• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

hr management

Results 551 - 575 of 1019Sort Results By: Published Date | Title | Company Name
By: VMware     Published Date: Aug 16, 2019
It can be stressful to be at the heart of your organization's digital transformation initiatives. You're the IT pro everyone is trusting to balance two top business priorities: maximizing end-user productivity and minimizing threats. Modern management ensures you can do both. Download this customer experience to learn how two IT leaders describe how they are improving employee productivity and addressing complex management issues head-on with a modern approach to management.
Tags : 
    
VMware
By: E.ON     Published Date: Nov 21, 2018
Over three-quarters of UK manufacturers (77.8%) say that cost is the main driver behind their company’s energy policy, according to a survey of senior industry leaders conducted by Manufacturing Management in conjunction with E.ON. The survey, of nearly 50 leading UK manufacturers, examined the industry’s attitude to energy usage, the challenges it is facing and its plans for the future. To find out the results and the potential impacts to your business, download this whitepaper today.
Tags : 
    
E.ON
By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
By: Riverbed     Published Date: Nov 02, 2016
This eBook on hybrid enterprise and performance management talks about the three key challenges of performance management in today's hybrid enterprise: 1) lack of visibility 2) poor performance 3) limited control. It also suggests ways to regain control of the hybrid enterprise.
Tags : 
    
Riverbed
By: Logrhythm     Published Date: Feb 24, 2016
In this webinar, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.
Tags : 
logrhythm, cyber attacks, cyber threat, security, security application, application security, compliance, hacker detection
    
Logrhythm
By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses
    
Webroot UK
By: McAfee EMEA     Published Date: Mar 20, 2018
Bedrohungsvektoren entwickeln sich stetig weiter. In dieser Situation müssen IT-Sicherheitsentscheider effektive Lösungen für die Sicherheit von Endgeräten finden. Bei mehr als zwei Drittel der Unternehmen wurden im vergangenen Jahr sensible Daten kompromittiert. Die Reaktion auf solche Vorfälle ist mit großem Zeit- und (manuellem) Arbeitsaufwand verbunden – und selbst damit lassen sich die Probleme häufig nur für einen Teil der Endgeräte lösen. Sicherheitsentscheider wünschen sich deshalb integrierte Lösungen, die bei allen eingesetzten Endgerätetechnologien für mehr Effizienz, Übersicht und Schutz sorgen. Im Januar 2017 beauftragte McAfee Forrester Consulting, gängige Tools und Strategien für das Endgeräte-Sicherheits-Management sowie deren wahrgenommene Effektivität zu evaluieren.
Tags : 
    
McAfee EMEA
By: Dell Software     Published Date: Jul 24, 2012
With Quest Workspacetm Asset Manager, you can easily find data on hardware and software inventory and compare it to records on what's been purchased as well as what's actually in use. Centrally track and manage the IT contracts and licenses then generate usage reports automatically that you easily correlate to actual purchase costs and legal responsibilities. For managing software licenses, Quest Workspacetm Asset Manager goes beyond simply scanning and identifying software. It traces software usage through metering and quickly identifies if it's being underutilized, sitting idle or if the appropriate number of licenses have been purchased. From one solution, you can implement IT asset management best practices that eliminate overspending and ensure license compliance.
Tags : 
software data recognition, software management, software metering, multiple platform coverage, windows, mac os, software inventory, vmware
    
Dell Software
By: WatchGuard Technologies     Published Date: Apr 20, 2011
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Tags : 
watchguard application control, network app, p2p applications, network security appliance, watchguard xtm, firewall, threat management, application security
    
WatchGuard Technologies
By: WatchGuard Technologies     Published Date: Apr 20, 2011
Find out how it works and why it's actually possible now to move the battle for web security off your web servers.
Tags : 
cloud-based web security, cybercriminals, watchguard reputation enabled defense, web-based attacks, threat management, malware, url filtering, access control
    
WatchGuard Technologies
By: Oce Business Services     Published Date: Mar 24, 2008
IDC has found a direct correlation between effective document management and improved business performance. Yet recent research reveals that half of organizations rate their document process management processes as ineffective. This best-practices paper gives you insight into how you can reduce costs, increase productivity, mitigate risk and enhance business performance through the strategic outsourcing of document lifecycle management.
Tags : 
document management outsourcing, document process management, document lifecycle management, outsourcing document management, document management best practices, document process, document, oce
    
Oce Business Services
By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : 
webroot, email security, threats, spam, data security policy, knowledge management, performance management, encrytion
    
Webroot UK
By: Webroot UK     Published Date: Nov 11, 2009
The software-as-a-service model can help you stay ahead of Web and email threats without breaking the bank on infrastructure and management. Find out more in this whitepaper.
Tags : 
webroot, saas, software-as-a-service, web security, email security, threats, storage management, tco
    
Webroot UK
By: Webroot UK     Published Date: Nov 11, 2009
Service Subscription Takes the Headache Out of Email and Web Threat Management. Read this white paper about the Seven Reasons to Adopt SaaS Security.
Tags : 
webroot, security saas, web security, email security, security management, internet security, web service security, total cost of ownership
    
Webroot UK
By: SuccessFactors     Published Date: Apr 12, 2010
Learn how to get your entire organization working on the critical tasks that will move your business forward. Download the complimentary eGuide, "Driving Success: The Incredible Power of Company-wide Goal Alignment" today.
Tags : 
successfactors, goal alignment, human resource, employee goals, automated solution, business automation, company strategy, performance management system
    
SuccessFactors
By: EMC Corporation     Published Date: Mar 20, 2014
New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present.
Tags : 
emc, big data, incident response, malware detection, security journey, reduce risk, improve security, budget constraints
    
EMC Corporation
By: EMC Corporation     Published Date: Mar 20, 2014
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis
    
EMC Corporation
By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : 
shavlik security, system protection, automated patch management, risk, antivirus, patch deployment, manufacturing, anti virus
    
Shavlik Technologies
By: Shavlik Technologies     Published Date: Dec 15, 2010
Through its business relationship with HP, PZ Cussons utilises Shavlik NetChk Protect to simplify and automate the patch management process. View the list of benefits.
Tags : 
shavlik, pz cussons, automation, patch management process, customer delivery services, centralised management, patch management, business process automation
    
Shavlik Technologies
By: NetIQ     Published Date: Dec 23, 2010
This white paper describes three significant issues with Group Policy change management using native tools and describes a solution for applying best practices for change management.
Tags : 
netiq, change management, microsoft group policy, compliance auditing, recovery, auditing, compliance, disaster recovery
    
NetIQ
By: DataFlux     Published Date: Jan 07, 2011
This white paper introduces and examines a breakthrough platform solution designed to drive parallel-process data integration - without intensive pre-configuration - and support full-lifecycle data management from discovery to retirement.
Tags : 
dataflux, enterprise data, data integration, configuration, lifecycle data management, data warehouses, enterprise software, product lifecycle management
    
DataFlux
By: Egencia     Published Date: Jul 17, 2014
Demystifying Managed Travel
Tags : 
egencia, travel, human resources, webinar, travel management, crisis management
    
Egencia
By: Asure Software     Published Date: Jun 21, 2012
A school district in Missouri sought to optimize the booking and scheduling of its newly modernized conference and meeting spaces. Its old scheduling software was frustrating, as it was difficult to customize and configure. But after installing Meeting Room Manager, the schools are able to set specific room and equipment configurations, and post activities online as well as on a public viewing screen. Learn more.
Tags : 
asure software, human resources, technology, hr management, productivity, employee
    
Asure Software
By: Asure Software     Published Date: Jun 21, 2012
A school district in Missouri sought to optimize the booking and scheduling of its newly modernized conference and meeting spaces. Its old scheduling software was frustrating, as it was difficult to customize and configure. But after installing Meeting Room Manager, the schools are able to set specific room and equipment configurations, and post activities online as well as on a public viewing screen. Learn more.
Tags : 
asure software, human resources, technology, hr management, productivity, employee
    
Asure Software
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter