employee

Results 176 - 200 of 2564Sort Results By: Published Date | Title | Company Name
Published By: Unit4     Published Date: Feb 18, 2019
Looking to increase billable utilization for your project teams? While creating high levels of employee satisfaction? And avoiding talent burnout? The top five percent of professional services organizations (PSOs) are experiencing low levels of talent attrition, high levels of employee satisfaction, impressive billable staff utilization rates, and increased revenue from every employee, consultant, and project. Download this eGuide to discover how.
Tags : 
    
Unit4
Published By: Unit4     Published Date: Feb 18, 2019
Looking to buy a Professional Services Automation (PSA) solution? Learn how you can drive greater revenue and employee billable utilization across the whole business with this Buyer’s Guide. Providing an overview of the key trends, business processes, selection criteria, as well as the major business impact of PSA, it includes expert guidance to help project- and services-based businesses evaluate and choose PSA applications.
Tags : 
    
Unit4
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape Note: The report is in english.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Aug 17, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how…
Tags : 
windows 10, best practices, technology, data
    
Dell
Published By: Dell     Published Date: Aug 17, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel Core i5-6300U processor performed compared to previous generations.
Tags : 
technology, best practices, productivity, data, competitive advantage
    
Dell
Published By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : 
upgrade, principled technologies, mobility, windows 10
    
Dell
Published By: Dell     Published Date: Nov 15, 2016
Make your employees happier, increase their performance and reduce IT support costs by upgrading to a Latitude 5470. Dell partnered with Principled Technologies to create three productivity-based workflows to see how quickly the new Dell Latitude E5470 laptop powered by the latest 6th generation Intel® Core™ i5-6300U processor performed compared to previous generations. • Starting computer and programs is 33% faster • Opening/using several applications at one time is 29% faster • Preparing a video is 18% faster How do these substantial performance improvements pay for themselves and make your employees happier? Read on.
Tags : 
windows, processors, laptop, system information, intel core
    
Dell
Published By: Dell     Published Date: Feb 23, 2017
Millennials are reshaping the world of work through their knowledge of new technologies, work habits, and attitudes of the 21st-century workplace. At the same time, IT departments are working to add flexibility to the way they are supporting the Millennial worker. Yet it’s not just about IT providing the right tools and devices to its employees so they can get their jobs done effectively; IT needs to offer an overall workplace ecosystem that is secure and innovative. However, there are worrying gaps between what IT provides and what the different types of workers need.
Tags : 
workplace ecosystem, it management, it tools, workforce enablement, workplace productivity
    
Dell
Published By: Dell     Published Date: Feb 04, 2016
This infographic shows you how your organization’s lost laptop will not be compromised. That’s right, with Dell’s Data | Encryption unauthorized third parties can’t access your data. Within this infographic, learn how you and your employees can finally have the data protection you need.
Tags : 
    
Dell
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Remote access is important and growing, but how secure is it? IDC Research surveyed more than 300 IT professionals to gain insight into the specific threats and challenges faced by providing access to employees and third parties. Read this report to learn about: -How secure remote access really is -The complexity faced in implementing remote access -What happens when companies don’t have an access security solution -Why businesses must pivot from the common security mantra of “trust but verify” to “verify and never trust” in the new threat landscape
Tags : 
remote access, security
    
Akamai Technologies
Published By: Dell     Published Date: Nov 20, 2014
A rugged device is just one piece of a mobile solution for highly demanding environmental work environments. Support, security, and manageability will keep employees in the field, on the road, and in the harshest conditions. Download this whitepaper to learn more about how to find the right combination of rugged mobile notebooks and services to meet the demands of your end users.
Tags : 
durable devices, instantgo2, it protection, encryption
    
Dell
Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell
Published By: Dell     Published Date: Nov 20, 2014
Enterprises face more computing options than ever. This step-by-step guide explains how to choose whether a desktop, laptop, Ultrabook, tablet, convertible or all-in-one is the best choice for a particular employee.
Tags : 
form factor guide, mobility, computing options, mobility
    
Dell
Published By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : 
dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
    
Dell
Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell
Published By: TriNet     Published Date: Jan 17, 2012
HR is a necessity when you have employees. And what could be better than taking a set of duties - which although a necessity, are not a core competence - off your plate?
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, retirement, mutual funds, insurance, credit, taxes, mortgage/real estate, savings, marketing, capital, benefits, technology, finance
    
TriNet
Published By: TriNet     Published Date: Aug 02, 2012
The use of social media has exploded in the last several years.
Tags : 
social media, employee engagement, recruiting, facebook, linkedin, customer engagement, human resources
    
TriNet
Published By: TriNet     Published Date: Jan 17, 2012
HR is a necessity when you have employees. And what could be better than taking a set of duties - which although a necessity, are not a core competence - off your plate?
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure
    
TriNet
Published By: TriNet     Published Date: Aug 02, 2012
The use of social media has exploded in the last several years.
Tags : 
social media, employee engagement, recruiting, facebook, linkedin, customer engagement, human resources
    
TriNet
Published By: TriNet     Published Date: Nov 26, 2012
Download this white paper for insights on specific techniques startups and growing businesses can use to leverage the benefits and avoid the pitfalls of social media.
Tags : 
social media, employee engagement, social media policy, social networking
    
TriNet
Published By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
Plas Plastic Packaging in Turkey virtualizes IT, gaining return on investment in 12 months and helping employees save 10 working days a year.
Tags : 
dell, virtualization, ™poweredge ™servers, dell equallogic, plas plastic packaging
    
Dell Brought to you by Intel
Published By: Dell     Published Date: May 04, 2015
View this infographic for tips on how to lower IT costs and boost employee productivity for a competitive edge.
Tags : 
employee productivity, efficiency, repair, employee downtime, cost
    
Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.