hr management

Results 251 - 275 of 1007Sort Results By: Published Date | Title | Company Name
Published By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : 
apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
    
Dyn
Published By: Dyn     Published Date: Mar 30, 2016
New cloud-based Internet performance management (IPM) services are changing the way organizations monitor, control and optimize their online infrastructures. They fill the gap APM and NPM tools leave behind by providing valuable insights into the dynamics of the Internet so you can make better informed network planning and partnering decisions. The results, you deliver a consistent and reliable customer experience, protecting your brand and your revenue.
Tags : 
dyn, cloud, ipm, apm, npm
    
Dyn
Published By: Dynatrace     Published Date: Dec 16, 2015
Deciding which Application Performance Management platform is right for you can be a challenging task. The term Application Performance Management (APM) is thrown around pretty loosely these days and it can be difficult to isolate facts from marketing noise. However, there are some key considerations that will help you shortlist, evaluate, and select the best Application Performance Management solution for your unique needs.
Tags : 
dynatrace, research, application performance management, apm, platform
    
Dynatrace
Published By: Dynatrace     Published Date: May 24, 2016
This guide, compiled from numerous client interviews, best practices and real-life project experiences, will: - Walk you through tools like the Gartner Magic Quadrant - Provide organized criteria to evaluate vendor capabilities in detail - Define why these criteria matter - Give you an example of the typical evaluation process and timeline for an Application Performance Management buyer
Tags : 
dynatrace, vendor selection, gartner magic quadrant, application performance management
    
Dynatrace
Published By: E.ON     Published Date: Nov 21, 2018
Over three-quarters of UK manufacturers (77.8%) say that cost is the main driver behind their company’s energy policy, according to a survey of senior industry leaders conducted by Manufacturing Management in conjunction with E.ON. The survey, of nearly 50 leading UK manufacturers, examined the industry’s attitude to energy usage, the challenges it is facing and its plans for the future. To find out the results and the potential impacts to your business, download this whitepaper today.
Tags : 
    
E.ON
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: eG Innovations     Published Date: Jun 13, 2008
This EMA white paper investigates virtualization management issues in detail, outlining the key drivers and outcomes of virtualization, explaining critical inhibitors to virtualization success (and how to overcome them), and describing core virtualization performance management solution requirements. It also briefly describes one such solution, the eG Enterprise Suite, and includes a short case study highlighting this solution in action.
Tags : 
virtualization management, application performance management, it infrastructure management, root cause diagnostics, eg innovations, virtualization
    
eG Innovations
Published By: Egencia     Published Date: Jul 17, 2014
Demystifying Managed Travel
Tags : 
egencia, travel, human resources, webinar, travel management, crisis management
    
Egencia
Published By: EMC Corporation     Published Date: Mar 20, 2014
New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.
Tags : 
emc, big data, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis
    
EMC Corporation
Published By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: EMC Corporation     Published Date: Aug 05, 2014
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up-to-the-minute situational awareness and rapid data-driven security decisions. This means that large organizations have entered the era of data security analytics. Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Ensighten     Published Date: Aug 01, 2013
Empowering Optimization Through Tag Management Solutions
Tags : 
ensighten, marketing, roi, digital ecosystem, data management, enterprise agility, traditional marketing
    
Ensighten
Published By: Entelo     Published Date: Sep 06, 2017
We searched high and low to find every top recruiting and HR conference happening around the world between July and December of 2017. From London and Omaha, to Amsterdam and San Francisco, you'll find nearly 100 events to choose from. Inside you’ll find actionable intel to help you make informed, decisions about which conferences and events best fit your professional goals and organizational imperatives, including: The full rundown on conferences and meetups happening through the end of 2017, focused on recruiting, human resources, talent management, diversity and inclusion, and more Dates, locations, and cost breakdowns to make planning a cinch Keynote speakers and interesting sessions that we’ve got our eyes on Recommendations on who should attend each conference Which events Entelo will be attending, sponsoring or presenting Download your copy of the Ultimate Guide to start planning where you're headed this Summer and Fall!
Tags : 
    
Entelo
Published By: Entrust Datacard     Published Date: Feb 05, 2016
Given the finite lifespan of SSL certificates and their widespread use throughout an organization, there are numerous reasons to take a lifecycle management approach. It’s critical to maintain an accurate accounting of SSL certificates that doesn’t rely on manual processes and tools. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
    
Entrust Datacard
Published By: Epicor HCM     Published Date: Sep 20, 2011
Using a fully integrated HR system to streamline and improve overall operations can help companies become leaders in their respective industries. In this white paper, learn the steps to finding the right HRIS for your organization.
Tags : 
hris, hcm, technology, implementation, systems, performance management, epicor hcm, ivantage, spectrum, workforce management, talent management
    
Epicor HCM
Published By: Epicor HCM     Published Date: Jun 07, 2012
In this Ventana Research report learn about the benefits to unifying your human capital management into one system and learn how to justify the investment. Simplifying Human Capital Management
Tags : 
epicor, hr. human resources, management, capital management, hr management
    
Epicor HCM
Published By: Epicor HCM     Published Date: Jun 19, 2012
ith an HRIS, companies can align HR strategy with business objectives to get the most out of their workforces and adapt quickly to market changes. In this white paper, learn the steps to finding the right HRIS for your organization.
Tags : 
epicor, human resources, hr management, hris, business, hr strategy, business objectives
    
Epicor HCM
Published By: Epicor HCM     Published Date: Jun 19, 2012
In this Ventana Research report learn about the benefits to unifying your human capital management into one system and learn how to justify the investment.
Tags : 
epicor, human resources, hr management, capital management, business, hcm, compensation, benefits, performance
    
Epicor HCM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.