hr management

Results 1 - 25 of 934Sort Results By: Published Date | Title | Company Name
Published By: Sage     Published Date: Apr 19, 2019
The way we work has completely transformed. New technology is changing how, where and when we work. In this new landscape, businesses are facing challenges specific to growth, talent acquisition and productivity. Employers need to embrace new technology to get ahead in this new world of work, and put people at the heart of their strategy. However, HR and People leaders are in fierce competition for the all-important slice of budget, which makes it vital to build the strongest business case for technology investment. This guide is intended to help HR and People leaders like you get the financial support you need. You’ll get practical, effective tips on: • Understanding and explaining the true benefits of investing in a new HR system and the likely return on investment. • Positioning HR as a driver of change throughout your business. • Ensuring your HR vision aligns with the business strategy. • Getting management and key stakeholders to buy in. • Building the strongest business case pos
Tags : 
    
Sage
Published By: Red Hat     Published Date: Feb 22, 2019
Dieser Analysten-Bericht von IDC befasst sich mit der Herausforderung, vor der Kunden heute stehen: Sie müssen ein Gleichgewicht zwischen ihren Investitionen in die bestehende Infrastruktur sowie dem Ziel der Effizienzsteigerung und Modernisierung ihres Rechenzentrums finden. Gleichzeitig müssen sie neue technologische Entwicklungen und Bereitstellungstechniken nutzen, die erhebliche Verbesserungen der Entwicklerproduktivität und der betrieblichen Agilität sowie ein kostengünstigeres Lebenszyklusmanagement versprechen. IDC beschreibt die Möglichkeiten, die Kunden im Hinblick auf beide Ziele offenstehen: die Nutzung einer Infrastruktur, die bestehende und zukünftige Workloads unterstützt, und die Rolle, die Standardisierung und Modernisierung bei der erfolgreichen Betriebsoptimierung spielen.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we’ll walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we’ll walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
In today’s healthcare environments, new cyber vulnerabilities and risks open as fast as older ones get remedied. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution for stopping attackers that succeed in bypassing security controls.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, healthcare, advanced threat protection, apt, targeted attacks, network security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, illusive networks
    
Illusive Networks
Published By: HotSchedules     Published Date: Mar 28, 2019
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, we’re going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
    
HotSchedules
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Genesys     Published Date: Dec 20, 2018
Companies across the world are innovating with artificial intelligence (AI) to improve customer experience and forge deeper relationships with customers. Through surveys and interviews with 599 executives, from large and mid-sized companies across the globe, this MIT report reveals that most customer-centric firms have already deployed AI extensively in their customer-facing operations and customer experience management processes. Get the global report and regional spotlights on North America, Latin America, Europe and Asia to access complete results. Key insights include: • Nearly 90% of respondents report measurable improvements in the speed of complaint resolution; 80% note enhanced call volume processing using AI • 80% of respondents report measurable improvements in customer satisfaction, service delivery and contact center performance • In North America, 60% of the respondents believe they will deliver a 10% or more increase in customer lifetime value in the next year • Europe
Tags : 
    
Genesys
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : 
asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg
    
Mimecast
Published By: Neolane, Inc.     Published Date: Sep 17, 2010
With more than three decades in the hotel marketplace, Grupo Posadas operates more than 104 hotels and 19,042 rooms in 50 beach and city destinations in Mexico, Brazil, Argentina and Chile. It's brands include AQUA, Fiesta Americana Grand, Fiesta Americana, Lat 19°, Caesar Park and Caesar Business, making Posadas the leading Mexican hotel operator in Latin America. Posadas selected Neolane's enterprise marketing software to improve segmentation and deliver consistent, personalized customer communications across e-mail and direct mail channels, while streamlining campaign management within its loyalty programs.
Tags : 
neolane, grupo posadas, segmentation, loyalty, email, direct marketing, customer communications, loyalty
    
Neolane, Inc.
Published By: SuccessFactors     Published Date: Jun 21, 2012
Discover how you can leverage talent management processes to drive business execution.
Tags : 
human resources, talent management, business execution
    
SuccessFactors
Published By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : 
astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco
    
Astaro
Published By: goTransverse     Published Date: Oct 15, 2015
Billing is a key moment of truth for all businesses. Every interaction with the customer ultimately gets filtered through billing. It’s an endless combination of quotes, account creation, orders, pricing, payments, settlement and subscriber management. If your company is looking to evaluate billing and subscription management vendors, this paper covers five must-ask questions your peers wished they had uncovered before signing the contract.
Tags : 
    
goTransverse
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Published By: HPE Intel     Published Date: Jan 11, 2016
While flash storage can enhance the performance of your applications, there are three potential roadblocks to realizing the full value from a flash investment: • Storage network capacity • Storage architecture • Resiliency Vish Mulchand is Senior Director of Product Management and Marketing for Storage, Hewlett Packard Enterprise.
Tags : 
    
HPE Intel
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.