HR Hero Your Employment Law Resource
 

hr solutions

Results 426 - 450 of 514Sort Results By: Published Date | Title | Company Name
Published By: Centrify     Published Date: Nov 10, 2013
Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.
Tags : 
centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security
    
Centrify
Published By: Cisco     Published Date: Jan 15, 2015
In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.
Tags : 
operating costs, capital, threat detection, visibility, networks, computing, cloud, innovation
    
Cisco
Published By: HP     Published Date: Aug 11, 2014
A few years ago, two technologies emerged to dramatically improve the industry’s ability to protect data. The cost of disk drives came down, and deduplication technology was introduced. This breakthrough is sometimes referred to as Deduplication 1.0. Like any technology, you’d expect it to evolve over time. HP launched the HP StoreOnce deduplication technology roadmap in 2010 to do just that. The result? Deduplication 2.0 or what HP calls “Federated Deduplication”. This next generation deduplication addresses some of the issues inherent in existing deduplication solutions: performance, flexibility, and data management and not only that, when moving from your legacy storage backup systems, you can reduce the amount of your stored backup data by 95 percent or we’ll make up the difference with free disk capacity and support.
Tags : 
deduplication, storage, it benefits, backup systems, challenges, challenges, technologies
    
HP
Published By: AlienVault     Published Date: Oct 21, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : 
alienvault, limited resources, it time management, it prioritization, it management
    
AlienVault
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
Palo Alto Networks
Published By: Nginx     Published Date: Feb 05, 2015
Application performance has become a hot topic in recent years—but our need for it is, quite honestly, nothing new. Your websites and applications can thrive, or face severe costs, depending on how well you deliver content to your users, and web architecture has had to evolve to deliver to your users. Download this new ebook to learn more about modern applications architecture, including how application delivery has evolved, why the modern application has increased performance expectations and demands and why NGINX and NGINX Plus are the solutions your DevOps team has been waiting for.
Tags : 
modern application architecture, web architecture, application delivery, performance expectations, devops team
    
Nginx
Published By: HP     Published Date: Oct 15, 2014
Integrated Computing (IC), also known as Converged Infrastructure, stands to revolutionize everything about IT. IC takes all of virtualization, storage, networking, and compute into a single system and allows total infrastructure oversight through one console. As you can imagine, the improvements in ease of use, agility, and efficiency are quite substantial. This is essential because infrastructure maintenance devours about three-fourths of annual IT budgets. IC changes all of that, delivering high efficiency solutions for the lifecycle of system,reducing costs and freeing up valuable personnel. The evolution of IT awaits.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution
    
HP
Published By: HP     Published Date: Aug 26, 2014
HP Simply StoreIT takes the stress out of storage. HP and our network of over 200,000 channel partners worldwide can help you choose the right solutions to fit your biggest business challenges. We can help you overcome obstacles including too little time for managing IT, budgets for upgrading infrastructure, and too many business risks and threats. Now you can take charge of virtualization, storage for business solutions such as Exchange and SQL Server, growing file shares, and data protection for business continuity. Improve your operational efficiency, reduce your risks, and lower storage costs. See how.
Tags : 
storage, budgets, server, virtualization, file, data, business, technology
    
HP
Published By: DocuSign     Published Date: Apr 12, 2017
Attracting & retaining talent are two of the most important functions of an HR organization, but paper has a nasty habit of tying up HR resources and keeping HR professionals from getting the job done. Now imagine a paper-free workplace. It can happen with eSignature solutions. With eSignatures, organizations can sign, send, and approve documents anywhere, at any time and keep business moving forward. Join this webinar to learn how you can transform key, paper-heavy functions like hiring, onboarding, and benefits enrollment to fast and secure digital experiences.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
Today, more than ever, the customer is at the center of business. Armed with more choice and ultimately more power, customers expect businesses to deliver entirely satisfying, customer-centric experiences throughout the sales cycle. Whether you sell to businesses or consumers, customers are accustomed to one-click purchasing, full mobile access, and social media-driven recommendations, and they are demanding a similar experience of all companies they do business with. With eSignature & Digital Transaction Management (DTM) solutions from DocuSign you can provide that experience, allowing customers to transact with you on their terms while reinforcing your modern reputation.
Tags : 
    
DocuSign
Published By: IBM     Published Date: Jan 10, 2014
Applications are evolving at an ever-faster pace. These applications are not discrete islands; they build on a complex, interconnected set of components that includes disparate technologies, developers, deployment topologies and organizations. Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This whitepaper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : 
ibm, rational, integration, integration testing, incremental integration, testing, virtulization, data management
    
IBM
Published By: Marketo     Published Date: Feb 07, 2017
Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on lead management functionality, thriving partner ecosystem, and roadmap. Marketo's easy and powerful lead management capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 400 technology and service providers that offer best-of-breed solutions for today’s marketers. The full report includes: Market evaluation and analysis of 17 CRM lead management vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying lead management systems Download the report to learn about these topics and more.
Tags : 
gartner, crm lead management, marketo, crm, launchpoint, vendor selection
    
Marketo
Published By: Oracle     Published Date: Apr 05, 2013
In a volatile and hyper-competitive market, delivering exceptional multichannel customer service consistently is essential. But delivering world-class service on tight budgets and to even tighter deadlines is a tough challenge for even the largest organizations. That’s why so many of the world’s most successful organizations choose to deliver customer service in the cloud. This eBook is a short introduction on how IT helps drive value for the business through cloud-based customer service solutions.
Tags : 
competitive market, exceptional multichannel service, service, customer service, tough challenge, oracle, agile, secure
    
Oracle
Published By: Oracle     Published Date: Mar 18, 2014
Customer relationship management (CRM) deployments are most effective when they legitimately support all three words that make up the acronym itself. Customers of the modern business-to-business (B2B) enterprise benefit when they purchase goods and services from companies who are focused on the buyer’s experience. Internal relationships within the selling organization are more effectively maintained when all customer-facing stakeholders have access to the rich data contained in a well-maintained CRM. And the management of the enterprise providing solutions can run their business like a finely-tuned machine when the maximum levels of visibility into customers and accounts are clear and accurate. This Research Brief combines research from a number of Aberdeen Sales Effectiveness research data sets, to create a holistic view of the most effectively deployed CRM systems.
Tags : 
oracle, customer relationship management, crm, b2b, internal relationships, sales effectiveness, sales teams, sales strategy
    
Oracle
Published By: Oracle     Published Date: Mar 11, 2013
In uncertain times, having the right systems can make a big difference in talent retention and development. This brief video demonstrates the benefits of cloud-based human capital management and talent management solutions.
Tags : 
human capital management, talent retention, oracle, human resources, talent management solutions
    
Oracle
Published By: Eaton     Published Date: Feb 08, 2017
Power distribution is facilitated through different pieces of equipment that take the power conditioned by your uninterruptible power supply (UPS) and send it to your IT equipment . Power distribution solutions can manage and even control energy consumption in smaller environments as well as large data center applications . Distributing power efficiently results in reduced operating costs and increased reliability.
Tags : 
    
Eaton
Published By: IBM     Published Date: Feb 04, 2015
Is it easy to do business with your organization? Do your employees feel empowered to meet your customer’s needs? These are questions that you’re probably grappling with as you face a perpetually changing business environment. You strive for operational excellence and need ways to effectively acquire and retain new customers. You also need to reinvent your business operations to foster growth. Smarter Process is a way for you to work smarter as you find your way through all the operational challenges that the current business climate throws at you. It helps you use mobile, analytics, and collaboration to empower your employees to do their best work. It also empowers you as a leader to find the right tools and solutions.
Tags : 
ibm smarter process, customer retention, customer-centric operations, operational decision management
    
IBM
Published By: IBM     Published Date: May 07, 2015
Learn how to build a proactive threat and fraud strategy based on business analytics. You’ll see extensive examples of how organizations worldwide apply IBM Business Analytics solutions to minimize the negative impact of risk and maximize positive results.
Tags : 
business analytics, risk management, threat management, fraud, proactive threat, analytics solutions, reduce exposure, reduce threats
    
IBM
Published By: Viavi Solutions     Published Date: Jan 04, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions
Published By: GeoTrust     Published Date: Oct 06, 2014
Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions.
Tags : 
security solution, online business, trust-based security solutions, protection, cutting edge technology, integration, third-party solutions
    
GeoTrust
Published By: Quantcast     Published Date: Jan 07, 2015
Over the last decade, Mobile has driven an unprecedented behavioral and cultural shift, providing utility, information and connectivity at our fingertips. Mobile is increasingly becoming the main screen accessed throughout the day, and Mobile marketing, in turn, has developed into a sophisticated, personalized marketing channel to reach Mobile consumers. In this paper, we explore the Mobile landscape and identify opportunities and solutions for advertisers.
Tags : 
mobile advertising, personalized marketing channel, mobile solutions, mobile landscape
    
Quantcast
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.