hr organization

Results 326 - 350 of 1011Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Apr 12, 2017
Read The Total Economic Impact™ of ServiceNow, an April 2017 commissioned study conducted by Forrester Consulting on behalf of ServiceNow, to understand the benefits, costs, and risks associated with the following ServiceNow solutions: IT Service Management, IT Operations Management, and Performance Analytics. The study, commissioned by ServiceNow, covers key findings in these three categories: Modernizing IT Service Management Eliminating Service Outages Optimizing Performance with Real?time Analytics Forrester interviewed seven current ServiceNow customers with years of experience using the solutions identified above. The purpose of the study is to provide potential customers with a framework to evaluate the real world customer experience and economic impact of the Now platform on their organizations.
Tags : 
operations management, performance analytics, it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management, service, automation, productivity, infrastructure
    
ServiceNow
Published By: Sitrion     Published Date: Oct 05, 2016
Investing in HR technology is an important first step in modernizing your human resources organization. Making that technology work in real time on employee’s mobile devices will boost engagement, productivity and retention. Download this how-to guide to learn more.
Tags : 
    
Sitrion
Published By: Sitrion     Published Date: Oct 05, 2016
In a recent poll, 65% of HR executives said they wanted to play a more strategic role in their organizations. So, what’s standing in their way? Work! The harsh reality is that HR spends 70-80% of its time on low-value, administrative tasks. This is why the first step in transforming human resources is getting rid of tedious and time consuming processes. Download this white paper to learn how personal mobile devices are transforming Human Resources.
Tags : 
    
Sitrion
Published By: IBM     Published Date: Jul 05, 2016
The use of analytics will define the successful midmarket business of the next decade, just as it will define the successful larger organization in this information age. The past decade has seen rapid change in the business climates with an explosion of global competition and economic uncertainty. Despite this, many midmarket companies have thrived by using their size and agility as a competitive advantage. Certainly they have fewer resources than large corporations who are able to invest large sums in IT. However, small yachts can turn and adjust their course much quicker than large cruise ships. The same came be said for midmarket companies. The most successful organizations are ones that can react the quickest to changes in the market place. Midmarket companies can take advantage of their smaller size by being more agile and quicker to change, or even reinvent themselve
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, competitive advantage, midmarket organization
    
IBM
Published By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
    
AWS
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Compiling a cloud services comparison is a daunting task in the rapidlyevolving cloud environment. There are thousands of cloud services, dozens of cloud service providers, and numerous Infrastructure-as-aService (IaaS) providers offering pay-as-you-go pricing models—each one frequently changing and upgrading their portfolios. We have chosen to limit our cloud services comparison to the top three IaaS providers providing service in the Western Hemisphere—Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)—because, not only are these the IaaS providers most organizations are familiar with, they are also the IaaS providers whose services most organizations are likely to compare. This eBook provides an introduction to the range of services offered by the leading cloud service providers, information on regions and availability zones, a breakdown of cloud storage services, and more, to help inform you on your multicloud journey.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Traditional antivirus (AV) is not the solution to preventing security breaches on the endpoint – it is the problem. AV is no longer effective at stopping today’s cyberthreats. Although AV satisfies many regulatory, governance and compliance requirements, it saddles organizations with hidden costs while providing little to no real security value.
Tags : 
palo alto, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
SaaS applications continue to provide a tremendous value to end users with easy setup and collaboration capabilities that are changing the way organizations do business. The concern over the loss of data leaving the corporate network and opening the network to external threats through unknown collaborators has caused many organizations to take a "wait and see" approach to SaaS. Microsoft® Office 365™ changes all that.
Tags : 
palo alto, saas, data, microsoft office, security
    
Palo Alto Networks
Published By: IBM     Published Date: Jan 11, 2017
Download this eBook to learn: - How the use of advanced analytics generates powerful insights to stay ahead of evolving cyber threats - Why Cyber Threat Analysis is the most effective defensive strategy - How analysts benefit from the use of sophisticated data visualization to identify hidden threat relationships and patterns - Why shifting from attack prevention to mitigation is a more practical goal for commercial organizations
Tags : 
ibm, analytics, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: IBM     Published Date: Aug 24, 2017
Data governance is all about managing data, by revising that data to standardize it and bring consistency to the way it is used across numerous business initiatives. What’s more, data governance ensures that critical data is available at the right time to the right person, in a standardized and reliable form. A benefit that fuels better organization of business operations, resulting in improved productivity and efficiency of that organization. Thus, the importance of proper data governance cannot be understated. The concepts of data governance have evolved, where the first iteration of data governance, often referred to as version 1.0, focused on three simplistic elements: objectives, structure and processes; having a limited focus and scope due to its tactical usage. The opportunity from the growing value of data in the realm of analytics, business intelligence, and generating insights was left unrealized. Today, organizations are moving towards what can be called Data Governance 2.0,
Tags : 
ibm, unified governance strategy, data management, data governance
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted?
Tags : 
cloud computing, digital economy, digital disruption, business operations
    
IBM
Published By: CrowdStrike     Published Date: Aug 01, 2017
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider,to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.Before initiating a change from your current AV solution read this guide to learn:?How to plan an AV replacement project and the critical elements to consider ?How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions?What prevalent technologies are available and what are the pros and cons of each??How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results?Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Feb 05, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries,investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence, Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security pos
Tags : 
    
CrowdStrike
Published By: Oracle     Published Date: Feb 22, 2019
Successful digital business depends on fast, reliable,and secure applications. Threats of service disruptions from performance slow downs, availability outages, or security incidents are driving IT organizations and service providers to double down on comprehensive system management solutions across infrastructure, applications, and end-user devices.
Tags : 
    
Oracle
Published By: FinancialForce     Published Date: Aug 20, 2019
Grow your business with a customer-centric ERP solution Align your sales, services, finance and HR teams with our cloud-based ERP on Salesforce. You’ll connect back-office functions to the front-office and create a single unified voice across your organization. Everyone benefits: Customers, Employees, Leaders and IT. One customer record for CRM and ERP apps Seamless opportunity to cash process Eliminates errors between the front and back office Act as one company, not five departments
Tags : 
    
FinancialForce
Published By: OneLogin     Published Date: Oct 24, 2017
We’re living through a time where people, organizations and societies not only rely but thrive upon secure, simple and fast access to information. From small businesses, startups, enterprises and global conglomerates across all verticals; to local, state and federal governments; to educational institutions and nonprofits, we are continuously investing in our employees, devices, applications, networks and infrastructure that enable us to drive our collective missions forward. Ten years ago, business and technology leaders catalyzed a cloud app revolution that has changed the way organizations manage IT. However, through this transformative shift, the core requirements of IT remain the same. Technology leaders are responsible for ensuring that 1) information assets remain confidential and protected, 2) information systems are available and operational, and 3) people are empowered and productive with the apps and information they need. IAM is a technology and security discipline that has
Tags : 
    
OneLogin
Published By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
Typically, Shared Services Center (SSCs) automation initiatives have been undertaken to reduce costs and improve efficiency. These goals are achieved relatively easily within the first few years, most immediately through reduced labor costs and centralized activities. In fact, standardization and centralization deliver up to 50% savings. During subsequent phases, technology automation and outsourcing cut costs further. But, if cost reduction is the only clearly defined goal, organizations will reach a point of diminishing returns.
Tags : 
account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software, adjusting journal entries, recuing journal entries
    
Trintech EMEA ABM Pilot
Published By: IBM     Published Date: Jun 04, 2018
"What would you do if you didn’t have to rely on disparate analytics solutions to meet the needs of business users while following the rules of IT? View this 'Charting Your Analytical Future' webinar to learn about a world of innovation and independence for users that does not limit the confidence and controls of IT. With the cognitive-guided self-service features available in IBM business analytics solutions, more users than ever before can get the answers they need. Next-generation business analytics capabilities make it possible to access relevant data, prepare it for analysis and understand performance. But it doesn’t stop there. Users can package the results in a visually-appealing format and share them throughout the organization. Don’t miss this opportunity to hear how you can: * Benefit from advanced analytics without the complexity * Operationalize insights and dashboards from a collection of trusted data sources * Tell your story with rich visualizations and geospati
Tags : 
business analytics, analytics solutions
    
IBM
Published By: IBM     Published Date: May 30, 2018
If you are relying on a basic log manager or spreadsheets to manage security alerts, you may be missing critical threats in your network. You could boost your team's productivity with a modern SIEM platform. In this E-Book, you will learn the five most critical questions that you need to ask in order to determine the best security analytics solution for your organization.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Nov 01, 2018
Organizations globally realize that working only to prevent and detect cyberattacks will not protect them against cyber security threats. That is why IBM Resilient® was developed: to arm security teams with a platform for managing, coordinating, and streamlining incident response (IR) processes. IBM Security has had the privilege of working with organizations of all sizes and across all industries as they implement Resilient solutions to develop more sophisticated and robust incident response functions. These organizations build IR processes that are consistent, repeatable, and measurable, rather than ad hoc. They make communication, coordination, and collaboration an organization-wide priority. They leverage technology that empowers the response team to do their job faster and more accurately
Tags : 
    
Group M_IBM Q418
Published By: TrendKite     Published Date: Apr 25, 2018
This informative whitepaper that will help shape your PR decision making. Stats include: 43% of web traffic is driven by search engines 7 in 10 executives reported being more inclined to do business through organizations that are thought leaders Influencer campaigns did not exist 5 years ago...now brands swear by them Download now to learn more!
Tags : 
pr strategy, marketing, digital age
    
TrendKite
Published By: ServiceNow     Published Date: Sep 18, 2018
Worldpay deployed ServiceNow Performance Analytics to replace multiple data tools and promote the use of analytics throughout its organization for improved decision making. Nucleus found the project enabled the company to boost analyst productivity, while simultaneously increasing data accessibility and engagement for hundreds of additional employees. Download this case study to learn more
Tags : 
nucleus, research, worldpay, servicenow
    
ServiceNow
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.