• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

hr management

Results 351 - 375 of 986Sort Results By: Published Date | Title | Company Name
By: Oracle HCM Cloud     Published Date: Jun 07, 2016
The retail market is growing, presenting employees with more opportunities to find jobs that provide training, development and career progression-something today’s workforce demands. With improvement in the retail sector comes increased pressure to win the war for talent. This three-step checklist will help you identify your talent management strengths and weaknesses so you can recruit and retain the best people.
Tags : 
    
Oracle HCM Cloud
By: Oracle HCM Cloud     Published Date: Jun 07, 2016
Leveraging analytics to drive business growth is top-of-mind for corporate (C-Suite) leaders, prompting HR executives to take a more strategic, data-driven approach to workforce management. Learn the art and science of combining workforce data, business data and IT expertise together to allow HR departments to make more effective and efficient decisions about people.
Tags : 
    
Oracle HCM Cloud
By: Centrify     Published Date: May 26, 2016
This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.
Tags : 
data security, security, cyber attacks, threat and vulnerability management, access control, application security, hacker detection, security management
    
Centrify
By: Pega     Published Date: May 25, 2016
The customer experience is critical in today’s fast-paced, demanding world. With so many options at the buyer’s fingertips and the rise of social sharing media, one bad customer experience can haunt an organization. According to” The Forrester Wave™: Dynamic Case Management, Q1 2016” report, in order to improve customer experience, firms must tackle the incident process through smart handling of exceptions, applying analytics for context, and offering real-time and mobile interaction. Here is where dynamic case management (DCM) can be a competitive advantage and Forrester identified 14 of the most significant vendors across 21 criteria in this space with Pegasystems among vendors who lead the pack. Download this Forrester Wave report to see the full 21-criteria evaluation of the dynamic case management (DCM) market and gain insight into the 14 most significant software vendors in order to help enterprise architecture (EA) professi
Tags : 
case management, forrester, dynamics, enterprise, best practices, business integration, business intelligence, enterprise software, software outsourcing
    
Pega
By: VMware AirWatch     Published Date: May 24, 2016
IT-Abteilungen müssen ihre BYOD-Anwender dazu anhalten, durch die Einbindung in enterprise mobility management (EMM) den unbefugten Zugriff auf Unternehmensnetzwerke zu minimieren und Sicherheitsverletzungen zu vermeiden. Um die Mitarbeiter von der Lösung zu überzeugen, müssen die Unternehmensleitung und das IT-Personal ihnen die Vorteile des Programms erläutern. Positionieren Sie BYOD als echten Vorteil. Mit BYOD können die Mitarbeiter selbst entscheiden, wie und mit welchem Gerät (etwa ihrem eigenen) sie arbeiten möchten. Auf den Geräten der Mitarbeiter sind in der Regel bereits Apps und Tools installiert, die die Benutzer als hilfreich betrachten. Dies erweist sich für Mitarbeiter wie Arbeitgeber als Vorteil. Die Betonung der Flexibilität und der Wahlmöglichkeiten von BYOD trägt dazu bei, dass das Programm als eine Lösung angenommen wird, die den Mitarbeitern eine höhere Produktivität und Effizienz ermöglicht.
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management, application integration, business integration, project management
    
VMware AirWatch
By: Dynatrace     Published Date: May 24, 2016
This guide, compiled from numerous client interviews, best practices and real-life project experiences, will: - Walk you through tools like the Gartner Magic Quadrant - Provide organized criteria to evaluate vendor capabilities in detail - Define why these criteria matter - Give you an example of the typical evaluation process and timeline for an Application Performance Management buyer
Tags : 
dynatrace, vendor selection, gartner magic quadrant, application performance management, enterprise applications
    
Dynatrace
By: VMware AirWatch     Published Date: May 19, 2016
Innovation in business mobility is adding up to opportunity for the enterprise— opportunity to accelerate employee productivity, increase collaboration, and streamline business processes through mobile applications. At the same time, IT organizations are keen to control costs and maintain safeguards around their corporate information. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. But how do you know your organization is poised to make the move to EMM, or if you should be leveraging more from an existing EMM solution? Here are five cues to consider that the time is right to adopt EMM for your organization.
Tags : 
innovation, opportunity, best practices, productivity, mobile, application, mobile computing, application integration
    
VMware AirWatch
By: VMware AirWatch     Published Date: May 18, 2016
VMware AirWatch gives enterprises identity, productivity and collaboration solutions through enterprise mobility management. The VMware AirWatch platform gives end users a seamless digital workspace, so they can be more effective on the go. A future-proof mobility platform enables IT to support business initiatives now and in the future with features: • Broadest OS and device support with same-day updates • Unified identity management framework across solutions • Suite of integrated productivity and collaboration apps • Centralized content management and collaboration • Global scalability with multi-tenant framework AirWatch offers a unique vision for identity, mobile, network and Infrastructure that is trusted by more than 16,000+ organizations, including 500 of the Global 2000, and has been positioned as a leader by Gartner in the 2015 Magic Quadrant for Enterprise
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management, collaboration, contact management, content delivery, content integration, content management system
    
VMware AirWatch
By: SolidFire_NetApp     Published Date: May 10, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions delivered via Software as a Service (SaaS). More than 2,800 customers with employees in 150 countries count on Ultimate’s award-winning UltiPro® suite to unite all aspects of HR, payroll, and talent management throughout the employee life cycle, all supported by powerful reporting and analytics.
Tags : 
software, network management, network solutions, best practices, business intelligence, productivity, business optimization, application integration, business management
    
SolidFire_NetApp
By: IBM     Published Date: May 09, 2016
Agile methods have proven effective for software development and have grown in popularity across a number of software disciplines. Agile methods build capabilities using an iterative approach, as opposed to traditional approaches where requirements are defined early and designs are completed in full before a single line of code is written. Agile incrementally defines requirements with priorities, partial component designs and working systems that evolve through iterations called sprints. The question remains, however: Do the 12 agile principles apply to more than just software? Agile principles are in line with lean management’s approach. Given that, it seems as though agile principles should directly apply beyond software development. However, the answer is not straightforward, because differences between software and physical components affect how agile is applied. Let’s explore how agile can be applied in light of these differences.
Tags : 
ibm, continuous engineering, watson, iot, internet of things, agile, product development, software development, productivity, project management
    
IBM
By: SAP     Published Date: May 03, 2016
Discover why analytics may be the key to revolutionizing performance management and other HR processes.
Tags : 
sap, performance management, simplify, employee, management, enterprise applications, human resource technology
    
SAP
By: Microsoft Office 365     Published Date: Apr 14, 2016
Take a guided tour of the new Office 365. It’s a quick and easy way to test drive new enterprise capabilities, including advanced collaboration, analytics, and security features. Step through common enterprise scenarios to see how Office 365 can support your business needs See the latest in-product experience with the most up-to-date versions of the Office applications you use every day as well as the new advanced features Explore the top features and advanced capabilities available for email and calendar management, collaborative meetings, analytics, and security
Tags : 
    
Microsoft Office 365
By: MuleSoft     Published Date: Apr 13, 2016
New Enterprise challenge has emerged. With the number of APIs growing rapidly, managing them one-off or via Excel or corporate wiki is no longer feasible. The smartest organizations have discovered a set of best practices to design powerful APIs that leverage existing services, to effectively manage those APIs throughout their lifecycle and to scale their deployment across consumers and devices. This eBook examines the relationship between APIs and services and presents the key elements of a successful API strategy in the form of 7 habits. In this eBook you will learn: - How to leverage existing services in the API economy - Where to get started with your API strategy - Key criteria for selecting an API Management solution - Strategies to overcome API security and identity challenges - How and why to apply the fundamentals of API First Design
Tags : 
service management, enterprise applications, best practices, business management, business strategy, application integration, business intelligence, service oriented architecture, web service management, content management system
    
MuleSoft
By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
By: Intel Security     Published Date: Apr 06, 2016
Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, incident response, forensics, compliance
    
Intel Security
By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : 
siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
    
Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This solution guide discusses how IT incident responders can unify the Protect, Detect, and Correct stages of managing threats in order to build a comprehensive security model that more efficiently combats targeted attacks.
Tags : 
threat management, adaptive security model, targeted attacks, agile, architecture, cybercrim, security connected framework, detection, analysis, intelligence
    
Intel Security
By: Microsoft Office 365     Published Date: Apr 05, 2016
Take a guided tour of the new Office 365. It’s a quick and easy way to test drive new enterprise capabilities, including advanced collaboration, analytics, and security features. Step through common enterprise scenarios to see how Office 365 can support your business needs See the latest in-product experience with the most up-to-date versions of the Office applications you use every day as well as the new advanced features Explore the top features and advanced capabilities available for email and calendar management, collaborative meetings, analytics, and security
Tags : 
    
Microsoft Office 365
By: IBM     Published Date: Apr 04, 2016
"Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats. Read the ebook to learn: The principles of attack prevention How security tools work together to protect an organization IBM's tools for prevention, detection, and response"
Tags : 
ibm, integrated threat management, threat mitigation, threat management, security, knowledge management, network security
    
IBM
By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management, network security
    
IBM
By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security, knowledge management, network security
    
IBM
By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud, security, knowledge management, enterprise applications, network security
    
IBM
By: Dyn     Published Date: Mar 30, 2016
New cloud-based Internet performance management (IPM) services are changing the way organizations monitor, control and optimize their online infrastructures. They fill the gap APM and NPM tools leave behind by providing valuable insights into the dynamics of the Internet so you can make better informed network planning and partnering decisions. The results, you deliver a consistent and reliable customer experience, protecting your brand and your revenue.
Tags : 
dyn, cloud, ipm, apm, npm, cloud computing
    
Dyn
By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter