hr organization

Results 276 - 300 of 1006Sort Results By: Published Date | Title | Company Name
Published By: Taleo     Published Date: Dec 30, 2009
Integrated Talent Management: Improving Business Results through Visibility and Alignment: Research shows the vast majority of organizations have only achieved integration across two or more elements of talent management, those that have are reporting superior performance gains.
Tags : 
talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment
    
Taleo
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: Service Now     Published Date: Feb 15, 2017
ServiceNow shares this practical guide for using service management to simplify your HR delivery—the challenges it addresses, how it addresses them, how it can benefit your organization, and some easy ways to get started.
Tags : 
servicenow, service delivery, hr service delivery, service management
    
Service Now
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection
    
Sophos
Published By: Sophos     Published Date: Mar 30, 2017
Threats are becoming increasingly dynamic, forcing organizations to defend against both traditional malware and new advanced attacks. As a result, more and more organizations are making the switch to next-gen endpoint protection from Sophos to get the proven, innovative defense they need. Read this solution brief to learn how Sophos Next-Gen Endpoint Protection delivers the protection, usability and support required to stay ahead of the constantly evolving threat landscape.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Sophos
Published By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Sophos
Published By: Teradata     Published Date: May 02, 2017
Ventana’s Internet of Things (IoT) research found that the intention of organizations to embrace IoT and operational intelligence often outpace their current capabilities. Furthermore, most organizations are not ready to derive maximum value from IoT. This analyst report will take you through the Top 10 Best Practices for organizations considering how to engage with and best leverage IoT.
Tags : 
ventana, report, iot, operational intelligence, organizations
    
Teradata
Published By: IBM     Published Date: Nov 10, 2015
Ever since the publication of the War for Talent in 1997, the stakes for getting things right have been high…and they continue to be a top priority for CEOs. However, an over-reliance on traditional methods across critical human capital management processes may be limiting effectiveness.
Tags : 
ibm, human resources, human capital management, hiring
    
IBM
Published By: IBM     Published Date: Apr 19, 2016
The use of analytics will define the successful midmarket business of the next decade, just as it will define the successful larger organization in this information age. The past decade has seen rapid change in the business climates with an explosion of global competition and economic uncertainty. Despite this, many midmarket companies have thrived by using their size and agility as a competitive advantage. Certainly they have fewer resources than large corporations who are able to invest large sums in IT. However, small yachts can turn and adjust their course much quicker than large cruise ships. The same came be said for midmarket companies. The most successful organizations are ones that can react the quickest to changes in the market place. Midmarket companies can take advantage of their smaller size by being more agile and quicker to change, or even reinvent themselves, to respond to the market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, competitive advantage, midmarket organization
    
IBM
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape
    
Symantec
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
CA Technologies
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2014
RSA White Paper: As organizations rebalance their security defenses to combat today's sophisticated threats, they're recognizing that centralized incident response capabilities are key. This white paper discusses how organizations can assess and improve their incident response maturity. It also introduces RSA products and services, including RSA Security Analytics, that can help accelerate the maturity journey.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: Citrix Systems     Published Date: Sep 17, 2015
While the Google Chrome platform is ideal for accessing Google Apps, SaaS and other cloud-based services, Microsoft Windows applications continue to play an essential role in most organizations. Read this paper to learn more.
Tags : 
google chrome, windows, cloud, microsoft
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 25, 2016
This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat. It explains how the Citrix® NetScaler® application delivery controller (ADC) provides a robust yet highly affordable foundation for an organization’s DoS defenses. Benefits of the NetScaler solution include:
Tags : 
    
Citrix Systems
Published By: Teradata     Published Date: Jun 12, 2013
In March of 2011, CFO Research Services conducted a survey among more than 200 senior finance executives primarily in the United States to explore how well companies' information systems are supporting finance executives' ongoing efforts to transform the finance function into a value-added partner to the business. Especially in the aftermath of a worldwide recession, do CFOs and their staffs have the information they need to deliver real business value throughout the organization? How well equipped are they to provide the kinds of critical and useful business analytics that can drive the company forward? Download this paper to learn the findings of our research.
Tags : 
financial analytics, teradata, it complexity
    
Teradata
Published By: Teradata     Published Date: Jun 14, 2013
This paper explains how customer relationships can be threatened by lack of insight into their behaviors and preferences and how financial services organizations can use data analytics and customer-centric marketing to improve these relationships and drive business.
Tags : 
customer data analytics, data driven marketing, customer relationships, customer centric marketing
    
Teradata
Published By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
    
Delphix
Published By: Visier     Published Date: Jul 08, 2014
Global competition for talent, outsourcing labor, compliance legislation, remote workers, aging populations – these are just a few of the daunting challenges faced by HR organizations today. Yet the most commonly monitored workforce metrics do very little to deliver true insight into these topics. Leaders need to graduate from metrics to analytics, surfacing the important connections and patterns in their data to make better workforce decisions.
Tags : 
visier, workforce analytics, hr metrics, planning
    
Visier
Published By: Visier     Published Date: Nov 04, 2014
Read an industry report or blog post on hot HR trends and technologies today, and you are bound to see workforce analytics near the top. Analysts and commentators agree: workforce analytics has become a “must have” tool for HR and a key component of delivering business value. But how do you get started with this complex topic? By thinking through the first four steps, you can develop the requirements to support the fifth step: selecting the right workforce analytics solution for your organization. Download this white paper, Five Steps to Getting Started with Workforce Analytics, to find out how you can simplify and accelerate your journey from HR metrics to workforce analytics.
Tags : 
visier, workforce analytics, hr metrics, planning
    
Visier
Published By: Visier     Published Date: Nov 04, 2014
With workforce analytics, HR professionals can play a more pivotal role in their organizations to help direct senior management and hiring managers in connecting the dots between their company’s overall performance and their investment in their workforce. Workforce analytics empower HR professionals to shift from being an operational function to becoming more of a strategic role within their organization. Workforce analytics uncovers deep insights into workforce data by drilling down into the data and highlighting both patterns of success to be repeated and patterns of failure that could lead to risk and impact. Go from intuition- to fact-based workforce decision-making with this comprehensive guide to workforce analytics. This eBook includes advice on how to get started, tips to ensure successful implementation, and key recommendations for finding the right solution
Tags : 
visier, workforce analytics, hr metrics, planning
    
Visier
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.