hr professionals

Results 1 - 25 of 105Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Feb 14, 2019
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article from Dell and Intel® to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell EMC
Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya
Published By: Oracle     Published Date: Mar 21, 2019
If you’re like other HR professionals, you wonder what more you could do to drive business growth. In our latest research, we asked 5,000 decision-makers their views of the role of innovation in driving business growth. You’ll learn: • Why HR feels limited by innovation teams being too separated from their organisation’s core business • The six processes for idea generation and project delivery • Which leadership behaviours HR finds valuable in supporting innovation culture Our research uncovers the key innovation challenges they face, key execution issues, and the barriers to true innovation. See what HR leaders think
Tags : 
    
Oracle
Published By: Anaplan     Published Date: Mar 12, 2019
What’s the state of planning in finance? Our annual benchmarking report, The State of Connected Planning, investigates how leading organizations accelerate business value through Connected Planning. We surveyed over 1,000 planning professionals across all business functions in 45 countries and 18 industries to uncover leading planning trends. This finance-focused brief contains: • Key findings from finance professionals • Challenges faced by finance professionals • How they believe they can improve their planning processes
Tags : 
    
Anaplan
Published By: PCRecruiter     Published Date: Oct 28, 2010
Only a decade or so ago, those human resources professionals who hadn't yet found their way onto the Internet were finding themselves increasingly left out in the cold. As we slip swiftly into the second decade of the 21st century, it's those whohaven't yet begun to participate in 'social media and networking' that are starting to feel the chill.
Tags : 
pcrecruiter, recruiting, social networking, network, facebook, twitter, email program, networking, databases
    
PCRecruiter
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Dell EMC EMEA     Published Date: Nov 23, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of front line detection and are shifting priorities to close gaps that place their organizations at risk. Learn more about Dell solutions powered by Intel®
Tags : 
    
Dell EMC EMEA
Published By: Oracle     Published Date: Mar 07, 2019
If you’re like other HR professionals, you wonder what more you could do to drive business growth. In our latest research, we asked 5,000 decision-makers their views of the role of innovation in driving business growth. You’ll learn: • Why HR feels limited by innovation teams being too separated from their organisation’s core business • The six processes for idea generation and project delivery • Which leadership behaviours HR finds valuable in supporting innovation culture Our research uncovers the key innovation challenges they face, key execution issues, and the barriers to true innovation. See what HR leaders think
Tags : 
    
Oracle
Published By: Entrust Datacard     Published Date: Feb 05, 2016
Given the finite lifespan of SSL certificates and their widespread use throughout an organization, there are numerous reasons to take a lifecycle management approach. It’s critical to maintain an accurate accounting of SSL certificates that doesn’t rely on manual processes and tools. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
    
Entrust Datacard
Published By: Websense     Published Date: Apr 09, 2013
This report focuses on significant changes in the global threatscape during the year, offering insights from several perspectives. Our goal is to help security professionals improve the effectiveness of existing security solutions, and identify and prioritize security gaps that may require new approaches and more innovative strategies.
Tags : 
websense, 2013, threat report, cyber, websites, effectiveness, security, solutions, strategies
    
Websense
Published By: Iron Mountain     Published Date: Aug 28, 2014
This paper examines a new paradigm for Health Information and Records Management (HIRM) and provides practical guidance to help HIM professionals unwind paper records, offload the burden of low-value production work and lead the transition from traditional records management to an optimized HIRM model.
Tags : 
iron mountain, health information management, information governance, healthcare it, electronic health records, ehr, him, him professionals, hirm, records management
    
Iron Mountain
Published By: Dell     Published Date: Aug 08, 2018
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of frontline detection and are shifting priorities to close gaps that place their organizations at risk.
Tags : 
    
Dell PC Lifecycle
Published By: Teradata     Published Date: Jan 28, 2015
Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.
Tags : 
teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce, warehouse
    
Teradata
Published By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : 
security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring, security threats
    
Viavi Solutions
Published By: NetApp     Published Date: Sep 29, 2014
As cloud deployments accelerate, there's no question that Federal agencies are reaping the benefits – improved agility, less IT complexity, and greater collaboration through shared services. But, while the benefits are clear, concerns around data stewardship and management can stop migrations in their tracks. So how are Federal agencies dealing with the control challenge? To find out, MeriTalk surveyed 153 Federal IT professionals closely involved in their agency's cloud implementations.
Tags : 
cloud control, it complexity, collaboration, data management, cloud implementations, it management
    
NetApp
Published By: SAP     Published Date: Jun 04, 2015
Tracking and assessing workforce-diversity programs shouldn’t be hard work, but it should be a top priority. Because businesses benefit when they employ highly engaged workers with different backgrounds, HR leaders and hiring professionals contribute directly to a company’s success when diversity programs meet their goals. How can you create or transition to an effective tracking-and-assessment method? In this white paper you will find fifteen metrics that are a great place to start.
Tags : 
    
SAP
Published By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Tracking and assessing workforce-diversity programs shouldn’t be hard work, but it should be a top priority. Because businesses benefit when they employ highly engaged workers with different backgrounds, HR leaders and hiring professionals contribute directly to a company’s success when diversity programs meet their goals. How can you create or transition to an effective tracking-and-assessment method? In this white paper you will find fifteen metrics that are a great place to start.
Tags : 
    
SuccessFactors, an SAP Company
Published By: CA Technologies     Published Date: Jun 01, 2018
Today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders - both malicious insiders and negligent insiders. This survey is designed to uncover the latest trends and challenges regarding insider threats as well as solutions to prevent or mitigate insider attacks. Our 400,000 member online community, Cybersecurity Insiders, in partnership with the Information Security Community on LinkedIn, asked Crowd Research Partners to conduct an in-depth study of cybersecurity professionals to gather fresh insights, reveal the latest trends, and provide actionable guidance on addressing insider threat.
Tags : 
    
CA Technologies
Published By: Workday     Published Date: Nov 22, 2017
The critical trends that are reshaping the world of work are colliding with the changing demographic profile of the employees and shifting expectations of the work experience. Despite an uncertain future, there is optimism in the air. The events of 2016 and early 2017 have set a course of change that brings the promise of more equity and transparency and more accountable decision making. An overarching theme of Empowerment permeates how business leaders. HR professionals, and employees are viewing the world of work, both today and in the future.
Tags : 
    
Workday
Published By: IBM APAC     Published Date: Mar 06, 2019
A cyber resilient enterprise is one that can prevent, detect, contain and recover from a myriad of serious threats against data, applications and IT infrastructure. The Ponemon Institute and IBM surveyed more than 2,848 IT and IT security professionals from around the world and released the findings of the third annual study on the importance of cyber resilience for a strong security posture.
Tags : 
    
IBM APAC
Published By: Lumesse     Published Date: May 28, 2015
This report shows how building talent, leadership and agility advantages are the top three HR imperatives for businesses to create a sustained competitive edge.
Tags : 
hr trends, talent, leadership, agility, hr functions, digital, digital hr, lumesse, technology, hr technology, hr professionals, hr decision-makers
    
Lumesse
Published By: Taleo     Published Date: Apr 11, 2011
The next generation of employees will have a huge impact on your workplace. Generation Y is more connected than ever. Gen Y expert Ryan Healy answers many of the questions HR professionals have about this distinctive group.
Tags : 
ryan healy, brazen careerist, generation y, gen y, workplace, taleo, diversity, generation mix, retention, technology, social media, gen yers, webinar, statistics
    
Taleo
Published By: Taleo     Published Date: Apr 11, 2011
Create an environment where employee and managers can track assigned activities, communicate job performance expectations, and define goals that are aligned to business objectives. Performance management ensures that everyone is focused on the right initiatives to deliver results.
Tags : 
taleo, performance review, business strategy, performance management, goal management, reporting, analysis, compensation, saas, qualitative goals, quantitative goals, organizational objectives, hr professionals
    
Taleo
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee