HR Hero Your Employment Law Resource
 

ims

Results 226 - 250 of 374Sort Results By: Published Date | Title | Company Name
Published By: Qlik     Published Date: Aug 31, 2016
Qlik apps are used by teams in head-office functions like group finance or risk. Here's a list of the top 12 solutions that are the most popular, and offer the greatest business value.
Tags : 
qlik, finance solutions, risk, insurance, claims management, cvs, sales performance
    
Qlik
Published By: CrowdStrike     Published Date: Nov 28, 2018
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: • What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical • How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs • How the CrowdStrike® EDR solution empowers
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organization’s progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victims’ networks. Download the Cyber Intrusion Casebook to learn: • The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments • Key takeaways — based on the CrowdStrike Services team’s extensive experience
Tags : 
    
CrowdStrike
Published By: Fitbit     Published Date: Mar 16, 2017
In a three-year retrospective study that analyzed health care claims and wearable device data from a self-insured employer, Springbuk looked at the potential impact of Fitbit technology as part of a wellness program. The analysis shows that connected health and fitness interventions can close the gap between the everyday actions that change health and drive outcomes for employee health and employer cost. Some of the key findings include: * Employees who opted into the Fitbit program demonstrated significant cost savings when compared to the control group. * Engaged users cost less than non-engaged users. * The opportunity for cost savings is potentially the highest with less active individuals.
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Mar 21, 2017
Fear not, it is possible to prove the return on investment (ROI) of your wellness program! But don’t take our word for it. Springbuk, a health intelligence platform, recently evaluated the health care claims and wearable device data for a self-insured employer (and Fitbit customer) over a three-year period. View this webinar, Rod Reasen, CEO at Springbuk, walks you through their study and reveals how: - Employees who opted into the company’s wearable program cost less than their counterparts - Total costs for engaged wearable users dropped by 46% vs. 14% for non-engaged individuals - Cost reductions were highest with less active members – encouraging news for all employee populations
Tags : 
    
Fitbit
Published By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : 
pinkslipbot, malware protection, malware, technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. Download this white paper to get an in-depth technical look into Pinkslipbot and learn how Intel Security technology can help protect against Pinkslipbot.
Tags : 
pinkslipbot, malware protection, malware, technology
    
McAfee
Published By: Epson     Published Date: Jan 10, 2019
Since the earliest days of the industry, insurance companies have faced a never-ending struggle: processing the voluminous amount of paperwork that underwriting, claims, and compliance require. But the days of enduring the burdens caused by mountains of paper can become a distant memory. By investing in new, proven methods of converting paper documents to readable digital formats, insurance organizations can fully automate document processing to accelerate workflows, minimize processing times and enable more efficient operations.
Tags : 
    
Epson
Published By: Ephesoft     Published Date: Jan 18, 2018
Insurance companies are intensely data and document driven. Learn how intelligent document capture solutions can help all types of insurance offerings improve customer service, process claims faster and create streamlined, efficient and profitable business practices.
Tags : 
insurance, solutions, ephesoft, data, customer service, claims, business, optimization
    
Ephesoft
Published By: Nimsoft     Published Date: Oct 24, 2011
This paper offers tips for offering self-service capabilities to customers, therefor improving customer service levels and satisfaction.
Tags : 
saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
Nimsoft
Published By: Nimsoft     Published Date: Oct 24, 2011
Join Forrester and Nimsoft for this one hour webcast and discover the most current recommendations for service delivery and management best practices.
Tags : 
saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
Nimsoft
Published By: Nimsoft     Published Date: Oct 24, 2011
This white paper outlines the key challenges of moving to SaaS-and how Nimsoft Service Desk helps address them
Tags : 
saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
Nimsoft
Published By: Nimsoft     Published Date: Oct 24, 2011
This white paper reveals the best monitoring practices to employ in virtualized environments.
Tags : 
nimsoft, cloud service, delivery, models, monitor, monitoring, best practices, virtualize
    
Nimsoft
Published By: Nimsoft     Published Date: Oct 24, 2011
This paper describes unique characteristics of cloud service delivery models; details distinct monitoring responsibilities & challenges of each model
Tags : 
nimsoft, cloud service, delivery, models, monitor, monitoring, challenges
    
Nimsoft
Published By: Jobvite     Published Date: Aug 25, 2016
The talent acquisition market has changed dramatically. It is no longer just about placing ads on different sites and waiting for the resumes to roll in. Rather, it’s ferreting out those passive candidates and convincing them that your company is where they can shine and grow in their profession. Today’s recruiters must proactively search, find, and nurture candidates in this tough job market, and they need good tools to do this. In Forrester’s 45 criteria evaluation of talent acquisition vendors, we identified the 12 most significant software providers — ADP, Cornerstone OnDemand, Findly, IBM Kenexa, iCIMS, Jobvite, Lumesse, Oracle, PageUp People, PeopleFluent, SuccessFactors, and Technomedia — in the talent acquisition category that provide both applicant tracking system (ATS) and various levels of talent relationship management (TRM) functionality in their recruiting offering. This report details our findings about how well each vendor fulfills our criteria and where they stand in r
Tags : 
    
Jobvite
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
" Artificial intelligence and machine learning approaches provide radically new and improved endpoint protection. But not all companies' claims of using machine learning add up to a threat prevention strategy. Know the difference."
Tags : 
    
BlackBerry Cylance
Published By: iCims     Published Date: Dec 01, 2015
There’s a new way to recruit! Learn 16 HR tips that address hiring and talent acquisition changes in 2016.
Tags : 
recruiting, human resources, social recruiting, social media recruiting, social recruiting software
    
iCims
Published By: iCims     Published Date: Dec 01, 2015
Learn How Successful Recruiters Prepare for the Revolution in Talent Acquisition. View eBook Today!
Tags : 
recruiting, human resources, social recruiting, social media recruiting, social recruiting software
    
iCims
Published By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : 
brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity
    
IBM ILOG.
Published By: iCims     Published Date: Dec 28, 2016
That’s why in this eBook, we take a look at 17 ways companies can adapt to a changing talent acquisition landscape, to ensure they can better grow their workforce today, and in the years to come.
Tags : 
    
iCims
Published By: iCims     Published Date: Dec 28, 2016
f there’s one thing we know about the world of talent acquisition, it’s that it’s always evolving. Staying ahead of the latest trends can give employers the edge they need to hire smarter in the year to come.
Tags : 
    
iCims
Published By: iCims     Published Date: Dec 28, 2016
Remember when a recruiter’s role was defined by identifying, screening, and hiring qualified professionals?
Tags : 
    
iCims
Published By: Trend Micro Inc.     Published Date: Sep 21, 2011
Fake Antivirus (AV) or rogue antivirus software has been prevalent in the market today and has affected millions of computers. This document aims to educate users on how Fake AV arrives on a computer's system and what are the available Trend Micro solutions to combat this threat.
Tags : 
tend micro, fake antivirus, technology, software
    
Trend Micro Inc.
Published By: 5000fish, Inc     Published Date: May 13, 2012
5000fish, Inc., a cutting-edge provider of Business Intelligence software, aims to guide organizations on how they can manage their spreadsheet usage by presenting the benefits and risks of managing their business analytics using only spreadsheets.
Tags : 
    
5000fish, Inc
Published By: iCIMS     Published Date: Sep 30, 2013
Don't let hard-to-fill-positions ruin your productivity! View this webinar to gain insights from recent BLS data, learn tactics for finding and attracting hard-to-find candidates, and understand the importance of using a uniquely branded career portal in the recruiting process.
Tags : 
icims, talent management, hiring, new employees, hiring, new jobs, recruiting talent
    
iCIMS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.