hr management

Results 526 - 550 of 985Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
Information security based on regulatory compliance stipulations cannot keep up with today’s sophisticated and rapidly changing threat landscape. CISOs need to implement a new discipline that ESG calls, “Real-time Risk Management."
Tags : 
enterprise strategy group, esg, jon oltsik, real-time risk management, threats and vulnerabilities
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
It’s a critical time for security efforts to move beyond the traditional software operating stack and monitor operations from a new vantage point closer to, and within, the hardware level.
Tags : 
rootkits, kernel-mode malware, malware signatures, operating system level heuristics, kernel-mode rootkits, user-mode rootkits, koutodoor, tdss
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption
    
McAfee
Published By: McAfee     Published Date: Apr 16, 2014
Why, when and how to re-evaluate your SIEM. Two years after Securosis wrote their first paper on replacing your SIEM, they’re back to update you on SIEM’s continually evolving drivers for threat management, operational efficiency and compliance.
Tags : 
siem, vendor evaluation, threat management, compliance, tco, operational efficiency
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Published By: McAfee     Published Date: Nov 20, 2014
This paper is the result of a recent SANS survey exploring the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Tags : 
siem, threat intelligence, platform integration, correlation and analysis, third-party intelligence tools
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network survival, network security management, best practices, firewalls, hacker detection
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your network firewall team. Resource optimization involves the automation and streamlining of operational processes and management workflows so that your IT team members can be freed up to focus their time, skills, and expertise on priority projects. Furthermore, optimizing your resources helps preserve your budget while eliminating budgetary conflicts and slashing administrative costs.
Tags : 
network security, it security, firewall, resource optimization, security management
    
McAfee
Published By: McAfee     Published Date: Apr 06, 2017
There are several steps along the SOC maturity curve and different paths to get there. Join the Foundstone Services team as they discuss the elements of a modern SOC, maturity levels, and strategic options.
Tags : 
secops, soc, siem, security strategy, soc maturity, threat management, process integrations, advanced threat defense
    
McAfee
Published By: McAfee     Published Date: Apr 06, 2017
McAfee threat management solutions can cut through the grey to provide a clear understanding of risk so immediate corrective actions are taken. Tight integration between solutions optimizes security operations response and efficiency with visibility and action.
Tags : 
malware, advanced threats, greyware, threat management, sandbox, siem, security operations, secops
    
McAfee
Published By: McAfee     Published Date: Apr 06, 2017
Kirk Davis, Information Security Director, Vidant Health, says that the integration of McAfee threat management products allows his business to protect and remediate against threats while focusing on the business.
Tags : 
siem, secops, security operations, advanced threats, threat intelligence
    
McAfee
Published By: McAfee EMEA     Published Date: Mar 20, 2018
Bedrohungsvektoren entwickeln sich stetig weiter. In dieser Situation müssen IT-Sicherheitsentscheider effektive Lösungen für die Sicherheit von Endgeräten finden. Bei mehr als zwei Drittel der Unternehmen wurden im vergangenen Jahr sensible Daten kompromittiert. Die Reaktion auf solche Vorfälle ist mit großem Zeit- und (manuellem) Arbeitsaufwand verbunden – und selbst damit lassen sich die Probleme häufig nur für einen Teil der Endgeräte lösen. Sicherheitsentscheider wünschen sich deshalb integrierte Lösungen, die bei allen eingesetzten Endgerätetechnologien für mehr Effizienz, Übersicht und Schutz sorgen. Im Januar 2017 beauftragte McAfee Forrester Consulting, gängige Tools und Strategien für das Endgeräte-Sicherheits-Management sowie deren wahrgenommene Effektivität zu evaluieren.
Tags : 
    
McAfee EMEA
Published By: Medical Group Management Association (MGMA)     Published Date: Mar 16, 2009
Read this white paper from the Medical Group Management Association (MGMA) – the most respected association for the leaders of medical group practices. You’ll learn how you can take advantage of this niche audience and about technologies that these small and medium-sized businesses dedicated to health care need to run smoothly.
Tags : 
mgma, technology, service, medical groups, medical group management association, smb, healthcare, health-care information technology
    
Medical Group Management Association (MGMA)
Published By: Microsoft     Published Date: Oct 09, 2017
Cloud-Computing hat ein goldenes Zeitalter für Software Unternehmen eingeleitet. Aufgrund der niedrigen Einstiegshürde wird die Kreativität gefördert, insbesondere die Kreativität von Software-Entwicklern, die Anwendungen direkt in der cloudbasierten Infrastruktur erstellen. Die cloudbasierte Infrastruktur ermöglicht es Entwicklern, ihrer Leidenschaft nachzugehen: mit den Tools ihrer Wahl Geschäftsprobleme zu lösen und innovative Ideen umzusetzen. In einem Software-as-a Service-Modell (SaaS-Modell) können Anwendungen einfach in einem Cloud-Dienst bereitgestellt werden und an die Kunden geliefert werden, die den einfachen Zugriff und die niedrigen Kosten schätzen. Das Cloud-Modell befreit die Entwickler und die IT-Mitarbeiter im Unternehmen vom Management oder der Pflege einer kapitalintensiven Infrastruktur.
Tags : 
funkionalitat, software, moglichkeit, dienste, zentrale, verwaltung, benutzerfreundlichkeit
    
Microsoft
Published By: Microsoft     Published Date: Mar 23, 2018
Die Zukunft für den Serviceaußendienst Kevin Ashton, Technologieexperte aus Großbritannien, begründete am Massachusetts Institute of Technology (MIT) das Auto-ID Lab, in dem Pionierarbeit auf dem Gebiet der RadioFrequency Identification (RFID) und anderen Sensoren geleistet wurde. Im Zuge seiner Tätigkeit prägte Ashton im Jahr 1999 erstmals den Begriff des „Internet of Things”, kurz IoT, um die Vernetzung alltäglicher Gegenstände und Geräte sowie deren Übermittlung von Daten und Informationen zu beschreiben. Kevin Ashton gilt deshalb heute als „Vater” des IoT-Konzepts. Ende des Jahres 2015 war Kevin Ashton als Referent auf einem europäischen Kongress zum Thema Kundenservice geladen. Seine These: Das Servicemanagement im Außendienst sei die erste Branche, die mit dem Internet of Things eine grundlegende Transformation durchlaufe.
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Apr 05, 2018
Im April kündigte Microsoft die Lösung Microsoft Relationship Sales an, die Microsoft Dynamics 365 for Sales mit LinkedIn Sales Navigator kombiniert. Vertriebsmitarbeiter haben Zugriff auf Informationen aus dem weltweit führenden professionellen Netzwerk, damit sie einfacher Interessenten finden und Beziehungen zu stärken. Die Lösung bietet: -Zugriff auf 500 Millionen LinkedIn-Profile mit Fotos sowie Informationen zu aktuellen und früheren Tätigkeiten der Mitglieder. Damit können Vertriebsmitarbeiter einen besseren Eindruck von ihren aktuellen Kunden erhalten und über das Netzwerk neue Leads finden. -Empfehlungen für die nächsten Schritte der Benutzer in Dynamics 365 auf Basis von Signalen aus E-Mail, Customer Relationship Management (CRM)-Software und LinkedIn. Diese basieren auf künstlicher Intelligenz (KI) und enthalten Vorstellungs- und Vernetzungsvorschläge sowie Vorschläge für InMail und Nachrichten.
Tags : 
crm strategy, crm-strategie, linkedin, dynamic sales
    
Microsoft
Published By: Microsoft Azure     Published Date: Apr 11, 2018
The 2017 study, The Total Economic Impact™ of Microsoft Azure IaaS, gives insight into both the costs and benefits of large-scale Azure infrastructure as a service (IaaS) implementation. This commissioned study conducted by Forrester Consulting analyzes the return on investment and business impact that several enterprises experienced when moving from a primarily on-premises environment to Azure. The companies interviewed come from a variety of industries and locations (global/multinational, North American, and European). In addition to a 435 percent overall return on an Azure IaaS investment*, the businesses also experienced: Reduced data center and outsourcing costs. Website scale and performance improvements. Ease of experimentation through virtualized environments. Developer and tester improvements. Download the study to learn about the potential ROI that could be realized by shifting some or all of your management and operations to Azure.
Tags : 
    
Microsoft Azure
Published By: Microsoft Dynamics     Published Date: Apr 13, 2007
This white paper walks through the key areas of a financial management solution so when you are evaluating current and future financial management software, you are prepared to avoid challenges and maximize your investment.
Tags : 
financial management, finance software, financial software, microsoft, microsoft white paper, microsoft white papers, microsoft paper, microsoft crm
    
Microsoft Dynamics
Published By: Microsoft Office 365     Published Date: Jan 21, 2016
How do you know when it's time to move to a new email service – especially from a free service to paid, hosted solution? Migrating your email service may seem like a daunting task that could cost considerable time and money and disrupt productivity. But thanks to Microsoft Exchange Online, you can provide business-class email that helps keep your organization professional and productive. We'll walk you through three big indicators it's time to consider email from Office 365: • You're ready to get more out of your email • You're ready to save time and resources • You're ready to simplify email management
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Apr 05, 2016
Take a guided tour of the new Office 365. It’s a quick and easy way to test drive new enterprise capabilities, including advanced collaboration, analytics, and security features. Step through common enterprise scenarios to see how Office 365 can support your business needs See the latest in-product experience with the most up-to-date versions of the Office applications you use every day as well as the new advanced features Explore the top features and advanced capabilities available for email and calendar management, collaborative meetings, analytics, and security
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Dec 11, 2017
The cloud isn’t just for large companies with thousand of employees. In fact, some of the richest and most thrilling transformations can be seen in the mom and pop stores, the virtual start-ups. In most cases, it starts with that “moment of truth”-- a realization that something can be done better. The “Moments of Truth” e-Book details four businesses that had an insight, and turned to the cloud for answers. You’ll read about: A Nashville fried chicken company is changing lives through the power of smart technology and transformative employment A virtual social media management business is truly living “the future of work” A content-focused startup is setting a whole new standard for podcasts A digital products studio is building a real community for its employees
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Help your employees achieve their best with integrated, secure technology Thrive in a fast-changing digital world by giving your people the freedom and flexibility to be productive and work together from anywhere, while maintaining security and compliance. Discover how an integrated solution can deliver: Familiar productivity and collaboration tools System and device management Intelligent security The latest version of Windows for the enterprise
Tags : 
    
Microsoft Office 365
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.