RSS feed Get our RSS feed

News by Topic

assessments

Results 76 - 100 of 102Sort Results By: Published Date | Title | Company Name
By: Cornerstone OnDemand     Published Date: Feb 05, 2018
58% of executives believe their current performance management approach neither drives engagement nor leads to high performance. It’s high time to make some changes and adapt performance management strategies to better reflect the changing dynamics of the modern workforce and ensure employees reach their potential. Check out “10 Counterproductive Performance Management Assumptions You're Still Making” and see how you can improve your talent development initiatives to increase the productivity and impact of your employees. In this ebook, we'll touch on: • how goals are set and achieved • flaws and biases in manager's assessments • what truly motivates employees • and more Download your copy and get started!
Tags : performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software
     Cornerstone OnDemand
By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
     McAfee
By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
     McAfee
By: IBM     Published Date: Aug 21, 2013
Have you ever found yourself in this untenable position? Your web team and email program owners are targeting the same customers, with different offers, or worse, competing offers. Siloed systems and teams limit marketers’ ability to make sound assessments about performance and spending. Marketers around the world spend over one trillion USD each year. Yet, most of them still manage their marketing programs with a hodgepodge of spreadsheets and disconnected applications. Unnecessary costs, delays and poor collaboration plague marketers. Under increasing pressure to connect with customers while doing more with less, marketers who strive to optimize marketing performance through a single integrated software platform can make the best use of people, programs and resources. Today, you need a return on every dollar spent and a platform that aligns technology, people and processes to help create effective, efficient marketing programs that support customers for life.
Tags : enterprise marketing management, marketing management, marketing roi, marketing connections, marketing performance, return on investment, marketing optimization
     IBM
By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : alienvault, threat intelligence, vulnerability assessments, vulnerability data, security
     AlienVault
By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value
     AlienVault
By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
     Palo Alto Networks
By: IBM     Published Date: Oct 10, 2014
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : ibm, requirements management, risk analysis, conformance assessments, addressing complexity, manage requirements, manage compliance
     IBM
By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : hackers, information technology, symantec, verisign, web applications, security
     Symantec
By: IBM     Published Date: Mar 10, 2015
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : ibm, oil industry, gas industry, requirements management, risk analysis, conformance assessments
     IBM
By: IBM     Published Date: Aug 21, 2008
Assessments are the key tools for uncovering vulnerabilities in your security that may be well hidden. This webinar explains how your organization can gain value and insight from the various types of security assessments that safeguard the confidentiality, integrity and availability of your critical business data.
Tags : ibm, ibm mi, ibm grm, security
     IBM
By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : web application security, testing web applications, cenzic, assessments for web applications, security
     Cenzic
By: Ecora Software     Published Date: Aug 15, 2007
Our guide shows you how automation can create a sustainable control and reporting system – a must-have with mandated quarterly and annual assessments. If you've already prepared for, and experienced, your first Sarbanes-Oxley audit, you'll want to read this guide on sustainability.
Tags : sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
     Ecora Software
By: Archway     Published Date: Nov 21, 2008
The role of marketing is constantly changing. As budgets shrink and demands grow, marketing departments across the country are being carefully scrutinized for their effectiveness. Top executives are holding marketers more accountable, which means they must not only deliver results, but also find ways to measure the actual bottomline impact of their marketing initiatives.
Tags : archway, roi, marketing operations management, outsourcing, business assessments, market planning, product procurement
     Archway
By: Profiles International     Published Date: Aug 30, 2010
Download this guide we'll provide you with the Top 5 Strategies for Motivating and Retaining Top-Performing Employees: Employee Orientation, Performance Evaluations, Occupational Assessments, Succession Planning
Tags : retention, keeping employees
     Profiles International
By: Diligent     Published Date: Jan 18, 2011
This paper describes the need for proactive operations/risk assessments
Tags : risk, operations, investor, investment, diligence, process, infrastructure, iso-9000
     Diligent
By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : security
     BitSight Technologies
By: IBM     Published Date: Sep 29, 2015
Assessments made in pre-hire.
Tags : pre-hire, assessments, recruitment, talent
     IBM
By: IBM     Published Date: Jan 06, 2016
Companies are always looking for ways to determine just how effective and capable candidates can be in the workplace before they start.
Tags : assessment anayltics, ibm, performance, quality, maximize
     IBM
By: IBM     Published Date: Jul 20, 2016
In this presentation you’ll see and learn: - How companies are implementing pre-hire reference assessments - What pre-hire assessments can do for your company - How they decrease turnover amongst high performers - Why they lead to higher employee job performance - How they enable top companies to identify the highest potential candidates available
Tags : ibm, employee engagement, smarter workforce, pre-hire assessments
     IBM
By: IBM     Published Date: Jul 20, 2016
- Learn how the best companies use online assessment analytics to predict candidate performance - Find out about the analytics intelligence used to improve quality of new hires - Learn how assessments can be used to maximize employee breakthrough performance
Tags : ibm, employee engagement, smarter workforce, pre-hire assessments, assessment analytics
     IBM
By: IBM     Published Date: Jul 21, 2016
Watch this webinar and learn how you can: - Hire for leadership behaviors - Identify high potential leaders in your organization - Develop your leadership pipeline
Tags : ibm, employee engagement, smarter workforce, pre-hire assessments, assessment analytics
     IBM
By: IBM     Published Date: Jul 20, 2016
Smart organizations are consistently looking for ways to determine just how effective and capable candidates can be in the workplace. Sure, these candidates have said they can solve this algorithm or resolve that customer problem, but how do they stack up with internal success standards? That's why pre-hire assessments are valuable - they provide extensive insights into candidates' skill sets, pain points, ideal working environments, and more. Such information can then be used to make more informed hiring decisions that can be a game changer for the future success of any company.
Tags : ibm, recruiting, talent acquisition, pre-hire assessments, aberdeen group
     IBM
By: IBM     Published Date: Jul 20, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : ibm, aberdeen group, talent acquisition, recruitment
     IBM
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics