employees

Results 576 - 600 of 1820Sort Results By: Published Date | Title | Company Name
Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
Innovative Identity and Access Management That Actually Makes Life Easier Empower employees, customers and partners with secure access to cloud and company apps on any device. Transform your enterprise security and centralize control of users and apps. OneLogin’s cloud identity management platform provides secure single sign-on, multi-factor authentication, directory integration with AD, LDAP and other external directories, user provisioning, endpoint management and more.
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
Corporate data spreads across an ever-growing number of applications. Users (employees, contractors, partners, and customers) access those applications over a wide range of devices. Those devices take different forms: desktops, laptops, tablets, smartphones, smartwatches. Each device may use a different operating system. The locations from where people access your data can be on-premises or off, and in any number of places around the globe. Data, users, apps, devices, locations—the sheer number of permutations and combinations is mind-boggling. This complex nature of today’s IT environment opens security gaps and exposes your business to undue risk. To illustrate, try to envision all the permutations and possible entry points for risk in your organization. Imagine that you have 400 users, each using 25 apps. When you multiply those together, that’s 10,000 potential access permissions to manage. Access permissions change as users come and go, roles change, new apps are added, and
Tags : 
    
OneLogin
Published By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
Over the past few years, terms such as: ‘Modern Finance,’ ‘Continuous Accounting’ and ‘Robotic Process Automation’ have all created buzz across the finance industry. These have been launched as a response to the challenges facing finance around attracting and retaining high quality employees, the rising risks due to the difficulty in certifying accurate data, today, and the expectation that finance has a role in driving the business forward.
Tags : 
account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software, adjusting journal entries, recuing journal entries
    
Trintech EMEA ABM Pilot
Published By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Thrill customers and empower employees with omni-channel, socially-infused digital experiences to drive better business outcomes IBM Customer Experience Suite features rich, integrated capabilities for managing web content, rich-media assets, real-time social communications, robust customer self-service capabilities, business analytics and mobile device delivery IBM Employee Experience Suite enables employees to easily find and share relevant information across multiple platforms, diverse geographies with multiple languages, and within the context of business applications
Tags : 
digital experience, ibm, software
    
Group M_IBM Q1'18
Published By: Group M_IBM Q418     Published Date: Sep 24, 2018
Take a look at the IT ecosystem of any company today and there’s a good chance you’ll find it includes offerings from several cloud services providers. That’s certainly the case at mid- to large-sized companies with at least 500 employees, according to a recent survey conducted by IDG Research. The survey of 100 senior IT professionals found that 59% are already multi-cloud adopters — that is, using computing and storage services from two or more cloud providers. Another 31% of respondents say they plan to become multi-cloud organizations in the coming 12-24 months, with only 10% still in the “consideration” phase.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 16, 2018
With digital and cloud transformation has come complexity—and disruption—when it comes to managing identities, access and the user experience. Employees need fast access to a wide range of applications The business needs to get those applications into their hands as quickly as possible. But IT needs to strengthen authentication and support secure access—while providing fast delivery.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
IT endpoint management used to be an easier game: Managers deployed user systems with custom images when employees were hired, and employees returned them on their last day at work. Even during deployment, users had minimal abilities to impact systems and devices that were centrally managed. Servers resided in physical data centers where they could be identified and accessed. Those were the days!
Tags : 
    
Group M_IBM Q418
Published By: OracleSMB     Published Date: Jan 04, 2018
Your HR group should focus on so much more than hiring, firing, and conflict resolution/management. It can play a huge role in the long-term success of your business. Why? Because every person and process involved in HR focuses on your company’s single greatest asset—your talented employees. A powerful HR function is vital to achieving business goals. Get started now; download this ebook and learn five ways to turn HR into a key driver of long-term success.
Tags : 
    
OracleSMB
Published By: OracleSMB     Published Date: Jan 04, 2018
Talent is the #1 concern of small and medium-sized business executives. In fact, it is keeping many of them up at night. These insomnia-inducing issues include: • Hiring an effective workforce • Creating competitive compensation and benefits packages • Retaining key talent • Providing opportunities for advancement The answer is to invest in the technology that allows you to invest in your employees. It can help you get talent acquisition right, design the right plans for the right people, and then measure and analyze results for continuous improvement.
Tags : 
    
OracleSMB
Published By: OracleSMB     Published Date: Jan 04, 2018
Growing companies need to hire and retain great employees. Survey after survey attributes keeping the right people in the right jobs with company longevity and profitability. However, with limited resources and low brand recognition, small and medium-sized businesses find it hard to compete. And they can’t afford hiring missteps or high levels of turnover. Therefore, you need act—now—to start adding value with every hire. Technology can help you recruit and retain the right way.
Tags : 
    
OracleSMB
Published By: First Advantage     Published Date: Apr 17, 2018
Download this whitepaper to learn crucial applicant insights and to see why background checks are necessary. Running a background check on a future resident is not only a smart idea, but can help protect your: Reputation Residents & Employees Property
Tags : 
    
First Advantage
Published By: First Advantage     Published Date: Apr 30, 2018
Know who you are hiring with these important background check stats and tips from First Advantage. Why background checks are necessary? Running a background check on a future employee is not only a smart idea, but can help protect your: reputation, customers & employees, business.
Tags : 
    
First Advantage
Published By: First Advantage     Published Date: Apr 30, 2018
Screening your company’s existing workforce can be a critical component in your overall security plan. But the process is far from simple—and is often intimidating. Learn from one company that has navigated the complexities, and consider their strategies to help you plan the process. Pre-employment background screening is now considered a standard practice in Corporate America. Very few companies, however, are crossing the threshold to conduct screens on their existing workforce. It’s a complex endeavor, and to be successful, companies need to walk a fine line between addressing legitimate business and security risks and not alienating employees along the way.
Tags : 
    
First Advantage
Published By: Cohesity     Published Date: Aug 24, 2018
WestLotto is Germany’s largest lottery provider and the control centre for the transnational lottery Eurojackpot including 18 European countries. The company has been in operation for more than 60 years. The 350 employees at the WestLotto headquarters in Münster look after more than 3,300 sales outlets and the internet gaming platform “westlotto.de”. These sales channels offer lottery products such as LOTTO 6aus49, instant lotteries and the Eurojackpot. In 2017, WestLotto processed nearly 187 million game transactions. Download this case study to find out how WestLotto reduced backup and recovery times by up to 98% with Cohesity’s hyperconverged secondary storage system.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 19, 2019
Piedmont HealthCare (PHC) is the largest physician-owned and directed multi-specialty medical group in North Carolina, providing comprehensive healthcare for the entire family. The provider has more than 50 locations throughout the state of North Carolina, with more than 200 physicians and providers, and over 1,000 employees. Piedmont HealthCare is headquartered in Statesville, North Carolina and is committed to deliver innovative medical care for the community across multiple specialties in three counties.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Mar 19, 2019
The City of Santa Barbara, California is located just 90 miles northwest of Los Angeles is the county seat of Santa Barbara County with a population of just over 90,000. Often referred to as the ‘American Riviera’, Santa Barbara is located between the Pacific Ocean and the Santa Ynez Mountains. Santa Barbara functions similar to a big city because it manages its own police and fire departments, city waterfront, and airport, managing an annual operating budget of just over $350M with approximately 1600 employees. The IT team supports all technology functions and operations for the City, including data backup and protection.
Tags : 
    
Cohesity
Published By: ServiceNow     Published Date: Sep 18, 2018
Worldpay deployed ServiceNow Performance Analytics to replace multiple data tools and promote the use of analytics throughout its organization for improved decision making. Nucleus found the project enabled the company to boost analyst productivity, while simultaneously increasing data accessibility and engagement for hundreds of additional employees. Download this case study to learn more
Tags : 
nucleus, research, worldpay, servicenow
    
ServiceNow
Published By: Menlo Security     Published Date: Jun 01, 2018
"Uncover the Business Impact of Managing Risky Web Content Download this white paper to learn: How to safely manage ""uncategorized"" websites when sites are unknown to the secure web gateway (SWG) policies, which are largely based on website categories, such as news, entertainment, weather, social media, etc. The cost implications of securing web content, including staffing, clean-up and risk mitigation Isolation - a new technique for malware prevention to maintain end user & IT staff productivity Administrators can either be lenient in allowing access to uncategorized sites, increasing malware risk, or deny access and deprive employees of necessary information. There are hidden costs to both approaches. "
Tags : 
    
Menlo Security
Published By: PwC     Published Date: Jun 03, 2019
Simple things. Smart connections. Big payoff. The IoT is transforming everyday objects into a vast ecosystem of information that will improve business operations. The tools you use to run your business are probably not communicating with each other. But what if they could? What if you could harness the power of connectivity and data to reduce costs, increase efficiency, and create better experiences for your customers, partners, and employees? In a recent survey, 81 percent of executives said the IoT is one of the most important technologies for their organization. Shouldn’t it be your company’s? Learn more in this report.
Tags : 
    
PwC
Published By: Ricoh     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
    
Ricoh
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Welcome to the multicloud era - SaaS apps in the cloud, public and hybrid clouds hosting infrastructure, employees and branches accessing the cloud and internet from anywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
We are renegades and realists who blend strategy, technology and creativity to tackle every client challenge. We imagine the businesses that will shape tomorrow’s world and help our clients make them real. We uncover insights from data that others can’t see and deliver progressive ideas through the use of IBM Design Thinking. We ground every strategy with a focus on delivering the ultimate experience – for customers, for employees, for shareholders. Everything we do drives measurable impact at scale. For more information, visit ibm.com/ibmix
Tags : 
    
Group M_IBM Q119
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.