hr system

Results 151 - 175 of 571Sort Results By: Published Date | Title | Company Name
Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Dec 09, 2016
This whitepaper lays out the landscape on potential threats, how the mobile ecosystem is changing, and what security investment looks like from here out.
Tags : 
    
Lookout
Published By: Abacus Labs     Published Date: Feb 01, 2019
“It’s not what you know. It’s who you know.” We’ve all heard the phrase. We all understand there’s truth to it. But ask yourself: would you recommend or hire everyone you know? No way. Having the right connections is important to advancing your career. But it’s only half the battle. What really creates opportunity is defining your personal brand to your employer, to your network, to the market. It’s taking that moment when you make a great impression and scaling it to the larger world. This guide presents different approaches real professionals are using to build their brands. You’ll see tips and strategies that you can use to become an in-demand finance leader, including a system we developed called the ROLE Model of personal branding. In the age of effortless connection, cultivating a personal brand is essential. It’s not just who you know. It’s what they know you can do.
Tags : 
    
Abacus Labs
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: Here Technologies     Published Date: May 14, 2019
Vehicle manufacturers stand poised to develop a new generation of onboard services and revenue streams that can be delivered through IVI systems. That’s why we’ve introducing HERE Navigation On Demand, the world's first SaaS connected navigation solution. It combines the integrated power of embedded navigation with the convenience and freshness of a mobile solution. Watch this joint webinar recording from HERE and ABI Research to understand how HERE Navigation On Demand can underpin a range of new digital services. Find out how HERE Navigation On Demand: Enables OEMs to create new location-based features that use over-the-air updates to remain fresh Reduces costs and simplifies the supply chain with an off-the-shelf solution that needs no infrastructure investment Enables an OEM to fully configure and brand the user experience – then deploy on any platform.
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: Sage People     Published Date: May 14, 2018
Compliance is one of the top challenges facing any payroll and HR department. It’s up to you to ensure that all personnel business practices follow current laws and that you are keeping proper records to document your company’s compliance. While an efficient payroll system can help to enhance employee moral and boost your reputation, mistakes in record-keeping and compliance can result in punitive penalties– even lawsuits. Of course, no business wants to expose itself to such financial and reputational risk. However, keeping up to date with payroll legislation can be a complex task. It’s reported that as many as one in three small businesses are penalised for incorrect payroll. To protect your company from costly fines and even litigation, you need to stay informed about employment laws, reporting rules, and changing workforce compliance issues. In this guide, we look at the challenges and the payroll solutions that will help your payroll department meet its compliance requirements wit
Tags : 
    
Sage People
Published By: Google Apigee     Published Date: Jun 12, 2018
How to move fast, delight customers, and continually innovate to thrive in today’s economy. APIs are much more than system integration technology. They are strategic assets that give companies the ability to adapt to changing customer needs and build breakthrough digital experiences. Google’s new eBook, The API Product Mindset, explains why leading companies now manage APIs as full-cycle products rather than one-time IT projects. Learn how to build a customer obsessed API team that delivers world-class developer experiences and ensures your APIs have enduring business value. Read case studies about how AccuWeather and Pitney Bowes have transformed their businesses with an API product mindset and learn from technology leaders at Magazine Luiza, Telestra and West Corp. What's Inside? ? Learn why APIs are how business gets done in today’s economy ? Get tips to build APIs that developers will love ? Discover why a product mindset is critical to business acceleration CTA: Download eBook
Tags : 
    
Google Apigee
Published By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
    
IBM
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This paper introduces a brief explanation of digital continuity and the opportunities and threats that it faces. The movement of product information to the digital domain in the 21st century has meant that we do not have physical items, like pieces of paper, which we can authenticate as being reliable information for decision making. Digital continuity is meant to remedy shortcomings of the digital environment by ensuring that information is unique, authoritative, current, and consistent, or more simply, has the characteristic of singularity. This paper includes: • Digital continuity within the Product Lifecycle • Digital continuity within manufacturing • Threats to digital continuity If we implement digital continuity correctly, we have all the advantages of the singularity of paper documents, but with the instantaneous and simultaneous ability to access the latest, updated information. Offered Free by: Dassault Systemes
Tags : 
    
Dassault Systèmes
Published By: KPMG     Published Date: Jul 11, 2018
The traditional IT organisation is struggling to meet the insatiable demand for new digital capabilities from business stakeholders. It’s time for a new IT operating model – ¬but what will it look like? Read this insight to find out: • what three new roles the future IT operating model must encompass • what new skills and positions will be required in the IT function • which integration needs the future IT function must address • what the priorities should be in terms of orchestrating the IT ecosystem. Read this insight now
Tags : 
    
KPMG
Published By: BMC Control M     Published Date: Jul 16, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management
    
BMC Control M
Published By: EMC Corporation     Published Date: May 27, 2014
Explore three key Cloud computing models—integrated infrastructure systems, reference architectures, and “build your own” solutions. See how EMC gives you the freedom to chose the optimal path to your private Cloud—and the solutions to support your deployment.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture, it management, data center
    
EMC Corporation
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Tags : 
fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution
    
Fortinet, Inc.
Published By: CareCloud     Published Date: Sep 23, 2014
CareCloud developed this guide to explain how technology turned one practice's profit uncertainty into a happier ending. Find out how. In this white paper you'll learn how to: • Earn the greatest potential ROI from your EHR system • Capture more money through revenue cycle management • Track profitability easier by focusing on 5 key numbers
Tags : 
carecloud, practice profitability, boost revenue, roi, ehr, financial success, tech investment
    
CareCloud
Published By: Oracle     Published Date: Jul 31, 2017
Migrating finance and HR systems to the cloud improves collaboration and saves more than expected. A recent global survey conducted by MIT Technology Review Custom—in partnership with Oracle—explores the motivations, benefits, and rewards that result from deploying finance and HR systems in the cloud.
Tags : 
    
Oracle
Published By: RSA Security     Published Date: Oct 24, 2013
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
rsa, emc, secuirty, warning, threat, analytics
    
RSA Security
Published By: HP     Published Date: Feb 02, 2015
In this study we compared the attributes of storage efficiency and ease of managing and monitoring an EMC VNX unified array versus an HP 3PAR StoreServ unified array. The approach we used was to setup two arrays side-by-side and recorded the actual complexity of managing each array for file and block access, per the documents and guides provided for each product. We also went through the exercise of sizing various arrays via publicly available configuration guides to see what the expected storage density efficiency would be for some typically configured systems. Our conclusion was nothing short of astonishment. Read this whitepaper to learn more.
Tags : 
    
HP
Published By: HP     Published Date: Feb 20, 2015
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
    
HP
Published By: Salesforce.com     Published Date: Jul 02, 2014
A well-executed "System of Engagement" strategy provides value to banks and customers. • Approximately 45% of bank customers today regularly interact with their institution through a mobile channel, with estimates of 70% within a few years. • Why it’s time to break down the System of Record and move to a System of Engagement. • How this shift can increase customer satisfaction and create new business opportunities. Download this white paper to get the full details on how a new approach to banking pays off for everyone.
Tags : 
salesforce, system of engagement, banking, increase customer satisfaction, mobile channel, system of record, knowledge management
    
Salesforce.com
Published By: HP     Published Date: Feb 02, 2015
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
    
HP
Published By: HP     Published Date: Feb 02, 2015
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
    
HP
Published By: HP     Published Date: Feb 11, 2015
In this study we compared the attributes of storage efficiency and ease of managing and monitoring an EMC VNX unified array versus an HP 3PAR StoreServ unified array. The approach we used was to setup two arrays side-by-side and recorded the actual complexity of managing each array for file and block access, per the documents and guides provided for each product. We also went through the exercise of sizing various arrays via publicly available configuration guides to see what the expected storage density efficiency would be for some typically configured systems. Our conclusion was nothing short of astonishment. Read this whitepaper to learn more.
Tags : 
    
HP
Published By: MarkLogic     Published Date: Jun 19, 2017
There is opportunity in the ongoing turbulence throughout the financial industry; however, regulatory and compliance challenges absorb resources and distract focus away from growth. Download white paper to learn about a smart approach to data and innovative tools that build resilience into a business looking to not just weather the storm, but seize the advantage. Overview: - Executive Summary - Challenges of Financial Markets Today - The Need for a 360-View of Data - How to Deliver: Increased Transparency Adapt to Evolving Regulations Improve Compliance and Lower Cost - Solution Architecture for Regulatory Reporting - Case Study: Adapting to Regulatory Complexity "Disparate systems led to frequent cycles spent correcting errors within the data”.
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: BitSight Technologies     Published Date: Feb 03, 2015
Download "Making Risk Management More Effective with Security Ratings" to learn how BitSight is revolutionizing the way organizations manage security risk throughout their ecosystem.
Tags : 
risk management, security ratings, compliance mandates, executive reporting, security risk assessments, it management, knowledge management
    
BitSight Technologies
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.