• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

hr compliance

Results 1 - 25 of 228Sort Results By: Published Date | Title | Company Name
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneur's will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance, compliance
    
TriNet
By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : 
trinet, compliance, smb, small business, human resources, infrastructure, retirement, health, insurance, benefits, litigation, qualified guidance, payroll, legal, procedure
    
TriNet
By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet
By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneurs will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance, compliance
    
TriNet
By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : 
trinet, compliance, smb, small business, human resources, infrastructure, retirement, health, insurance, benefits, litigation, qualified guidance, payroll, legal, procedure
    
TriNet
By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet
By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure, business intelligence
    
Blue Coat Systems
By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
    
Panasonic Business Mobility Solutions
By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : 
forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security, compliance exposures, mobile security, security, enterprise applications
    
ForeScout
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business, access control, anti virus, application security, identity management, internet security, security management, web service security, vulnerability management
    
CA Technologies
By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron
By: CA Technologies     Published Date: Nov 02, 2016
In the past 20 years, Elekta has achieved measured growth through nearly a dozen acquisitions, pulling new radiotherapy, brachytherapy and magnetoencephalography technologies into the fold. To deliver the full benefit of these sophisticated devices to providers and patients, Elekta must tie them together into integrated solutions— an immense and complex undertaking that can be further complicated by regulatory compliance.
Tags : 
    
CA Technologies
By: TIBCO Software APAC     Published Date: May 31, 2018
With data the new competitive battleground, businesses that take advantage of their data will be the leaders; those that do not will fall behind. But gaining an advantage is a more difficult technical challenge than ever because your business requirements are ever-changing, your analytic workloads are exploding, and your data is now widely-distributed across on-premises, big data, the Internet of Things, and the Cloud. TIBCO® Data Virtualization is data virtualization software that lets you integrate data at big data scale with breakthrough speed and cost effectiveness. With TIBCO Data Virtualization, you can build and manage virtualized views / data services that access, transform, and deliver the data your business requires to accelerate revenue, reduce costs, lessen risk, improve compliance, and more.
Tags : 
    
TIBCO Software APAC
By: IBM     Published Date: Jan 09, 2017
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services, enterprise applications
    
IBM
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint
By: Gigamon EMEA     Published Date: Feb 20, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon EMEA
By: TriNet     Published Date: Jul 28, 2015
This paper acts as a well-qualified resource for those desiring quantitative data to support the validity of how outsourcing key HR functions can produce positive business results.
Tags : 
hr outsource, peo, data analysis, hr functions, in-house hr processes, co-employment models, compliance risk, healthcare reform regulation, human resources services, workforce management software, financial management, employee monitoring software, recruiting software/services, employee performance management, benefits management
    
TriNet
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter