hr organization

Results 251 - 275 of 1014Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
    
IBM
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : 
identity governance, security threats, user access, cloud security, identity management
    
IBM
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
You’re aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations.
Tags : 
malware threats, cyberespionage, security technologies
    
Kaspersky Lab
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it's imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : 
it security, cyber threats, threat detection
    
Kaspersky Lab
Published By: Bazaarvoice     Published Date: Oct 15, 2012
Charles Schwab understands that customers make their best marketers - the financial service firm acquires 40% of its new business through customer referrals. Charles Schwab shares best practices that can guide organizations to invest in social.
Tags : 
forrester, customer acquisition, reviews, social, opinions, transparency
    
Bazaarvoice
Published By: EMC Corporation     Published Date: Jul 07, 2013
Forward-looking enterprises know there's more to big data than strong and managing large volumes of information. Big data presents an opportunity to leverage analytics and experiment with all available data to derive value never before possible with traditional business intelligence and data warehouse platforms. Through a modern, big data platform that facilitates self-service and collaborative analytics across all data, organizations become more agile and are able to innovate in new ways.
Tags : 
enterprises, storage, information management, technology, platform, big data analytics, emc, self service
    
EMC Corporation
Published By: Adaptive Planning     Published Date: Dec 05, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A. You will hear case studies describing how leading nonprofits worldwide have been able to move beyond Excel and save time, enhance collaboration, and improve decisions - ultimately resulting in better managed, more successful organizations.
Tags : 
finance, fund reporting, cip reporting, business, personnel reporting, adaptive planning
    
Adaptive Planning
Published By: Esker     Published Date: Dec 19, 2016
There is a noticeable shift occurring in the world of order management. Traditionally, projects related to order-taking were spearheaded by the customer service department. Not anymore. The pressures of today’s global economy have forced supply chain functions to play a more direct and strategic role in reducing costs, improving the customer experience, and driving added value throughout the organization. Naturally, supply chain leaders now have a significantly higher rate of interest and involvement in order management initiatives. Supply chain leaders work in a competitive environment, and in order to get ahead of the competition, they are increasingly turning to order processing automation solutions. Find out the four key reasons automation is emerging in the supply chain. Download now!
Tags : 
    
Esker
Published By: Workday     Published Date: Mar 02, 2018
The world of work is changing. How do you change with it? Join HBR and Patty McCord, former chief talent officer of Netflix, to learn innovative ways to take on the new world of work.
Tags : 
world of work, change, innovative, hbr
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
In this five-episode video series, Jason Averbook shows you the ins and outs of workforce technology and how to use it to achieve HR success. Watch the series to learn ways to develop a digital HR strategy, get executive buy-in, and maintain success.
Tags : 
workforce technology, hr success, digital hr strategy, maintaining success, executive buy-in
    
Workday
Published By: Workday     Published Date: Mar 05, 2018
Ready to reshape the future of work? Watch this video series to learn how you can use workforce technology to transform your organization. After viewing the series, you’ll know how to develop a digital HR strategy, get executive buy-in, and maintain success.
Tags : 
workforce technology, digital hr strategy, success
    
Workday
Published By: Workday     Published Date: Mar 05, 2018
The world of work is changing. How do you change with it? Join HBR and Patty McCord, former chief talent officer of Netflix, to learn innovative ways to take on the new world of work.
Tags : 
future ready, new world, power
    
Workday
Published By: Workday     Published Date: May 09, 2018
Operating finance and HR in silos leaves your organization with incomplete data, inconsistent metrics, and strategic uncertainty. Fortunately, you don’t have to settle for silos. Read this whitepaper to learn eight key benefits of bringing finance and HR together in one system.
Tags : 
    
Workday
Published By: CDW     Published Date: Nov 12, 2012
Your server room's climate is burning through your budget, we get it. CDW has helped many organizations get control of their data centers with an energy-efficient power and cooling strategy.
Tags : 
power and cooling, data centers, server room, cooling strategy
    
CDW
Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your network firewall team. Resource optimization involves the automation and streamlining of operational processes and management workflows so that your IT team members can be freed up to focus their time, skills, and expertise on priority projects. Furthermore, optimizing your resources helps preserve your budget while eliminating budgetary conflicts and slashing administrative costs.
Tags : 
network security, it security, firewall, resource optimization, security management
    
McAfee
Published By: Mimecast     Published Date: Aug 14, 2017
Not all email security systems perform the same. Lots of false negatives get let through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of incumbent email security systems to uncover the number, type and severity of threats getting into organizations. Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss. Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems like Symantec miss.
Tags : 
mimecast, symantec email security, esra, message labs
    
Mimecast
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Mimecast     Published Date: Jan 19, 2018
The importance of information security and data protection is growing by the day for organizations. This is due to an evolving threat landscape and a higher adoption of internet dependent services, which, in the process of creating new opportunities, also lead to more vulnerabilities. As a consequence, national and international regulations are also changing according to the new challenges, calling for better preparedness. The new BCI Information Security Report 2017 sponsored by Mimecast looks to benchmark how organizations handle sensitive data and how resilient organizations are when it comes to data protection.
Tags : 
bci information, security and data protection, security report, data protection
    
Mimecast
Published By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
    
Mimecast
Published By: Rackspace     Published Date: Apr 17, 2018
Read this blog to see how larger enterprises are modernizing their infrastructure. Specifically, three tips to reduce risk and complexity that accompanies such efforts: Adopt tooling and prioritize automation Make sure operations has a seat at the table Adapt and update IT policies While those might sound obvious, it’s remarkable how many organizations attempt short cuts that almost inevitably lead to early failure. Read this blog to learn more!
Tags : 
    
Rackspace
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
HR organizations that don’t use social collaboration risk losing candidates, employees and competitive advantage. Are you at risk?
Tags : 
    
Oracle HCM Cloud
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
HR organizations at colleges and universities are increasingly viewed as agents of change. A modern HR organization strategically aligns the right technology with needs of faculty and staff to deliver great student and employee experiences. Find out how.
Tags : 
    
Oracle HCM Cloud
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
According to recent research, a third of all organizations are likely to upgrade their core HR solution within the next three years. Is your organization one of them? Are you prepared for the changeover? To start, ask your team 6 key questions.
Tags : 
    
Oracle HCM Cloud
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.