RSS feed Get our RSS feed

News by Topic

hr data

Results 326 - 350 of 1300Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : cisco, public safety, disaster response, networking, security
     Cisco
By: Mimecast     Published Date: Jan 16, 2019
Employees frequently become unwitting participants in attacks, aiding the lateral movement of threats through the distribution of malicious URLS and attachments or the exposure of sensitive data. In this E-book, we’ll take a closer look into several email-related activities that employees often engage in that contribute to the spread of these insider (“hidden”) threats and then discuss what measures your organization can take to protect itself from these “hidden” threats.
Tags : 
     Mimecast
By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
     Cisco Umbrella EMEA
By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : mdm, big data, automation, organization
     IBM
By: Workday Netherlands     Published Date: Jul 05, 2019
"How can your growing organisation scale effectively and remain competitive? A strong HR core can help. This playbook from HR guru Jason Averbook and Workday offers step-by-step instructions for building an HR foundation that helps teams achieve success across your organisation. Read now to learn how the right technology enables you to: ? Streamline HR processes ? Better engage your workforce ? Deliver timely data-driven insights to stakeholders "
Tags : finance, workday, workforce technology, digital strategy
     Workday Netherlands
By: Workday Netherlands     Published Date: Jul 05, 2019
Een sterke HR-basis helpt uw organisatie haar doelen te realiseren. Dit playbook van Jason Averbrook van Leapgen biedt actiegerichte inzichten voor het opbouwen van een stevige en schaalbare HR-basis die uw bedrijf vooruit helpt. Lees nu en ontdek: • Manieren om de datakwaliteit te verbeteren • Hoe u boeiende employee experiences creëert • Waarom één HR-systeem voor flexibiliteit zorgt
Tags : finance, workday, workforce technology, digital strategy
     Workday Netherlands
By: Workday Netherlands     Published Date: Jul 05, 2019
"In zes stappen, omschreven in dit eBook, verbetert u uw people analytics skills en helpt u uw organisatie vooruit. • Haal de beste inzichten uit uw personeelsdata • Bied de juiste informatie aan de juiste stakeholders op het juiste moment • Stel HR in staat om zakelijke doelen strategisch te ondersteunen Lees het eBook nu."
Tags : workday, workforce technology, digital strategy
     Workday Netherlands
By: Workday Netherlands     Published Date: Feb 04, 2019
Ontdek de strategieën die bedrijven gebruiken om veranderingen de baas te blijven. Lees het door Workday gesponsorde Harvard Business Review Analytic Services-rapport. Leer hoe organisaties één cloud-based systeem voor finance en HR gebruiken om beslissingen te nemen op basis van data, samenwerking tussen C-level executives te ondersteunen en planningsmethoden met meer inzicht, nauwkeurigheid en snelheid te bieden.
Tags : financiën, workforce-technologie, digitale strategie
     Workday Netherlands
By: IBM     Published Date: May 16, 2016
The data-driven organization is the new benchmark for success. Firms that harness data to dictate strategic and tactical decisions companywide make more informed business plans, better optimize operations, improve customer interactions, and provide competitive edge. To achieve these benefits, organizations increasingly see data refinement - transforming raw data from various sources into relevant and actionable information and delivering it through self - service access to any user who needs it - as the path toward success by helping break though immature processes and legacy systems. However, data refinement only functions as well as the strategies and approaches behind it. Organizations that do not understand the right way to embrace refinement will fail to catch up to competitors that have mastered the correct approach.
Tags : ibm, forrester, data-driven organization, data, analytics, analytic architecture
     IBM
By: IBM     Published Date: May 02, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation
     IBM
By: IBM     Published Date: Jul 26, 2017
The headlines are ablaze with the latest stories of cyberattacks and data breaches. New malware and viruses are revealed nearly every day. The modern cyberthreat evolves on a daily basis, always seeming to stay one step ahead of our most capable defenses. Every time there is a cyberattack, government agencies gather massive amounts of data. To keep pace with the continuously evolving landscape of cyberthreats, agencies are increasingly turning toward applying advanced data analytics to look at attack data and try to gain a deeper understanding of the nature of the attacks. Applying modern data analytics can help derive some defensive value from the data gathered in the aftermath of an attack, and ideally avert or mitigate the damage from any future attacks.
Tags : cyber attacks, data breach, advanced data analytics, malware
     IBM
By: IBM     Published Date: Oct 26, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. As enterprises rapidly expand their footprints into cloud, mobile and social, they must ensure that the right users have the right access to sensitive data and applications. Strong as well as optimized identities are becoming increasingly important as insider threat and tightened regulations become more prevalent.
Tags : identity governance, security threats, user access, cloud security, identity management
     IBM
By: IBM     Published Date: Sep 06, 2018
General Data Protection Regulation (GDPR) represents a paradigm shift in the way companies across the globe must approach protecting personal data. As of May 2018, EU data subjects now have greater autonomy than ever before over how their personal information is collected, stored and shared – and the repercussions for companies that fail to comply will be significant. At the heart of the matter lies Data Security and Protection. Protect the personal data, and you are well on your way to tackling many of the challenges the GDPR presents. But this is no easy task – before you protect your data, you must understand it, and even once you’ve achieved these goals, continually re-evaluate your data privacy and protection posture to adapt to changes in this dynamic environment.
Tags : 
     IBM
By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : financial profit, economic espionage, it security, risk mitigation, security
     Kaspersky Lab
By: EMC Corporation     Published Date: Jul 07, 2013
Forward-looking enterprises know there's more to big data than strong and managing large volumes of information. Big data presents an opportunity to leverage analytics and experiment with all available data to derive value never before possible with traditional business intelligence and data warehouse platforms. Through a modern, big data platform that facilitates self-service and collaborative analytics across all data, organizations become more agile and are able to innovate in new ways.
Tags : enterprises, storage, information management, technology, platform, big data analytics, emc, self service
     EMC Corporation
By: EMC Corporation     Published Date: Feb 13, 2015
XtremIO all-flash-arrays (AFAs) have redefined everything you know about SQL Server database infrastructures. Through a ground-breaking, fresh approach to storage design, XtremIO is uniquely engineered for SQL Server database requirements utilizing a powerful and vastly simplified scale-out performance architecture, with in-memory always-on compression, deduplication and space efficient copy services enabling application acceleration, consolidation and agility.
Tags : all-flash-arrays, database infrastructures, sql server, database requirements, application acceleration
     EMC Corporation
By: Delphix     Published Date: Feb 28, 2013
Learn how Delphix uniquely addresses ballooning ERP project costs and inagility through patent-pending database virtualization software.
Tags : database virtualization, roi, data management, data management software, erp
     Delphix
By: Delphix     Published Date: Feb 28, 2013
Agile Data Management eliminates the common barriers to successful agile development, reducing both the cost and the risk of short, parallel development projects. This paper discusses common challenges and the technical solutions for addressing them.
Tags : database virtualization, roi, data management, data management software, agile development, application development
     Delphix
By: RES Software     Published Date: Mar 26, 2013
With a long list of strategic projects and requests from users to enhance their experience, healthcare IT professionals will need to focus on key trends that will lead to more efficient IT and more satisfied users.
Tags : ehr, healthcare records, patient data, meaningful use, healthcare, trends
     RES Software
By: RES Software     Published Date: Mar 26, 2013
IT departments today are finding themselves squarely at the epicenter of healthcare compliance scrutiny.
Tags : ehr, healthcare records, patient data, meaningful use, healthcare, trends
     RES Software
By: Workday     Published Date: Mar 01, 2018
Explore the strategies companies are pursuing to manage change in this Workday-sponsored Harvard Business Review Analytic Services report. See how organizations use a single cloud-based system for finance and HR to create data-led decision-making, support C-suite collaboration, and develop planning methods with better insight, accuracy, and speed.
Tags : cloud-based system, finance, data, decision making
     Workday
By: Workday     Published Date: Mar 02, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : cloud-based system, data analytics, real time
     Workday
By: Workday     Published Date: Mar 05, 2018
In this Argyle Executive Forum webinar, leading HR executives across industries provide expert insight and recommendations for building an analytics strategy and putting a data foundation in place.
Tags : analytics, strategy, data, foundation
     Workday
By: Workday     Published Date: May 09, 2018
Operating finance and HR in silos leaves your organization with incomplete data, inconsistent metrics, and strategic uncertainty. Fortunately, you don’t have to settle for silos. Read this whitepaper to learn eight key benefits of bringing finance and HR together in one system.
Tags : 
     Workday
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics