hr rpo

Results 101 - 125 of 208Sort Results By: Published Date | Title | Company Name
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture
    
ESET
Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard
Published By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security, it management
    
EMC Corporation
Published By: Acronis     Published Date: Apr 26, 2011
In this paper we introduce initiatives you can put into effect to survive and thrive in our virtualized world. Then we show how Acronis virtual solutions can save administration time, lower IT expenses and improve your ability to meet both RTO and RPO goals.
Tags : 
acronis, server consolidation, disaster recovery, backup and recovery, virtual server backup, virtual server, backup, vmare backup
    
Acronis
Published By: OpenText     Published Date: Jun 06, 2012
In this paper, we look at the threats to a company's brand, which are especially acute in a world of globalization, multinational corporations, Internet commerce, social media, and electronic file sharing.
Tags : 
marketing, branding, opentext, social media, emerging marketing
    
OpenText
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats, security
    
Skillsoft
Published By: Heroix     Published Date: Oct 15, 2012
Download this whitepaper to look at three ways IT performance monitoring can help meet multiple goals, to save corporate dollars and improve the company's performance.
Tags : 
it performance, it infrastructure, it resources, business technology
    
Heroix
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
Through deep analysis of social data, we seek to discover opportunities for agencies to streamline the production of compelling content to incorporate into a pitch deck. We discuss our research findings, and explain the implications for creative, media, and full-service agencies.
Tags : 
social intelligence, agency pitch, analytics, campaign roi
    
Crimson Hexagon
Published By: RightAnswers     Published Date: Sep 04, 2013
Every day, technology plays a bigger and bigger role throughout corporate America, corporate success becomes increasingly dependent on productive use of information technology – and IT support grows more critical. But while excellent IT support rapidly returns users to productive work, the information necessary to that excellence is often fragmented in different parts of the IT organization. Effective knowledge management empowers service desks – and even users themselves – by enabling quick, accurate and consistent user solutions. That leads to measureable benefits for your business. This brief explores 20 metrics that measure those benefits – in other words, your “return on knowledge.”
Tags : 
return on knowledge, knowledge management, rightanswers, knowledge, measuring business benefits, crm, customer relationship management, crm, b2b
    
RightAnswers
Published By: Cherwell Software     Published Date: Apr 24, 2019
Each year, a total of 180,000 IT service tickets are created and processed. These include requests and incidents of all kinds, such as the provision of the flight information displays, an employee request for a laptop, through to IT equipment for an airline customer. The Airport’s IT team therefore decided to undertake a complex and ambitious project, entitled “ITSM 2020,” which aimed to establish a uniform and future-oriented IT service management system that would effectively and efficiently serve all areas of Munich Airport. Munich Airport evaluated various bidders in a two stage process conducted on the basis of the European Union tendering procedures. Cherwell was able to hold its own against other ITSM solutions both technically and in terms of price.
Tags : 
    
Cherwell Software
Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility, business technology
    
LogRhythm
Published By: LogRhythm     Published Date: Aug 08, 2016
Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. Kaspersky Lab reports that in 2015, its solutions detected ransomware on more than 50,000 computers in corporate networks—double the figure for 2014. Even at this rate of detection, Kaspersky admits that the real number of incidents is several times higher than what has been detected and reported.1 In just the first quarter of 2016, $209 million was paid out to cyber criminals using ransomware. The FBI estimates that losses to be incurred in 2016 due to ransomware will top $1 billion.2 Once again, this is just the tip of the iceberg.
Tags : 
security, technology, best practices, information technology, business technology
    
LogRhythm
Published By: Kronos     Published Date: Jul 26, 2017
With the pace of human resources technology solution development progressing quickly, HR leaders need to gain a solid understanding of the HR system options available. This tool is designed to help HR leaders build a business case for investing in next-generation HR systems to meet the growing HR demands of your organization. Demands include interfacing or integrating data, incorporating social and mobile technologies, and providing an employee experience that grows from the experience given to candidates.
Tags : 
interfacing data, integrating data, mobile technologies, social technologies, employee experience
    
Kronos
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Procore     Published Date: May 13, 2019
A huge portion of the world’s economy is managed through Excel; from small businesses all the way up to Fortune 500 corporations. But even the most experienced user can make mistakes, and Excel was not designed to be forgiving of errors. Nearly 90% of all large spreadsheets contain serious errors, with a 1.79% chance of error per cell. Download this eBook to learn: • The key concerns of Excel in construction • Alternatives to the Excel software • What to look for in these alternatives
Tags : 
    
Procore
Published By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore
Published By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation, security, it management
    
F5 Networks Inc
Published By: Oracle     Published Date: Apr 05, 2016
While the cloud can be a disruptive force, this global survey, conducted by Harvard Business Review and sponsored by Oracle, shows it is no longer a divisive one. The cloud is emerging as a unifying force that’s forging tighter collaboration between business and IT managers to drive innovation. The survey debunks three myths around implementing a public and/or private cloud strategy, including whether corporate systems need public cloud app data and how aligned IT and business are when it comes to the cloud.
Tags : 
cloud services, cloud management, best practices, information technology, business strategy
    
Oracle
Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses, networking, security, enterprise applications
    
Webroot UK
Published By: Achievers     Published Date: Jan 17, 2014
Today’s workforce is fundamentally changing. Organizations are flatter, more agile, and require even better retention strategies. HR professionals and business leaders agree on the importance of attracting, retaining, and cultivating top talent. An employee rewards and recognition program that has the buy-in and support of business leaders can transform your corporate culture, making your organization a great place to work, building your brand as a top employer, delighting your customers with your service, and reaping the financial benefits that come from Employee Success. Download this white paper, Obtaining executive buy-in for recognition programs, and obtain best practices to sell the vision of a rewards and recognition program to your CFO.
Tags : 
employee success, employee recognition, employee engagement
    
Achievers
Published By: Varicent Software Incorporated     Published Date: Dec 20, 2011
This model captures leading market characteristics and stages of innovation for the next three to five years in order to aid executives, managers and practitioners in planning SPM initiatives that best match corporate needs and capacities for implementing new technologies.
Tags : 
michael dunne, former gartner analyst, sales performance management, incentive compensation, variable pay, spm, icm, sales compensation
    
Varicent Software Incorporated
Published By: Microsoft     Published Date: Jul 20, 2018
This guide presents a structured approach for designing cloud applications that are scalable, resilient, and highly available. The guidance in this ebook is intended to help your architectural decisions regardless of your cloud platform, though we will be using Azure so we can share the best practices that we have learned from many years of customer engagements. In the following chapters, we will guide you through a selection of important considerations and resources to help determine the best approach for your cloud application: 1. Choosing the right architecture style for your application based on the kind of solution you are building. 2. Choosing the most appropriate compute and data store technologies. 3. Incorporating the ten high-level design principles to ensure your application is scalable, resilient, and manageable. 4. Utilizing the five pillars of software quality to build a successful cloud application. 5. Applying design patterns specific to the problem you are trying to
Tags : 
    
Microsoft
Published By: Kaspersky Lab     Published Date: Aug 14, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it’s imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : 
kaspersky, kaspersky lab, security, cyberthreats, corporate cyberthreats, it security, data protection
    
Kaspersky Lab
Published By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : 
byod, workforce mobility, enpoint protection, mobile devices, absolute software
    
Absolute Software
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee