hr rpo

Results 1 - 25 of 209Sort Results By: Published Date | Title | Company Name
Published By: 123Together     Published Date: Dec 04, 2008
Microsoft Exchange Server has been a crucial technological breakthrough in advanced corporate communication systems. Companies who utilize an enterprise-class email server like Exchange believe that email is mission critical, and value the productivity it enables. But an in-house migration to Exchange 2007 from an earlier version of Exchange or another email program will not be an easy task. Complexity, time and cost issues loom large over the IT department and are causing IT directors to search for an alternative solution.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, migration, osterman, collaboration, mobile services
    
123Together
Published By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : 
byod, policy, guide, mobile, security, cloud, apps, administration, device
    
Absolute Software
Published By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : 
byod, workforce mobility, enpoint protection, mobile devices, absolute software
    
Absolute Software
Published By: Achievers     Published Date: Mar 21, 2012
The key to unlocking performance and growth is aligning the actions and goals of employees with the priorities of the organization. Read Aberdeen's research on Rewards and Recognition to learn how to align employees to your organization and inspire performance.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials, retention, engage, business results, corporate culture
    
Achievers
Published By: Achievers     Published Date: Mar 21, 2012
Organizations spend over $48 billion per year on employee rewards and recognition programs; however there are critical limitations to the traditional approach. In this research bulletin, Bersin & Associates discusses how Rewards and Recognition has changed to cater today's workforce.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials, retention, engage, business results, corporate culture
    
Achievers
Published By: Achievers     Published Date: Oct 01, 2012
The key to success is driving employee performance, through recognizing the right behaviors that impact the big picture. Read Paul Hebert's whitepaper to learn how one recognition platform can help you cut costs and increase efficiency.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials, retention, engage, business results, corporate culture, company values, employee behaviors
    
Achievers
Published By: Achievers     Published Date: Oct 01, 2012
Did you know most companies have an employee recognition program, but their employees don't know it? Read Bersin's report and learn why this topic is not only important, but the key lever to business success.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials, retention, engage, business results, corporate culture, company values, employee behaviors
    
Achievers
Published By: Achievers     Published Date: Jan 17, 2014
Today’s workforce is fundamentally changing. Organizations are flatter, more agile, and require even better retention strategies. HR professionals and business leaders agree on the importance of attracting, retaining, and cultivating top talent. An employee rewards and recognition program that has the buy-in and support of business leaders can transform your corporate culture, making your organization a great place to work, building your brand as a top employer, delighting your customers with your service, and reaping the financial benefits that come from Employee Success. Download this white paper, Obtaining executive buy-in for recognition programs, and obtain best practices to sell the vision of a rewards and recognition program to your CFO.
Tags : 
employee success, employee recognition, employee engagement
    
Achievers
Published By: Acronis     Published Date: Apr 26, 2011
In this paper we introduce initiatives you can put into effect to survive and thrive in our virtualized world. Then we show how Acronis virtual solutions can save administration time, lower IT expenses and improve your ability to meet both RTO and RPO goals.
Tags : 
acronis, server consolidation, disaster recovery, backup and recovery, virtual server backup, virtual server, backup, vmare backup
    
Acronis
Published By: Akamai Technologies     Published Date: Dec 11, 2018
The challenges that IT security professionals face grow more complex daily: Cyberthreats are sophisticated and ever-evolving, the workforce is varied and mobile, and access to the corporate network must be customized and efficient.
Tags : 
    
Akamai Technologies
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data, it management, knowledge management, enterprise applications
    
Aternity
Published By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
    
Blue Coat
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application, technology, solution, networking, wireless, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile, workforce, bluecoat, security
    
Blue Coat Systems
Published By: BMC Software     Published Date: Jul 22, 2015
This white paper discusses three key principles for creating a new approach to change management—one that allows the IT department to manage change more effectively. -Automate with purpose: eliminate risk and do it sooner rather than later -Move from data to insight: make better decisions with contextual data -Empower the occasional user: make the experience simple and intuitive
Tags : 
change management, risk, automation, contextual data, user experience
    
BMC Software
Published By: Brainshark     Published Date: Oct 16, 2013
94% of Fortune 500 companies have either adopted iPads or are rolling out pilot programs - what does this mean for your company? This report examines enterprise tablet adoptions and trends, iPad usage in the enterprise, and the benefits of leveraging the iPad for sales, training and corporate communications.
Tags : 
sales enablement, sales training, sales productivity, training, marketing, byod, mobile, mobile sales, sales mobility, powerpoint, ppt, presentation, video, video training, ipad, iphone, smartphone, tablet, corporate learning
    
Brainshark
Published By: Brainshark     Published Date: Oct 16, 2013
"Getting employees to understand and take advantage of benefits during open enrollment periods is big challenge for many HR managers. This paper looks for new ideas on communicating benefit plans from professional marketers, knowledge management experts, and social media gurus."
Tags : 
human resources, training, compliance, onboarding, new hire, orientation, open enrollment, employee benefits, certification, corporate learning, lms, learning management system, tracking, communications, employee satisfaction
    
Brainshark
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Growing your enterprise is an ongoing priority. And, as the application economy continues to expand, it’s likely that you’re looking at digital business initiatives to fuel a significant portion of that growth. Among the most promising objectives of such a strategy are: • Providing superior digital experiences for consumers though mobile • Expanding markets and revenue streams through multiple channels • Connecting employees and partners to enterprise data anywhere, anytime • Launching innovative new services for the Internet of Things (IoT) Successfully executing a digital strategy requires the ability to launch new apps and coordinate your digital presence with partners. Application Programming Interfaces (APIs) create the connectivity required to share enterprise data and digital content with those apps and partners over the Internet. APIs are a critical component of digital business—empowering developers to build apps across any channel and enabling partners to incorporate your dat
Tags : 
    
CA Technologies EMEA
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management
    
CDW
Published By: CDW Vmware     Published Date: Aug 02, 2012
As with many enterprises today, your data center houses critical IT components that your business depends on. But are they fully secure and protected from potential threats such as intruders or natural disasters? A data recovery plan is very important to be fully prepared in the event of a disaster.
Tags : 
quick, start, data, recovery, vmware, enterprise, data, center, components, protect, recover, secure, threat, intruders, natural disaster, recovery, plan, event, disaster, critical
    
CDW Vmware
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : 
custom defense, security threats, enterprise networks, intellectual property, networking, security, it management
    
CDW-Trend Micro
Published By: Cherwell Software     Published Date: Apr 24, 2019
Each year, a total of 180,000 IT service tickets are created and processed. These include requests and incidents of all kinds, such as the provision of the flight information displays, an employee request for a laptop, through to IT equipment for an airline customer. The Airport’s IT team therefore decided to undertake a complex and ambitious project, entitled “ITSM 2020,” which aimed to establish a uniform and future-oriented IT service management system that would effectively and efficiently serve all areas of Munich Airport. Munich Airport evaluated various bidders in a two stage process conducted on the basis of the European Union tendering procedures. Cherwell was able to hold its own against other ITSM solutions both technically and in terms of price.
Tags : 
    
Cherwell Software
Published By: Cirque Du Soleil     Published Date: Apr 04, 2017
We know “company event” is not the first thing that comes to mind when thinking about Cirque du Soleil. Cirque is known for its unique style of high quality entertainment, artistic acts that defy gravity and performances that remain in the guests’ hearts long after they have seen them…which is all the more reason why our shows are the perfect setting for a corporate outing!
Tags : 
corporate events, events, event catering, company events, event planning, company outing, entertainment
    
Cirque Du Soleil
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee