HR Hero Your Employment Law Resource
 

hr solutions

Results 201 - 225 of 487Sort Results By: Published Date | Title | Company Name
Published By: Webroot Inc     Published Date: Jan 15, 2015
The old canon of long-lived viruses with random targets created by hacktivists for fame or nuisance has given way to a new generation zeroday/hour threats from organized criminals, with hand-picked targets and specific, malicious intent. In mid-2014, on a daily basis, Webroot saw 25,000 new malicious URLs, 777,000 new unknown files, many of which are malicious, and 1,000 new phishing sites. In the face of such exponential growth, traditional, reactive security can’t hope to keep up. Not only is the volume of unknown threats overwhelming existing security solutions, but the unique characteristics of unknown threats are also making it difficult for traditional security to catch them.
Tags : 
threat intelligence, malicious ip activity, reactive security, security solutions
    
Webroot Inc
Published By: CA Technologies     Published Date: Jun 04, 2015
The application economy poses several challenges to a digital transformation strategy. To truly capitalize on the opportunity, organizations like yours have to think bigger than small-scale augmentations or throwing more resources at the problem. Such “solutions” might work in isolated cases, but they’ll never move the needle enough or drive competitive differentiation. With Continuous Deployment, you can transform and accelerate the SDLC, so complex deployments occur in hours or minutes, not weeks or days.
Tags : 
    
CA Technologies
Published By: Workterra     Published Date: Oct 25, 2017
Any number of characteristics put the mid-market employer in a league of its own, placing it somewhere between the niche-focused small businesses of Main Street, USA, and the complex enterprise-level organizations that conduct business on a global scale. HR technology is a shining example of this place in the middle. HR for mid-market employers must fulfill needs that can’t be met by benefits administration and core HR solutions designed to narrowly target either small businesses or enterprise organizations.
Tags : 
    
Workterra
Published By: AWS     Published Date: Jan 03, 2019
Managing your data can be a challenge, but establishing an analytics solution that every user can navigate, regardless of skillset, is where organizations often need help. TIBCO® Spotfire® features AI-driven data visualizations and dashboards, which helps enables each organizational role to discover and deliver valuable insights with ease. Riteway Sales and Marketing, which helps many Southeastern supermarkets execute strategies, leveraged the power of TIBCO Spotfire to better understand individual product performance throughout their stores, achieving exponentially faster time to insight than their previous solution allowed. Watch this on-demand webinar to learn how TIBCO Spotfire, when leveraged on Amazon Web Services cloud, can help you generate deep insights in minutes. You’ll learn: • How to generate relevant, actionable insights from any data, anywhere • Some of the best practices for leveraging AI-driven visual and predictive analytics solutions in the cloud • How to
Tags : 
    
AWS
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
Progressive companies of all sizes today are taking advantage of new, web-based technologies to reduce IT complexity and increase their competitiveness. Mobile apps and devices that provide anywhere, anytime connectivity and cloud infrastructure that enables seamless, scalable growth give them the speed and flexibility to grow quickly and expand into new markets. In this whitepaper you will find three examples of forward-thinking franchise owners and entrepreneurs that are growing their businesses and positioning themselves for the future with unified communications solutions. These franchises are: McDonald's RE/MAX Fix Auto Download now to learn more!
Tags : 
franchise, mcdonald's, mobile app, positioning, communication solutions, 8x8
    
8x8 Inc.
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies EMEA
Published By: VMware     Published Date: Dec 05, 2017
"As virtualization increasingly takes hold throughout the enterprise, organizations are looking for ways to extend the capabilities of their existing virtual desktop and application frameworks with new features and a digital workspace strategy. In this Tech Target whitepaper, you will learn: - Common customer pain points and business implications in desktop and application virtualization - What to look for in desktop and application virtualization solutions - The many benefits and advantages of VMware Horizon and Workspace ONE"
Tags : 
vmware, tech target, virtualization, vmware horizon
    
VMware
Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepoint CASB to extend DLP policies into cloud applications and more.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more. Read the report to learn more.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint
Published By: Motorola Solutions     Published Date: Jun 24, 2019
At Motorola Solutions, our purpose is simple; we create mission-critical communication solutions to help our customers build safer cities and thriving communities. That’s why we recently acquired Avigilon, an industry leader in video, access control and video analytics solutions, in our ongoing effort to provide trusted security solutions to our customers to help them be their best in the moments that matter. In the modern world of utilities, when it comes to providing electricity to light the family kitchen, transporting clean drinking water across many miles to the tap, or delivering the natural gas that heats the oven — everything must follow a process. At the frontline of ensuring these processes remain consistent, is having the ability to instantly know when an incident occurs that can disrupt the critical work that needs to be done. Avigilon access control and video management software is available to help utility operations ensure their critical processes are protected, so servi
Tags : 
    
Motorola Solutions
Published By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the market’s (and Gartner’s) attention. Over the years, we’ve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. It’s clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
    
Trend Micro
Published By: Workday     Published Date: Sep 08, 2015
This white paper reveals what is wrong with current human resources (HR) systems, and how you can optimise your investment in the people doing the work of your organisation.
Tags : 
delivery value add to the business, hr systems, unified hcm, unified hcm solutions, workday hcm
    
Workday
Published By: Ascentis     Published Date: Sep 28, 2010
HRIS solutions designed for very large organizations can be costly to set up and maintain, and often require the services of an army of consultants to keep them operational. Systems designed for very small organizations concentrate on either HR functions such as attendance and compensation, or on benefits management, but usually lack the ability to integrate the two areas. To be a practical investment choice for a mid-tier organization, a satisfactory HRIS solution must have its HR and benefits functions highly integrated. It must be agile so it can easily be kept aligned with the constant change in compliance laws, and it must be robust and secure, built on a tried and true platform foundation.
Tags : 
ascentis, open enrollment, benefits, automation, accuracy, self-service, human resources, errors, hris, insurance, hipaa, e-sign act, automated
    
Ascentis
Published By: Tact     Published Date: Sep 06, 2016
Did you know that sales reps typically waste up to 16 hours per week on non-selling tasks? If your sales team is spending too much time on non-selling tasks, logging sales activities to Salesforce, hunting for customer information and documents, or copy-pasting data between separate systems, they might resist the rise of mobile CRM solutions like Salesforce1. However, it’s important to figure out how to enable these teams in the field, as 55% of salespeople will access sales applications exclusively through smartphones or tablets by the end of 2016. It’s not surprising that salespeople will increase their use of mobile apps 125% from 2015-2017. In this whitepaper from Tact, you’ll learn 1) common challenges facing field sales teams, 2) a framework for thinking about mobile sales productivity, 3) essential characteristics for evaluating mobile sales solutions, and 4) key trends in mobile sales.
Tags : 
salesforce, salesforce.com, crm, sales productivity, sales enablement, salesforce adoption, crm adoption, sales management, crm best practices, salesforce best practices, mobile applications, field sales, mobile field sales, tactile, tact, chuck ganapathi
    
Tact
Published By: Acronis     Published Date: Apr 26, 2011
In this paper we introduce initiatives you can put into effect to survive and thrive in our virtualized world. Then we show how Acronis virtual solutions can save administration time, lower IT expenses and improve your ability to meet both RTO and RPO goals.
Tags : 
acronis, server consolidation, disaster recovery, backup and recovery, virtual server backup, virtual server, backup, vmare backup
    
Acronis
Published By: Citrix Systems     Published Date: Oct 07, 2014
The rapid increases in computing power described by Moore’s Law offer theoretical advantages for IT organizations—but it’s market competition that translates those benefits into real value. As vendors battle for market share, costs are falling for every part of the desktop virtualization architecture. Meanwhile, desktop virtualization technology itself is advancing quickly, providing new ways to enable business mobility and enabling the flexibility that people and organizations need to thrive. This trend is a double win for customers—better solutions at a lower cost—and it’s making the benefits of a service-based approach to IT available to any organization.
Tags : 
value, cost, virtualization, desktop, computing, power, theoretical, advantage, organization, rapid, increase, solution, mobility
    
Citrix Systems
Published By: McAfee     Published Date: Feb 06, 2013
Prevent rootkits and other stealthy threats with integrated solutions from Intel and McAfee that deliver embedded security to protect beyond the operating system.
Tags : 
stealthy threats, malware, stealth crimeware, rootkits, cybercrime, stuxnet, zeus, zero-day threats, kernel-mode rootkits, zeus botnets, kernel level security
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.