it benefits, rightnow product focus, competitive market, flexibility, implmentation, high roi, mission-critical availability, global customer experience, reduce tco, redirect resources, empower it organization, enable innovation, internal resources, rightnow robust solution
    
Oracle
Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, data management
    
Cisco
Published By: Polycom     Published Date: Aug 16, 2017
"Learn how one organization with Polycom voice devices and Microsoft Office 365 realized a 109% risk-adjusted ROI and benefits of $1.6M over three years. By deploying Polycom voice solutions for Microsoft Office 365, an engineering firm was able to realize: $1.6M in total risk-adjusted benefits $1M in incremental revenue with more billable hours $537k in improved productivity $74k in phone purchase and installation cost savings $14k in employee relocation cost savings Learn more about the business benefits and cost savings attributed to Polycom voice solutions for Microsoft Office 365. The Total Economic Impact Of Polycom Solutions For Microsoft Office 365, a commissioned September 2016 study conducted by Forrester Consulting on behalf of Polycom and Microsoft."
Tags : 
polycom, roi report, cost savings, voice solutions, office 365
    
Polycom
Published By: Polycom     Published Date: Nov 30, 2017
Learn how one organization with Polycom voice devices and Microsoft Office 365 realized a 109% risk-adjusted ROI and benefits of $1.6M over three years. By deploying Polycom voice solutions for Microsoft Office 365, an engineering firm was able to realize: $1.6M in total risk-adjusted benefits $1M in incremental revenue with more billable hours $537k in improved productivity $74k in phone purchase and installation cost savings $14k in employee relocation cost savings Learn more about the business benefits and cost savings attributed to Polycom voice solutions for Microsoft Office 365. The Total Economic Impact Of Polycom Solutions For Microsoft Office 365, a commissioned September 2016 study conducted by Forrester Consulting on behalf of Polycom and Microsoft.
Tags : 
forrester, microsoft, polycom, communication integration, voice solutions, office 365, cloud pbx
    
Polycom
Published By: newrow_     Published Date: Jan 28, 2015
Watch this webinar today and enjoy some thoughts and ideas on how to keep your trainees engaged during a training session!
Tags : 
employee engagement, employee training, best practices, employee training programs, hr solutions
    
newrow_
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.