hr management

Results 501 - 525 of 1007Sort Results By: Published Date | Title | Company Name
Published By: Lumesse     Published Date: Feb 13, 2015
The Talent Management ROI Business Case reveals the importance of demonstrating a Return on Investment (ROI) in talent and the way to best measure ROI.
Tags : 
roi, return of investment, hr security investment, best way to measure roi, talent management roi
    
Lumesse
Published By: Lumesse     Published Date: Feb 13, 2015
This white paper aims to provide an overview of the peculiarities in recruitment and talent management that exist in China, based on best practice and real life case studies.
Tags : 
hr in china, talent management in china, recruitment and talent management, recruitment in china
    
Lumesse
Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : 
cloud environment, iaas, paas, saas, access management
    
IBM
Published By: Oracle Primavera     Published Date: Feb 10, 2015
Organizations with a strategy execution system are three times more likely to achieve success. Fortunately there are ways to improve your chance of producing relevant, executable strategy. In this executive brief, Harvard Professor Robert Kaplan provides practical advice on how to define strategic outcomes, measure your projects’ strategic success, and bind execution to strategy. He discusses project and portfolio management tools that can reach across the entire organization, capturing data on projects’ content, objectives, performance, and spending.
Tags : 
oracle, integrating strategy, strategic projects, project management
    
Oracle Primavera
Published By: NexGen     Published Date: Feb 09, 2015
The nature of the financial services industry places a myriad of international compliance requirements on a company's IT team, as well as an expectation by its customers to deliver the high test levels of performance and reliability. To survive and thrive, businesses in the industry must not only keep pace with customer demand but gain competitive advantage. Those demands mean the IT team must be at the forefront of adopting emerging technologies. This is certainly true for Orangefield Columbus, who recently experienced significant growth in its multiple databases which led to the serious performance degradation of its existing storage system. By focusing on a proactive data management storage array, Orangefield was able to eliminate resource contention. Download now and examine Orangefield's journey to find a solution that would meet, and exceed, their performance and capacity requirements.
Tags : 
nexgen, vmware, citrix, flash, financial services
    
NexGen
Published By: Dyn     Published Date: Feb 06, 2015
Whether you’re serving customers, partners, or internal users through two data centers or twenty, you want all users to have the best experience. Global load balancing (GLB) is the effective management and balancing of the Internet traffic to and from your data centers and cloud service providers and has become critical to growing enterprise ecommerce revenue, serving customers and empowering employee productivity.
Tags : 
glb, internet traffic, ecommerce revenue, employee productivity, cloud-based services
    
Dyn
Published By: Workforce Software     Published Date: Feb 02, 2015
Leave administration is one of the most challenging aspects of workforce management and an area that continues to become more complicated as leave regulations—and lawsuits—increase. For employers, having to understand and comply with complex federal regulations, such as the Family and Medical Leave Act (FMLA), in addition to myriad local laws, union rules and company policies can be overwhelming. The task of complying with these many regulations often consumes a great deal of time for HR teams, especially those operating across multiple geographies.
Tags : 
workforce software, software, automate, outsource, fmla, act, cloud, management, employee leave, strategy
    
Workforce Software
Published By: Sage     Published Date: Jan 30, 2015
As organizations look for more ways to increase productivity and profitability, human resources departments are being asked to provide more strategic input to executives. Doing so requires tools that improve access to timely, accurate information for enhanced business decision making. If you don’t have a human resource management system (HRMS), HR can end up spending too much time on repetitive day-to-day tasks like paperwork while struggling to deliver meaningful workforce insights. The right HR management software can help the HR team increase control over employee data, optimize productivity, and take employee engagement to the next level, so you can deliver the future workforce your organization needs to succeed. This white paper discusses the five areas to keep in mind when evaluating solutions to find an HRMS that’s a good fit for your business.
Tags : 
sage, hr management, hr software, hrms, hr team, evaluating solutions
    
Sage
Published By: CareCloud     Published Date: Jan 21, 2015
Watch this on-demand webinar to learn how one scenario can help get the most from its PM and EHR.
Tags : 
carecloud, pm and ehr, boost revenue, ehr too expensive, practice ehr, revenue cycle management, ehr installation, system implementation, access financial reports, access data, webinars & web conferencing
    
CareCloud
Published By: CareCloud     Published Date: Jan 21, 2015
Watch this free webinar to hear how one general surgery practice increased billing by 11%, boosted revenue by 6% and streamlined productivity in just six months with its new practice management and EHR system. In this recorded webinar you will learn more about: •The biggest challenges to improving profitability and how to overcome them •How to increase productivity with your EHR •What the practice would have done differently—and how you can benefit from their experience •How to use your PM to improve profitability, productivity and more… Fill out the form on the right to begin watching this webinar right away!
Tags : 
carecloud, pm and ehr, boost revenue, ehr too expensive, practice ehr, revenue cycle management, ehr installation, system implementation, access financial reports, access data
    
CareCloud
Published By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation
    
Intel Security
Published By: Box     Published Date: Jan 16, 2015
The nature of the financial services industry places a myriad of international compliance requirements on a company's IT team, as well as an expectation by its customers to deliver the high test levels of performance and reliability. To survive and thrive, businesses in the industry must not only keep pace with customer demand but gain competitive advantage. Those demands mean the IT team must be at the forefront of adopting emerging technologies. This is certainly true for Orangefield Columbus, who recently experienced significant growth in its multiple databases which led to the serious performance degradation of its existing storage system. By focusing on a proactive data management storage array, Orangefield was able to eliminate resource contention. Download now and examine Orangefield's journey to find a solution that would meet, and exceed, their performance and capacity requirements.
Tags : 
nexgen, vmware, citrix, flash, financial services
    
Box
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection
    
Webroot Inc
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management
    
Qualys
Published By: Kaspersky     Published Date: Jan 07, 2015
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.
Tags : 
kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach, security, virtualization
    
Kaspersky
Published By: Adobe     Published Date: Dec 08, 2014
When it comes to digital asset management (DAM) projects and rich media, marketers and IT professionals struggle to find the best ways to store, share, and deliver assets across devices. The Gartner Three Best Practices for Digital Asset Management Projects report identifies the key DAM challenges facing organizations and provides recommended strategies and best practices.
Tags : 
asset management, dam, rich media, metadata issues, emerging marketing, internet marketing, marketing research
    
Adobe
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Safeguarding your business doesn’t have to be a long, time-consuming endeavor. Through mobile security management, you can improve visibility with real-time alerts and video clips.
Tags : 
remote security, business protection
    
Tyco Integrated Security
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers
    
Symantec
Published By: Cornerstone OnDemand     Published Date: Dec 03, 2014
The dreaded annual performance review: whether you’re on the giving or receiving end, it can be an uncomfortable experience for both managers and employees. But it doesn’t have to be. See how great organizations use reviews to: Motivate employees Increase employee productivity Create an on-going dialog between employees and managers Support overall organizational goals
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Dec 03, 2014
Being a manager is hard. Being a great manager is even harder. Learn simple things you can do as a manager to increase performance from both individuals and teams. Simple strategies like: • Talk less, listen more • Play to your (and your team's) strengths • Manage teams, not individuals • Accentuate the positive
Tags : 
cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
    
Cornerstone OnDemand
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective
    
Centrify Corporation
Published By: McAfee     Published Date: Nov 20, 2014
This paper is the result of a recent SANS survey exploring the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Tags : 
siem, threat intelligence, platform integration, correlation and analysis, third-party intelligence tools
    
McAfee
Published By: Optis     Published Date: Nov 06, 2014
What you don’t know could hurt you. From short-term family leave that only Vermont offers to leave that 25 states offer for victims of crime and violence, the land of unusual leaves is full of potential pitfalls and hazards for HR.
Tags : 
leave, leave management, employee leave, paid leave, unpaid leave, state leave, fmla, state fmla, time off, leave compliance, federal leave laws, leave management solution, leave management system, cloud-based leave management system, leavexpert®
    
Optis
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.