hr system

Results 351 - 375 of 580Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Apr 27, 2018
Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 27, 2018
Schicken Sie Ihre Alte Archivierungsslösung In Den Ruhestand White Paper Published By: Mimecast Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfähigkeit verschiedener E-Mail Security Lösungen. Der ESRA Report wird quartalsweise durchgeführt und auch der aktuelle Report stellt Lücken bei vielen Systemen im Schutz von Unternehmen gegen bösartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen über E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingänge der Benutzer übermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience für E-Mails erhöhen und mit einem mehrschichtigen Ansatz deutlich die Sicherheit für Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfähigkeit verschiedener E-Mail Security Lösungen. Der ESRA Report wird quartalsweise durchgeführt und auch der aktuelle Report stellt Lücken bei vielen Systemen im Schutz von Unternehmen gegen bösartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen über E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingänge der Benutzer übermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience für E-Mails erhöhen und mit einem mehrschichtigen Ansatz für Ihre Office 365 Umgebung deutlich die Sicherheit für Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfähigkeit verschiedener E-Mail Security Lösungen. Der ESRA Report wird quartalsweise durchgeführt und auch der aktuelle Report stellt Lücken bei vielen Systemen im Schutz von Unternehmen gegen bösartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen über E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingänge der Benutzer übermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience für E-Mails erhöhen und mit einem mehrschichtigen Ansatz deutlich die Sicherheit für Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: May 31, 2018
Not all email security systems perform the same. Lots of false negatives get through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of email security systems to uncover the number, type and severity of threats getting into organizations. - TOTAL CAUGHT SPAM: 14,277,163 - TOTAL CAUGHT DANGEROUS FILE TYPES: 9,992 - TOTAL CAUGHT MALWARE ATTACHMENTS: 12,502 Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss.
Tags : 
    
Mimecast
Published By: Mist Systems     Published Date: Jun 19, 2019
With a surge of 25,000 devices and counting, Dartmouth College needed its new Wi-Fi to be fast, reliable and as smart as its students. In response, Dartmouth, based in Hanover, N.H., began deploying new campus-wide Wi-Fi from Mist Systems last summer. It expects to complete the project throughout the campus in three to five years, according to Bryan Ward, a network engineer at Dartmouth. The IT department manages the Wi-Fi through a cloudbased wireless LAN and can already see the benefits of better coverage and easier management. But the team faced difficulties when embedding the new system with Dartmouth's centuries-old campus architecture, which is less supportive of campus-wide Wi-Fi than modern architecture. The following interview has been edited for length and clarity.
Tags : 
    
Mist Systems
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Apr 28, 2016
Die Freigabe von Windows 10 bietet mehr als nur neue Unternehmensfunktionen – es ist eine umfangreiche Überarbeitung des Betriebssystems, die die Verwandlung von Windows von einer PC-zentrierten zu einer modernen Unternehmensarchitektur beschleunigt. Mit Windows 10 kann die Unternehmens-IT sich von einer sicherheitsorientierten, eigenständigen Infrastruktur zugunsten einer modernen Unternehmensarchitektur mit hoher Produktivität, Sicherheit und einheitlicher Benutzererfahrung auf mehreren Geräten verabschieden.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: MobileIron     Published Date: Feb 14, 2019
Use Case Demo: -Layered security strategy of UEM + Threat Defense -Detects jailbroken and rooted devices, using a root tool Magisk, which is a system-less root
Tags : 
    
MobileIron
Published By: MuleSoft     Published Date: Oct 13, 2015
In partnering with the world’s leading financial services firms, we believe that there are three core legacy modernization drivers: aging back office systems, operational effectiveness, and open source adoption. In this whitepaper we address how each of these challenges is affecting the financial services industry, survey how organizations are responding, and propose best practices.
Tags : 
financial services, legacy modernization drivers, back office systems, operational effectiveness
    
MuleSoft
Published By: MuleSoft     Published Date: Jan 25, 2016
IT used to be so simple. Companies owned their own technology equipment and purchased enterprise licenses for many of the applications anybody in the organization might care to use. But then the cloud emerged, and mobile, and social media, and IoT; the world of IT has never been the same. Today's businesses are software-driven enterprises with technology capability distributed throughout the company, utilizing countless third-party cloud-based applications. This new organization requires an cultural shift in the IT organization. Read this whitepaper to learn: -How businesses can reorganize themselves into lightweight, agile, modular businesses able to respond to innovations in SaaS, mobile, and analytics -How to build a technological architecture that can accommodate new technology yet still extract value from on-premises systems -The advantages of an API-led connected architecture vs. old SOA approaches
Tags : 
technology, enterprise applications, best practices, business optimization, technology architecture
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
The market for financial services is changing fast. To evolve, banks are transforming their organizations into digital ecosystems using APIs. APIs have emerged as critical enablers to help financial services firms meet new consumer expectations. Through collaboration with fintechs, banks will use APIs to add new functionality from business partners and deliver internally-developed service offers to partner value chain and ecosystems. Read this whitepaper to learn more about the role of APIs and how this new ecosystem will allow banks to: Drive horizontal and vertical integration Foster a culture of collaboration Create new revenue streams and get solutions to market faster Deliver innovation and functionality to the business
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jun 18, 2019
More and more financial institutions are partnering with fintechs and leveraging Application Program Interfaces (APIs) to attract new prospects and to delight current consumers through unprecedented Customer Experience (CX). APIs offer a bridge between systems while paving a digital path to a connected financial ecosystem. The institutions that are able to drive this digital transformation successfully, do not think of these capabilities as additional channels and services. Rather, these institutions understand that they must move from a vision of banking as a physical network of branches and ATMs, to a digital platform, comprising core capabilities such as account servicing and the provision of financial products that can be accessed wherever, and whenever, customers wish. Join this webinar and learn how these institutions are building a digital banking platform with APIs. Presented by: Angie Campos, Industry Marketing for FS&I, MuleSoft Michel Vaja, Head of UK Payments Practice, C
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jun 18, 2019
Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up? The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge. During this session, you will learn: Why industry disruptions and increased customer expectations demand a bank that transforms into a digital platform. How an API-led approach to integration can help financial firms transform into digital platforms. SunTrust’s journey with MuleSoft’s Anypoint Platform and Salesf
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
In today’s digitally disrupted economy, organizations across industries face competition at unparalleled heights. As a result, differentiation through business automation has become synonymous with convenience and speed. However, since the technology landscape is changing at an increasing pace, business automation shouldn’t be thought of as a one-time, centralized effort in a discrete process. Rather, organizations should view business automation as a way to decentralize access to systems and enable the broader organization. Download this whitepaper to learn: The value of business automation Why traditional approaches to business automation – such as custom code, implementing standalone solutions, or using point-to-point connections – do not suffice. The benefits of an API-led approach to business automation. How organizations like Wells Fargo, the State of Colorado, Tic:Toc, and Addison Lee achieved business automation success using APIs.
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jun 27, 2019
As the leading CRM system, Salesforce can accelerate and increase sales, enhance customer loyalty, and grow marketing capabilities. But how can businesses extend Salesforce to streamline business processes and maximize services and solutions? Effective and efficient integration of Salesforce with adjacent enterprise systems — such as databases, ERP and CRM systems, and custom applications — is critical to enabling sales teams, increasing revenue, and better serving customers. Across the broad spectrum of Salesforce integration needs, patterns emerge for how to best address integration challenges. Integration patterns are the most logical sequence of steps to solving a specific type of integration problem. Learn how to synchronize CRM systems, migrate from legacy CRM systems, broadcast ERP data into your CRM system, and more. Download the whitepaper now.
Tags : 
    
MuleSoft
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Published By: NetApp     Published Date: Jun 03, 2016
Enterprise applications are the lifeblood of IT. We rely on them for everything from optimizing manufacturing to tracking customer satisfaction. This paper examines the criteria for selecting flash storage in support of enterprise applications and makes recommendations based on the strengths of each flash system. Explore how to align enterprise application performance, management, and growth with business priorities through the use of connected flash storage systems.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Jun 27, 2016
Enterprise applications are the lifeblood of IT. We rely on them for everything from optimizing manufacturing to tracking customer satisfaction. This paper examines the criteria for selecting flash storage in support of enterprise applications and makes recommendations based on the strengths of each flash system. Explore how to align enterprise application performance, management, and growth with business priorities through the use of connected flash storage systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Netsuite     Published Date: Sep 06, 2017
Moving your company to the cloud allows for more efficient and effective business operations—essential for growing an organization. Companies plagued by inaccurate, out of date information can instead get real-time access to critical business data anywhere. NetSuite has worked with businesses across all industries to guide them through the many phases of growth, from start-up to ramp up to IPO. Learn how to overcome the five obstacles to successful growth and why NetSuite will be the last business system you will ever need.
Tags : 
    
Netsuite
Published By: Netwrix     Published Date: Apr 22, 2008
Password practices that improve security are by their nature burdensome to the user, resulting in passwords difficult to remember which are often changed about the same time they have finally become memorized. Yet password security remains a cornerstone of system security: as much as 80% of security breaches take place not through arcane hacking and virus attacks, but through system infiltration facilitated by use of a password.
Tags : 
netwrix, authentication, passwords, password management, identity theft, fraud, login
    
Netwrix
Published By: NewField IT     Published Date: Aug 19, 2008
The uninhibited flow of information within today's business environment has become a prerequisite of an organization's success and smooth operation. But within every organization, some of that information will be sensitive, and ensuring its safekeeping involves a comprehensive security policy. Like water coursing through a pressurized system, information has an unnerving habit of 'leaking' out through unchecked weak spots which have been identified and exploited by unscrupulous individuals.
Tags : 
knowledge management
    
NewField IT
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.