hr organization

Results 726 - 750 of 1027Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Oct 09, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
When determining the best way to protect their applications and data on Amazon Web Services (AWS), organizations are often challenged by the high total cost of ownership and threat dwell times found in other security solutions. Armor can help your organization overcome these barriers and increase awareness of what is being deployed, and where, so you can better control your security policies. Attend our upcoming webinar to see how Armor helps customers reduce their time to market, accelerate development timeline, and gain quick, secure application access.
Tags : 
    
AWS
Published By: Mintigo     Published Date: Nov 20, 2017
Predictive Marketing is a fundamental shift in the way B2B companies engage buyers. In the first book of its kind, Mintigo CEO Jacob Shama explores how data science and AI enable marketers and sales reps to target, engage, and convert the most likely prospects with unparalleled precision. This ebook will guide you through the science, applications, and results of this new technology, and show you how to use it to empower your organization. Download now.
Tags : 
    
Mintigo
Published By: SAP     Published Date: Nov 22, 2011
Today, businesses must work smarter, not just harder-and to do it, they must use information to compete. With growing demands on data resources, companies need to derive greater value from their existing information. But this information is often scattered throughout the organization. To survive in the current tough economic environment means building successful enterprise information management strategies. Find out how.
Tags : 
ngenera insight, enterprise, success in tough times, business, economy, information management
    
SAP
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective
    
Centrify Corporation
Published By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : 
cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
    
IBM
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : 
data, gdpr, global, nationally, cybercriminals
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: SuccessFactors HR     Published Date: Feb 15, 2011
Let's face it - EVERYBODY hates performance reviews. For HR, it's just the beginning of the annual paper chase. Executives don't see value in typical reviews because they don't tie back to the organization's overall success. And, most employees see the whole process as busy work, without much real value.
Tags : 
successfactors, company-wide goal alignment, workforce, talent management, training, review, performance
    
SuccessFactors HR
Published By: SAS     Published Date: Mar 06, 2018
The Internet of Things enables retailers to do three basics better and faster: 1) Sensing who customers are and what they’re doing, 2) Understanding customer behavior and preferences, and 3)Acting on that insight to create a more engaging customer experience. - There are high-potential IoT applications in supply chain, in “smart store” operations, and especially in providing an engaging experience to the “connected customer.” IoT data can anticipate where the customer is headed and how to meet her there. - Much of the IoT ground, in both data management and analytics, may be unfamiliar. Retailers and their IT organizations have to be realistic about the technological challenges, their own capabilities, and where they need assistance. - To differentiate through IoT, focus on the analytics. Devices and their data — and even their platforms — are commodities. Advantage goes to the retailer who does the most with the data to engage the connected customer.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally. Learn more about key findings, including: Wider use of analytics, better knowledge of its benefits and greater focus on applications have reversed a trend on the benefits of analytics. Return on investment for analytics stems from the governing and sharing of data throughout the organization. Machine learning enables organizations to discover more insight from their data, allowing employees to focus on other critical responsibilities.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Today’s consumers expect immediate, personalized interactions. To meet these expectations, companies must differentiate their brands through timely, targeted and tailored customer experiences based on real-time data analytics. This report, sponsored by SAS, Intel and Accenture and conducted by Harvard Business Review Analytic Services, looks at how businesses are using advanced customer data analytics, along with real-time analytics and real-time marketing, to enhance their customers’ experiences. Learn why organizations that place a high value on real-time capabilities still struggle to achieve them, what companies can do to ensure success as they adopt and implement real-time analytics solutions, and what benefits successful companies are already seeing.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
A multitude of “things” generate floods of big data – cars, wearables, machines and appliances. Wouldn’t you like to sift through that noise and become an organization that relies on data to make fact-based decisions? Learn about the three foundations of becoming data-driven – data management, analytics and visualization – and how they can increase profitability, boost performance, raise market share and improve operations. Read about hurdles to becoming a data-driven organization and learn best practices from others. Then get a glimpse of what the future holds with the Internet of Things (IoT), edge analytics, artificial intelligence (AI) and other technology innovations.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Some organizations focus on the scary aspects of failing to comply with the EU General Data Protection Regulation. But there are many long-term benefits of following through with plans for sustainable GDPR compliance – such as gaining a competitive edge, or developing new products or services. To learn how organizations have approached compliance efforts, SAS conducted a global survey among 183 cross-industry businesspeople involved with GDPR. Based on the results, this e-book delves into the biggest opportunities and challenges faced. Read the e-book to: • Get advice from industry experts. • Find out what steps peers have taken. • Learn how an integrated approach from SAS can continue to guide your journey.
Tags : 
    
SAS
Published By: Qualys     Published Date: Jan 11, 2017
IT departments are overwhelmed by the abundance of vulnerabilities that continue to grow at a rapid pace every day. They struggle to identify the most critical threats they must address right away at any given point to protect their organizations from a compromise.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Symantec     Published Date: Mar 14, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
    
Symantec
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management
    
Qualys
Published By: uptime software     Published Date: Dec 06, 2007
Discover the three key reasons how enterprise IT dashboards can deliver highly valuable information to your organization in an easy to use format and provide simple processes that will turn dashboard data into actionable IT decisions.
Tags : 
server monitoring, monitoring tool, capacity planning, performance monitoring, service level management, service level agreement, sla, infrastructure, systems management, network management, uptime, server uptime, downtime, dashboarding, reporting
    
uptime software
Published By: Sunbelt Software     Published Date: Mar 27, 2008
Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses.
Tags : 
messaging, security, web threats, email threats, email security, spam, trojan, sunbelt
    
Sunbelt Software
Published By: WebEx Communications     Published Date: Dec 14, 2007
Those businesses that have actively fostered deployment of e-learning into all points of the enterprise are now in the enviable position of experiencing geometrically increasing levels of operational and strategic efficiency. And those corporate learning officers and training managers that went through the arduous process of developing a business case in support of e-learning are now key strategic players in their organizations.
Tags : 
e-training, etraining, e-learning, elearning, employee education, education, training, collaboration, webex
    
WebEx Communications
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This report looks at the challenges surrounding the new world of EHR technology and also details the measures that organizations need to start taking right now to prepare for the upcoming changes in the healthcare industry.
Tags : 
verisign, privacy, security requirements, electronic health records, ehrs, ehr technology, ssl certificates, authentication, symantec
    
VeriSign, Inc.
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.