Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

hr systems

Results 226 - 250 of 335Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: Salesforce.com     Published Date: Apr 16, 2013
By 2014, smartphones and tablets will put power in the pockets of a billion global consumers, including your employees and partners and customers. However, mobile is not simply another device for IT to support with a shrunken website or a screen-scraped application. Rather, mobile is the visible manifestation of a much broader shift to systems of engagement that marry physical context and digital intelligence to deliver service directly into a person's hands. This shift will add value and take cost out of every business service, workflow process, and business application. But mobile engagement will also require wholesale changes to your app design, service delivery, IT skills, technology assets, and even your business model. This report lays out a vision for mobile engagement and introduces the strategic elements developed further in The CIO's Mobile Engagement playbook.
Tags : 
mobile, smartphones, tablets, engagement, experience, applications
    
Salesforce.com
Published By: Oracle     Published Date: Nov 27, 2013
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. In fact, 84% of HR organizations are currently looking at cloud alternatives, but the promise of the cloud can lead to fragmented, inflexible systems with limited functionality that result in inconsistent global HR processes. What’s more, HR IT has questions about key requirements like integration, data security, and performance.
Tags : 
cloud crm, technology, business needs, best practices, crm solution, solution at scale, sales, marketing, customer relationship management, pipeline, enterprise applications
    
Oracle
Published By: IBM     Published Date: Nov 05, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security, intelligence index, cybercrime, risk threat, it risk, information systems
    
IBM
Published By: IBM     Published Date: Nov 05, 2014
How security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security, intelligence index, cybercrime, risk threat, it risk, information systems reputational risk, banking industry, company reputation
    
IBM
Published By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Today many HR organizations are struggling with systems that fall short when it comes to meeting the strategic demand for a talented and engaged workforce. This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle
Published By: Lumension     Published Date: Aug 25, 2014
Advanced Persistent Threat (APT) attacks exploit a single vulnerability and then use that foothold to penetrate more systems and gain access to more corporate information. A recent QuinStreet web seminar, sponsored by Lumension, discussed APT attacks and tactics for preventing them. This paper summarizes the talks given during that web seminar.
Tags : 
key tactics, apt, attacks, prevention, systems, security
    
Lumension
Published By: Success Factors     Published Date: Aug 19, 2014
Fragmented HR systems can prevent global companies from answering even basic questions about their employees – let alone manage a global workforce
Tags : 
successfactors, hr in the cloud, hr systems, global companies, talent management
    
Success Factors
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Security practitioners and threat actors are constantly developing new techniques to gain advantages over the other. In recent years, security teams have stepped up their approaches to protecting their infrastructure by fortifying their network perimeter defenses, building up protections against advanced malware, upgrading vulnerable operating systems, automating the delivery of patches to stop exploits, and developing counter-measures to spot intruders. The threat actors looking to circumvent these measures are shifting their attention toward the next weakest link in the security chain – the user.
Tags : 
    
Palo Alto Networks
Published By: IBM     Published Date: Mar 28, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent analytics, kenexa talent insights, workforce science, talent insights, human resource technology
    
IBM
Published By: IBM     Published Date: Jun 13, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting, talent acquisition technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Analytics has permeated, virtually, every department within an organization. It’s no longer a ‘nice to have’. It’s an organizational imperative. HR, specifically, collects a wealth of data; from recruiting applications, employee surveys, performance management data and it sits in systems that remain largely untapped. This data can help drive strategic decisions about your workforce. Analytic tools have, historically, been difficult to use and required heavy IT lifting in order to get the most out of them. What if an analytics system learned and continue to learn as it experienced new information, new scenarios, and new responses. This is referred to as Cognitive Computing and is key to providing an analytics system that is easy to use but extremely powerful.
Tags : 
ibm, talent acquisition, talent acquisition technology, human resources, recruiting, talent acquisition technology, human resource technology
    
IBM
Published By: Workday     Published Date: Nov 03, 2017
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business.
Tags : 
    
Workday
Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Hyper-complex production meets cognitive computing. Electronics manufacturing is surrounded by continuous complexity. Executives face rising resource costs in traditionally low-cost production markets. They must address increasing customization, shorter lead times, frequently changing requirements and shrinking order sizes – all while managing a sophisticated supply network. They need to examine automation potential and maintain critical institutional knowledge. Thinner margins and increased competition threaten consistent quality, risk greater downtime and reduce desired flexibility. Investments in new equipment and automation systems are increasing the amount of data available from the shop floor, but most is not used to its full potential. Now, cognitive manufacturing is transforming production to address such complexity.
Tags : 
cognitive manufacuring, electronics manufacturing, production transformation, automation systems, manufacturing
    
Group M_IBM Q1'18
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: GFI Software     Published Date: Feb 24, 2012
During this webcast, GFI Senior Threat Researcher Chris Boyd discussed:How to identify botnets in your systems, how to remediate botnet malware, how to maximize protection against botnets and how to educate users to prevent infections.
Tags : 
gfi software, technology, security, application security, anti virus, intrusion detection
    
GFI Software
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Published By: Numara Software     Published Date: Jul 16, 2009
Find out how Numara Track-It! can help you build better processes, manage organizational knowledge and solve problems quickly. Keep issues from falling through the cracks and efficiently manage help desk requests as well as other processes that require request management: • Optimize help desk efficiency with easy to use systems • Empower customers with self service • Improve productivity with automated alerts, notifications and assignments • Reduce diagnostic time with knowledge management • Reduce resolution time with asset and work order history
Tags : 
help desk, track it, numara, customer management, best practices, customer satisfaction, self service, knowledge management, asset, work order, request management, alerts, sla, service level agreement, performance evaluation, dashboard
    
Numara Software
Published By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan, infrastructure, ip networks, ip telephony, local area networking
    
Singtel
Published By: Micro Focus     Published Date: Sep 12, 2014
The corporate end-user community provides vital cogs in the wheel of a healthy organization. Users include the call centers, the retail assistants, the service desks, the sales offices and the people who deal with order processing. Yet many of these users are often faced with outdated user interfaces (UIs), and struggle to cope with the levels of efficiency and throughput needed. Worse still, these old systems typically only run on a connected terminal - or ‘green screen’ - but more and more these days, users need web and mobile access. Micro Focus Rumba+ dramatically improves business efficiency by providing a better user experience. It can also now be accessed from a variety of devices. Let’s take a look at five top reasons to move to Rumba+.
Tags : 
user experience, user interfaces, mainframe apps, business efficiency
    
Micro Focus
Published By: K2     Published Date: Jan 07, 2016
When driving any major change within an organization, strategy and execution are intrinsic to a project’s success. Nevertheless, closing the gap between strategy and execution remains a challenge for many organizations, as explored in a recent Process Excellence Network report: “Shift Business Excellence Into High Gear: Drive Strategic Performance Through Process Excellence.” Companies tend to focus more on execution than strategy for quick results, instead of taking the time needed to understand the parts that make up the whole, so the right execution plan can be put in place to deliver the best outcomes. A large part of closing this gap is understanding that business operations don’t fit neatly within the traditional organizational hierarchy. Business processes are often messy, collaborative efforts that span people, departments and systems, making them difficult to manage within a hierarchical structure. Business process management (BPM) helps by redefining an organization accordin
Tags : 
business transformation, organizational change, process excellence network, strategic performance, networking, software development, it management
    
K2
Published By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : 
tripwire, iso, iso 27001, security, compliance, comply, isms, information security
    
Tripwire
Published By: Unitrends     Published Date: Oct 30, 2015
Usability—much less beauty—was never a priority for backup and recovery software. All that mattered was that large and complex applications, usually diverse independent applications from multiple vendors, worked. As a result, IT staff spent countless hours slogging through poorly designed systems. But it doesn't have to be like this.
Tags : 
unitrends, backup software, recovery software, it staff solutions, it solutions, usability, it management, enterprise applications
    
Unitrends
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.