hr management

Results 501 - 525 of 1006Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Oct 15, 2019
Environmental/climate change risk, disruptive technologies and a return to territorialism were ranked the top threats to company growth. Specifically, 68 percent of CEOs agreed that their organisational growth will be determined by their ability to anticipate and navigate the global shift to a low-carbon, clean technology economy. Read now KPMG's CEO outlook report to understand what is on top of the asset management CEO agenda and to find out what investments CEOs are prioritising to improve organisation’s resilience.
Tags : 
    
KPMG
Published By: Kronos     Published Date: Apr 15, 2015
Managing a rapidly evolving workforce with outdated tools and manual processes drags down HR. It saddles you with too many administrative tasks, and can keep you from focusing on what you do best: engaging with employees.If this sounds like your current reality, then it’s time to evaluate your workforce management system. Download this new eBook to learn:
Tags : 
workforce management system, fully automated, cloud based, manufacturers, timekeeping, payroll, streamlining, manual processes
    
Kronos
Published By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
    
Kronos
Published By: Kronos     Published Date: Sep 20, 2018
Approximately 75 percent of convenience store operators do not have a program in place to measure employee satisfaction. As a result, 43.8 percent of c-store operators reported their turnover rate for the associate position has risen, according to the 2016 Convenience Store News HR & Labor Study. Learn more about this and other human capital management issues among c-store operators by downloading this infographic.
Tags : 
    
Kronos
Published By: Kronos     Published Date: Sep 24, 2018
Today’s financial services organizations recognize that success starts with strong relationships built on trust and transparency. In a competitive market, a company’s employees can make or break these crucial relationships through their interactions with customers. That’s why businesses — from wealth management and insurance firms to banks and credit unions — are investing in automated workforce solutions to help them attract, engage, and retain top talent while controlling costs and driving exceptional service. Managing a diverse workforce of exempt and nonexempt employees across back-office, contact center, and frontline operations is no easy feat. Finding and keeping best-fit employees is challenging enough, but you also need to optimize day-to-day functions like time and attendance, scheduling, payroll, labor cost and productivity tracking, and compliance management to stay competitive and profitable. Given this complexity, it is not surprising that management teams are not alway
Tags : 
    
Kronos
Published By: LandslideCRM     Published Date: May 16, 2012
This whitepaper chronicles Boston Mutual Life Insurance Company, the first sales organization to embark on CRM 3.0, bypassing CRM 2.0, representing a paradigm shift in strategy, people, and technology management. We outline how this bridged approach was achieved and how your organization can do the same.
Tags : 
crm demo, crm solution, crm software, account management, contact management, opportunity management, deal management, lead management, mobile crm, social crm, crm dashboard, crm reporting, sales forecasting, email marketing, web conferece, task management, activity management, sales activity, sales library, resource library
    
LandslideCRM
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 20, 2019
Know how LTI leveraged SAP SuccessFactors to simplify the employee lifecycle process and enabled rapid move to an intelligent enterprise. A globally-integrated Cloud-based HR Platform for 27000+ users across 30 countries aided higher employee engagement and talent management. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
US based Media & Entertainment giant had challenges in multiple integration of 3rd party tools. LTI helped in implementing end to end ServiceNow modules and integration of multiple 3rd party tools like Verizon, Sharepoint, Table API etc which thereby provided higher adoption of portal with enhanced user experience.
Tags : 
application management, artificial intelligence, b2b technology, cloud applications, cloud architect
    
Larsen & Toubro Infotech(LTI)
Published By: Lawson     Published Date: Jun 23, 2008
Managing and maintaining your key assets throughout their entire lifecycle is critical to your organizations success. Rather than looking at each part of the asset's lifecycle in isolation or only focusing on the operational phase, your asset management solution should enable a more holistic view. It should help you manage the entire cycle.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management
    
Lawson
Published By: Lawson     Published Date: May 11, 2011
How can organizations tap into their workforce to achieve specific business outcomes? The answer - and the future of HCM - lies in the three closely related areas of talent management integration, spaces, and information delivery.
Tags : 
lawson hcm, strategic human capital management, larry dunivan, talent management integration, information delivery, talent acquisition, goal management, performance, compensation, succession, global human resources
    
Lawson
Published By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost, pii, ehr, data breach, data security, audits, encryption, key management
    
Liaison Technologies
Published By: Logrhythm     Published Date: Feb 24, 2016
In this webinar, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.
Tags : 
logrhythm, cyber attacks, cyber threat, security, security application
    
Logrhythm
Published By: Logrhythm     Published Date: Sep 05, 2017
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defences with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Published By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : 
reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
    
Logrhythm
Published By: Logrhythm     Published Date: Sep 11, 2017
Der traditionelle Ansatz der Cyber-Sicherheit besteht in einer präventionsorientierten Strategie, die darauf fokussiert, Angriffe zu stoppen. Und tatsächlich lassen sich mit präventionsorientierten Ansätzen viele Bedrohungen abwehren, doch den versierten und hochmotivierten Bedrohungsakteuren von heute gelingt es immer öfter, diese Abwehrmaßnahmen mit kreativen, verdeckten, gezielten und permanenten Angriffen zu umgehen, die oft lange unentdeckt bleiben.
Tags : 
network, cloud saas, users, mobile devices, iot, malicious insiders, hacktivists
    
Logrhythm
Published By: Logrhythm     Published Date: Sep 11, 2017
Threat Lifecycle Management ist die entscheidende Voraussetzung, um Angriffe in einer möglichst frühen Phase ihres Lebenszyklus zu erkennen und zu stoppen. TLM vereint zahlreiche Fähigkeiten und Funktionen, die es ermöglichen, neue Bedrohungen und Angriffe auf die Unternehmenssysteme zu erkennen; festzustellen, welche Risiken sie mit sich bringen; die Risiken zu minimieren; und die nötigen Maßnahmen zu ergreifen, um den Normalbetrieb wieder aufnehmen zu können. TLM hat das Ziel, schädliche Cybervorfälle, die durch erfolgreiche Angriffe auf Systeme, Netzwerke und Daten verursacht werden können, umfassend zu bewältigen beziehungsweise zu verhindern.
Tags : 
einleitung, menschen, prozesse, technologien, eine strategie entwickeln
    
Logrhythm
Published By: LogRhythm     Published Date: Aug 08, 2016
The need for early detection of targeted attacks and data breaches is driving the expansion of new and existing SIEM deployments. Advanced users are looking to augment SIEM with advanced profiling and analytics.
Tags : 
cyber threat, cyber risk, technology, best practices, business management, business analytics
    
LogRhythm
Published By: LogRhythm     Published Date: Feb 07, 2017
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: Lookout     Published Date: Aug 30, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions.This whitepaper highlights some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
mobile threats, mobile security, mobile protection, enterprise mobility management, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lumension     Published Date: Oct 17, 2008
Vulnerability management can be a powerful means toward reducing the threat surface within an enterprise IT environment. But because vulnerability management technology has been around in some form or another for so long there has been plenty of time for the din of marketing-speak from various vendors to confuse users about the true nature of vulnerability management tools and practices.
Tags : 
lumension, it environment
    
Lumension
Published By: Lumension     Published Date: Sep 18, 2012
Beyond Compliance: Combating Threats with Endpoint Configuration Management
Tags : 
suite, endpoint configuration, threats, compliance, lumension
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : 
compliance, security, policy, group policy
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, encryption, business scanning, content control, patch management, change management, test environment
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.