hr system

Results 376 - 400 of 578Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity, zero-day attacks, it systems, security, data security, resiliency layers, hardened assets, identification
    
Qualys
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security, trust zones, new access layer, high value targets, inspection offload, virtual ips, security management, threat coverage, ips platfrom, r&d servers, virtualized data centers, denial of service (dos), intrusion prevention system
    
HP
Published By: VMware AirWatch     Published Date: Nov 12, 2015
In letzter Zeit stellen Kunden immer häufiger die Frage, wie AirWatch Office 365 unterstützt. Viele fragen, ob AirWatch den Zugang zu Office 365 (O365) nicht nur auf ihren geschäftlichen Desktop-Systemen, sondern auch auf ihren Mobilgeräten steuern kann. Erfreulicherweise bietet AirWatch® by VMware® Organisationen enorme Unterstützung bei der Nutzung von O365 auf ihren Mobilgeräten. Unsere jüngste Integration mit VMware® Identity Manager bietet ein branchenerstes adaptives Zugriffskontroll-Framework, um zu gewährleisten, dass alle geschäftlichen Apps, einschließlich O365, nur auf konformen Geräten aufgerufen und verwaltet werden.
Tags : 
airwatch, emm, office365, cloud, networking, it management, knowledge management, data management, business technology
    
VMware AirWatch
Published By: Kronos     Published Date: Apr 15, 2015
Managing a rapidly evolving workforce with outdated tools and manual processes drags down HR. It saddles you with too many administrative tasks, and can keep you from focusing on what you do best: engaging with employees.If this sounds like your current reality, then it’s time to evaluate your workforce management system. Download this new eBook to learn:
Tags : 
workforce management system, fully automated, cloud based, manufacturers, timekeeping, payroll, streamlining, manual processes, business technology
    
Kronos
Published By: Skillsoft     Published Date: Oct 13, 2011
The IT department for Christiana Care Health Care Systems supports various projects throughout the health system that often require specialized training or expertise in particular IT areas, as well as project management skills. Following a recent reorganization and re-evaluation of job roles, the IT department needed to find a way to train existing staff quickly and cost-effectively to support various information technology needs.
Tags : 
skillsoft, technology, human resources, christiana care, health care systems, case study
    
Skillsoft
Published By: Skillsoft     Published Date: Oct 13, 2011
Christiana Care saw the need to provide consistent and ongoing leadership skills education to all of its managers. Existing leadership programs focused on newly hired or newly promoted managers, and consisted entirely of classroom training.
Tags : 
skillsoft, christiana care, health system, health care, leadership excellence, leadership programs, human resources
    
Skillsoft
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: Salesforce.com     Published Date: Apr 16, 2013
By 2014, smartphones and tablets will put power in the pockets of a billion global consumers, including your employees and partners and customers. However, mobile is not simply another device for IT to support with a shrunken website or a screen-scraped application. Rather, mobile is the visible manifestation of a much broader shift to systems of engagement that marry physical context and digital intelligence to deliver service directly into a person's hands. This shift will add value and take cost out of every business service, workflow process, and business application. But mobile engagement will also require wholesale changes to your app design, service delivery, IT skills, technology assets, and even your business model. This report lays out a vision for mobile engagement and introduces the strategic elements developed further in The CIO's Mobile Engagement playbook.
Tags : 
mobile, smartphones, tablets, engagement, experience, applications
    
Salesforce.com
Published By: Oracle     Published Date: Nov 27, 2013
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. In fact, 84% of HR organizations are currently looking at cloud alternatives, but the promise of the cloud can lead to fragmented, inflexible systems with limited functionality that result in inconsistent global HR processes. What’s more, HR IT has questions about key requirements like integration, data security, and performance.
Tags : 
cloud crm, technology, business needs, best practices, crm solution, solution at scale, sales, marketing, customer relationship management, pipeline, knowledge management
    
Oracle
Published By: IBM     Published Date: Nov 05, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security, intelligence index, cybercrime, risk threat, it risk, information systems
    
IBM
Published By: IBM     Published Date: Nov 05, 2014
How security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security, intelligence index, cybercrime, risk threat, it risk, information systems reputational risk, banking industry, company reputation
    
IBM
Published By: Oracle     Published Date: Jan 16, 2014
Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs, business activity monitoring
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs, business activity monitoring
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Oracle Talent Cloud was developed using a holistic approach, so HR leaders can manage everything from recruiting, compensation and goal and performance management to employee learning and talent review, in a single, cohesive SaaS-based system.
Tags : 
zenithoptimedia, oracle, talent management, talent cloud, human capital management, accelerating businesses, global technology, operational complexities increase, hcm solutions, manage growth globally, range of deployment, best talent management, talent management strategies, increase engagement, speed productivity, social and mobile capabilities, achieve operational efficiencies, hr data, lower operating costs, business activity monitoring
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle
Published By: Lumension     Published Date: Aug 25, 2014
Advanced Persistent Threat (APT) attacks exploit a single vulnerability and then use that foothold to penetrate more systems and gain access to more corporate information. A recent QuinStreet web seminar, sponsored by Lumension, discussed APT attacks and tactics for preventing them. This paper summarizes the talks given during that web seminar.
Tags : 
key tactics, apt, attacks, prevention, systems
    
Lumension
Published By: Globalscape     Published Date: Jul 31, 2014
Downtime happens and often at the worst time possible. Organizations experiencing downtime face direct and indirect costs from the loss of critical systems. This whitepaper discusses a Globalscape survey of 283 IT professionals and end users revealing the frequency of unplanned downtime, the effects on organizations, including average costs, and what IT administrators can do to minimize core system failure.
Tags : 
globalscape, downtime, productivity, it environments, critical systems, mission-critical systems, data loss prevention, security, load balancing, highly-scalable infrastructures
    
Globalscape
Published By: Success Factors     Published Date: Aug 19, 2014
Fragmented HR systems can prevent global companies from answering even basic questions about their employees – let alone manage a global workforce
Tags : 
successfactors, hr in the cloud, hr systems, global companies, talent management
    
Success Factors
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
This document outlines three core reasons why traditional AV no longer offers organizations any meaningful security value. Looking beyond the tangible staffing, operational, and licensing and support costs, the document highlights some of the hidden costs associated with operating an antivirus system that may be intangible, difficult to quantify, or unquestioned due to precedence.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Help your employees achieve their best with integrated, secure technology Thrive in a fast-changing digital world by giving your people the freedom and flexibility to be productive and work together from anywhere, while maintaining security and compliance. Discover how an integrated solution can deliver: Familiar productivity and collaboration tools System and device management Intelligent security The latest version of Windows for the enterprise
Tags : 
    
Microsoft Office 365
Published By: IBM     Published Date: Mar 28, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent analytics, kenexa talent insights, workforce science, talent insights
    
IBM
Start   Previous    16 17 18 19 20 21 22 23 24    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.