hr management

Results 451 - 475 of 965Sort Results By: Published Date | Title | Company Name
Published By: Veeam Software     Published Date: Nov 10, 2016
In this book, I explain in clear, concise language how virtualization changes an organization’s backup needs, and how traditional backup solutions will — or won’t — work with that technology. Then I tell you about a set of innovative solutions from Quantum that solve many of the problems inherent in virtual data protection.
Tags : 
virtualisation, vm data protection, threat and vulnerability management, data protection
    
Veeam Software
Published By: Quantum     Published Date: Nov 10, 2016
In this book, I explain in clear, concise language how virtualization changes an organization’s backup needs, and how traditional backup solutions will — or won’t — work with that technology. Then I tell you about a set of innovative solutions from Quantum that solve many of the problems inherent in virtual data protection.
Tags : 
virtualisation, vm data protection, threat and vulnerability management, data protection
    
Quantum
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture
    
ESET
Published By: Workday     Published Date: Sep 08, 2015
This report shows how each vendor fulfills the criteria and where they stand in relation to each other to help application development and delivery (AD&D) professionals and their HR business partners select the right SaaS vendor for their human resources management needs.
Tags : 
hr business, saas, saas vendor, hr systems, saas hr systems
    
Workday
Published By: Arcserve     Published Date: Jul 26, 2010
Using the CA Wily Application Performance Management (APM) solution consisting of CA Wily Introscope® and CA Wily Customer Experience Manager™, JN Data better manages Web applications through faster diagnosis of problem root causes in its customers' heterogeneous environments.
Tags : 
ca technologies, jn data, web application management, ca wily, application performance management, apm, customer experience manager, virtual server network, application development time
    
Arcserve
Published By: Ascentis     Published Date: Sep 28, 2010
HRIS solutions designed for very large organizations can be costly to set up and maintain, and often require the services of an army of consultants to keep them operational. Systems designed for very small organizations concentrate on either HR functions such as attendance and compensation, or on benefits management, but usually lack the ability to integrate the two areas. To be a practical investment choice for a mid-tier organization, a satisfactory HRIS solution must have its HR and benefits functions highly integrated. It must be agile so it can easily be kept aligned with the constant change in compliance laws, and it must be robust and secure, built on a tried and true platform foundation.
Tags : 
ascentis, open enrollment, benefits, automation, accuracy, self-service, human resources, errors, hris, insurance, hipaa, e-sign act, automated
    
Ascentis
Published By: HP     Published Date: Jul 29, 2008
This white paper explores the advantages of Operational ITSM- through incremental and continual improvement of service management practices on an ongoing basis. IT organizations must evolve into trusted service providers that adapt quickly, offer cost-effective, reliable, and flexible services to meet today's business initiatives. This evolution is not easy. It requires that the IT organization adopt an IT Service Management (ITSM) framework. Operational ITSM provides an incremental approach for companies that may not have the resources to finance and staff a large ITSM project.
Tags : 
itsm, service management, service level, service-level, itil, mission critical
    
HP
Published By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : 
dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment
    
Dell
Published By: Thomson Reuters     Published Date: Aug 27, 2010
In a time when consumers are in control of their content consumption, marketers need to integrate permission-based initiatives into their strategies. Learn how marketers are delivering original content through webinar programs to drive lead generation and customer relationship management.
Tags : 
tanberg
    
Thomson Reuters
Published By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: EMC Corporation     Published Date: Aug 05, 2014
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption, vulnerability
    
CREDANT Technologies
Published By: Epicor HCM     Published Date: Jun 07, 2012
In this Ventana Research report learn about the benefits to unifying your human capital management into one system and learn how to justify the investment. Simplifying Human Capital Management
Tags : 
epicor, hr. human resources, management, capital management, hr management
    
Epicor HCM
Published By: Ultimate Software     Published Date: Sep 14, 2012
Read this complimentary paper to discover the truth about SaaS in the cloud.
Tags : 
cloud computing, cloud technology, human resources, human capital management, cloud software delivery, saas
    
Ultimate Software
Published By: Ultimate Software     Published Date: Sep 14, 2012
Read about how you can up your game to make HR a more visible strategic player to drive your business.
Tags : 
human resources, business intelligence, human capital management, workforce management
    
Ultimate Software
Published By: Ultimate Software     Published Date: Sep 14, 2012
These are priority questions you should move to the top of your list. Use these must-ask questions as a checklist in your research. The answers wil guide you to pick the best HCM solution for the greatest value, effectiveness, and long-term use.
Tags : 
human resources, payroll, human capital management, saas, workforce management
    
Ultimate Software
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download white paper now to learn the challenges of physical consolidation, performance issues for virtualization and cloud security requirements.
Tags : 
trend micro, cloud security, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Tags : 
trend micro, enterprise security, forrester, roi, total economic impactt, web security, vendor management savings, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service, internet content security, smart protection network
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download the ESG white paper to help you identify: -Why virtualization should scare you -Security you didn't know existed -How to be confident in the cloud
Tags : 
trend micro, information security, virtualization, cloud, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : 
trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
    
Trend Micro Inc.
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.