RSS feed Get our RSS feed

News by Topic

hr success

Results 151 - 175 of 360Sort Results By: Published Date | Title | Company Name
By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
     Secureworks
By: Inspirus     Published Date: Oct 04, 2017
Many companies in HR technology claim to affect engagement — and many of them do! But most only touch one or two pieces of the engagement puzzle, and it’s tough to get a complete picture of how you’re affecting the entire employee experience. Think about the highlights of your work experiences for a moment. Maybe you won employee of the month. Maybe you hit a big goal and your team had a party to celebrate. Or maybe your team threw a baby shower or took a moment to appreciate the 10 years you spent growing with your company. You might consider those moments as you think about your work experiences, but you probably consider a number of other moments as well. The employee experience isn’t just one thing — it’s the sum of many different experiences across our relationships, our work, our personalities, and our lives. Making the connection to the individual is critical for success. When we look at how we make an impact on engagement, we can’t just look at one or two things; we have to con
Tags : 
     Inspirus
By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
     Microsoft Office 365
By: CA Technologies     Published Date: Sep 25, 2017
Several years into the app economy, business has changed. Accelerating product cycles and competitive threats now demand continuous planning. Change is constant and managing it is more important than ever. As a result, companies that for years have taken a traditional approach to managing initiatives are moving rapidly to implement agile business practices. And they’re seeing results, in the form of improved quality, faster delivery of value, reduced development costs and increased customer satisfaction. But this transition also creates new challenges and responsibilities for the project management office (PMO). In fact, the success of the transformation often hinges on the PMO’s ability to expand the underlying concepts of the agile development methodology into a companywide ethos¬—a concept known as business agility.
Tags : decision making, strategically, tools, pmo, entrepreneurial spirit, business, ca technologies
     CA Technologies
By: KPMG     Published Date: Sep 21, 2017
Drive change or be changed. KPMG’s 2017 HR Transformation Survey reveals organizations divided into two camps: one half ‘enlightened’ and boldly engaged on strategic HR transformation, the other half ‘unenlightened’ and faltering amid uncertainty as the digital era redefines the world around them and dramatically rewrites the rules for success. View now.
Tags : 
     KPMG
By: KPMG     Published Date: Sep 21, 2017
Drive change or be changed. KPMG’s 2017 HR Transformation Survey reveals organizations divided into two camps: one half ‘enlightened’ and boldly engaged on strategic HR transformation, the other half ‘unenlightened’ and faltering amid uncertainty as the digital era redefines the world around them and dramatically rewrites the rules for success. View now.
Tags : 
     KPMG
By: Netsuite     Published Date: Sep 06, 2017
Moving your company to the cloud allows for more efficient and effective business operations—essential for growing an organization. Companies plagued by inaccurate, out of date information can instead get real-time access to critical business data anywhere. NetSuite has worked with businesses across all industries to guide them through the many phases of growth, from start-up to ramp up to IPO. Learn how to overcome the five obstacles to successful growth and why NetSuite will be the last business system you will ever need.
Tags : 
     Netsuite
By: Logrhythm     Published Date: Sep 05, 2017
The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.
Tags : reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
     Logrhythm
By: Lookout     Published Date: Aug 30, 2017
The Practical Guide to Enterprise Mobile Security was created to help IT managers fulfll their dual role of both enabling productivity and reducing risk through the adoption of modern-enterprise mobile security practices. This guide will help answer questions you might have about implementing mobile security, identify the components that make up a holistic enterprise mobile security strategy, point out key considerations that lead to successful deployments, and provide tips on how to successfully drive adoption of that solution in your global workforce.
Tags : enterprise mobile security, mobile security risk, risk reduction, device security
     Lookout
By: Datastax     Published Date: Aug 23, 2017
A holistic approach to using customer data to enable data-driven decisions for attracting, retaining, and delivering value through customer experience is what is going to drive many business initiatives over the next 12-month period. Though they each have varying degrees of capability to transform their customer experience applications and remain continuously available no matter what is critical to their success. Companies surveyed are eager to deliver a great customer experience and capture market share, but many CX journeys are hindered by business unit siloes, insufficient budget, and technical challenges. The responses provide key insights into the business priorities, challenges, and data technology needs of companies embarking on or in the midst of their CX journey.
Tags : datastax, customer data
     Datastax
By: Juniper Networks     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : account security, data management, network security, secure systems, application security, network performance, network diagnostics
     Juniper Networks
By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
As we turn our attention to 2017, HR leaders have their destinies and those of the modern workforce firmly in their hands. Businesses have never faced such extreme levels of uncertainty. On a macroeconomic level, they are still unclear on how and when the UK’s “Brexit” from Europe will proceed while trying to predict how a political outsider in the White House will affect global markets. Meanwhile, they are seeing their success threatened by disruptive upstarts and their operating models challenged by employees’ cry for new ways of working.
Tags : human resources, employee engagement, talent management
     Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
By: Makino     Published Date: Jun 23, 2017
With rising demands for shorter lead-times, faster throughput, improved quality and lower costs, automated manufacturing systems have become essential to the success of U.S. manufacturing. Their benefits stretch across numerous industries and production methods; however, their complexity can oftentimes be intimidating to first-time investors. Within this white paper, manufacturers can uncover the information necessary to properly plan and specify the integration of a new automated manufacturing system.
Tags : automation, automated manufacturing, automated machining, automation systems, flexible manufacturing systems, machine tool automation
     Makino
By: InfoPro Learning     Published Date: Jun 01, 2017
As the benefits of investment in Learning and Development continue to be signaled to the market, Chief Learning Officers and leaders of learning organizations will be taking center-stage in the transformation of their organization. In addition, companies spent just over $180 billion on corporate training last year, putting immense pressure on training leaders to show return on investment. With the spotlight on, these CLOs and other leaders of learning organizations will be measured across three core levers; transforming the business performance of learners, creating learning experiences that engage learners, and improving the operational efficiency of the organization. Download The Three Levers of a Successful CLO to learn the first step in aligning yourself with the three levers that business find most important.
Tags : l&d outsourcing, training outsourcing, business transformation, learning experience, learning strategy, learning measurement, managed learning services, lbpo
     InfoPro Learning
By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
     IBM
By: IBM APAC     Published Date: May 18, 2017
Technological advances are transforming the way we connect, disrupting the status quo and creating huge turbulence. Industries are converging, and new opportunities and threats are emerging, as never before. So how are CIOs managing their way through the mayhem? In the first installment of our latest C-suite Study, we interviewed 5,247 top executives to find out what they think the future holds and how they’re positioning their organizations to prosper in the “age of disruption.” This report delves more deeply into the views of the 1,805 CIOs who contributed to our research – and what the IT gurus of the most successful enterprises do differently.
Tags : insights, technology, cios
     IBM APAC
By: Teradata     Published Date: May 02, 2017
To understand the challenges and opportunities with the Internet of Things, MIT Sloan Management Review’s 2016 Global Executive Study conducted a comprehensive study with business executives, managers, and IT professionals globally. Through the survey results and interviews with subject matter and industry experts, MIT Sloan Management Review was able to reveal the business value and competitive issues from the Internet of Things (IoT). This comprehensive report dives into data sharing with competitors, analytic talent management, and the intersection with governing the data. Analytics is unsurprisingly is shown as the key to IoT success.
Tags : data, sharing, analytics, iot, mit
     Teradata
By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : email security, cyber threats, it security, phishing
     Mimecast
By: IBM     Published Date: Apr 18, 2017
Master data management (MDM) programs provide ways to ensure that data is consistent in different systems throughout an organization, but poorly managed initiatives are large and complicated affairs. This handbook will provides practical advice on how to develop and implement successful MDM programs that can pay big business dividends. Discover expert advice on: - Strategies and tactics for effective MDM processes - The technology considerations that should be factored into project plans - The ramifications of incorporating pools of “big data” into MDM efforts - And more
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     IBM
By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
     Viavi Solutions
By: DocuSign     Published Date: Apr 12, 2017
Compilation of three customer success stories for: LinkedIn, Cision, and HotelTonight, plus DocuSign for Sales Department Brief.
Tags : 
     DocuSign
By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
     Viavi Solutions
By: Genesys     Published Date: Apr 07, 2017
To meet the growing demand for digital interactions, both CRM and CCI (contact center infrastructure) vendors have added a range of digital channels to their portfolios. CCI vendors are focusing on offering an integrated omnichannel customer engagement platform, to improve their appeal to the customer service software market. The challenge for IT leaders is to decide which engagement channels should be managed by which vendors. This Gartner report discusses: - Three procurement strategies IT leaders can adopt to achieve their business goals for omnichannel (voice plus all digital channels) - Strengths and challenges associated with each strategy - Key considerations for omnichannel success
Tags : genesys, contact center infrastructure, cci, omnichannel success, cci vendors
     Genesys
By: Epicor     Published Date: Apr 04, 2017
Growth is definitely on the agenda for manufacturers, along with avoiding the pitfalls of rapid growth. This was clear in a global survey recently undertaken on behalf of Epicor Software Corporation (Epicor) by MORAR Consulting. Our research identified key factors that growing manufacturers cited as essential to their success, along with risks that manufacturers believe could threaten growth for unprepared businesses. The Epicor “Profitable Growth in Action” eZine features seven manufacturers and the factors they consider critical to their success. Get the eZine to learn how you can help boost your company’s potential for profitable growth.
Tags : erp software, enterprise resource planning software, manufacturing, manufacturing technology, manufacturing software
     Epicor
By: New Voice Media     Published Date: Apr 03, 2017
Are you a sales manager who’s new to inside sales? Or, are you already running an inside sales team but just want to polish up your knowledge? The Ultimate Guide to Inside Sales is the place to start. You’ll learn how to staff, train, organize and motivate your inside sales team for peak performance. Welcome to the complete guide on inside sales. Everything you need to know to staff, train, organise, motivate and optimise your inside sales team for peak performance is in this guide. The guide has been specially crafted to walk you through building and growing a highly successful inside sales team and give you actionable insights and tips to start making improvements today. In this guide you will learn: • How to identify your key inside sales roles • How to hire the best talent to accelerate your sales performance • How to coach your inside sales teams • How to craft your sales funnel for deeper insight into sales performance • How to structure your team’s daily activity to improve ac
Tags : 
     New Voice Media
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics