RSS feed Get our RSS feed

News by Topic

assessments

Results 1 - 25 of 100Sort Results By: Published Date | Title | Company Name
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: Cornerstone OnDemand     Published Date: Feb 05, 2018
58% of executives believe their current performance management approach neither drives engagement nor leads to high performance. It’s high time to make some changes and adapt performance management strategies to better reflect the changing dynamics of the modern workforce and ensure employees reach their potential. Check out “10 Counterproductive Performance Management Assumptions You're Still Making” and see how you can improve your talent development initiatives to increase the productivity and impact of your employees. In this ebook, we'll touch on: • how goals are set and achieved • flaws and biases in manager's assessments • what truly motivates employees • and more Download your copy and get started!
Tags : performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software
     Cornerstone OnDemand
By: Cornerstone OnDemand     Published Date: Feb 05, 2018
58% of executives believe their current performance management approach neither drives engagement nor leads to high performance. It’s high time to make some changes and adapt performance management strategies to better reflect the changing dynamics of the modern workforce and ensure employees reach their potential. Check out “10 Counterproductive Performance Management Assumptions You're Still Making” and see how you can improve your talent development initiatives to increase the productivity and impact of your employees. In this ebook, we'll touch on: • how goals are set and achieved • flaws and biases in manager's assessments • what truly motivates employees • and more Download your copy and get started!
Tags : performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software
     Cornerstone OnDemand
By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
     McAfee
By: SHL     Published Date: Dec 13, 2011
47 business outcome studies were conducted for clients across multiple industries for the 2011 Business Outcomes Studies Report. It demonstrates the value of online talent measurement solutions against metrics specific to the goals of each organization.
Tags : bos, business outcomes study, business outcomes, outcomes study, business study, business objectives, people intelligence, outcomes report
     SHL
By: SHL     Published Date: Dec 13, 2011
SHL's Global Assessment Trends Report provides human resources professionals and those interested in learning about global assessment practices a comprehensive look at how organizations around the world measure talent.
Tags : gatr, trends, trends report, global assessment trends, global assessment trends report, global assessments, talent measurement practices, talent measurement trends
     SHL
By: Veracode     Published Date: Oct 27, 2016
Veracode’s State of Software Security report provides security practitioners with tangible Application Security benchmarks with which to measure their own programs against. The metrics presented here are based on real application risk postures, drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. Download the report now!
Tags : veracode, security, software security, application security, security benchmark
     Veracode
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction
     IBM
By: HireVue     Published Date: Feb 09, 2018
If you’re a member of the Talent Acquisition team, there’s a good chance you use a pre-employment assessment at some point in your hiring process. According to the Talent Board, 75% of employers are using some sort of pre-hire assessment. And the Aberdeen Group notes that of its “Best in Class” organizations, 91% use assessments to screen candidates.
Tags : 
     HireVue
By: Cornerstone OnDemand     Published Date: Oct 17, 2014
Whether you're just getting started or taking your business to the next level, paper-based performance reviews are not the way to go. When you have limited HR resources it probably seems easier to print off forms than sign up for software, but that pile of paper will cost you more in the long run… Get smart with your performance management, embrace technology you'll be able to: • Easily track progress and make sure everyone completes their reviews • Collect up to date, reliable information • Review teams as teams • Collect feedback via self-assessments, 360 degree and manager reviews
Tags : cornerstone on demand, csod, performance reviews, management, employee, motivation, team performance, reviews
     Cornerstone OnDemand
By: Lexmark     Published Date: May 28, 2014
This paper provides the 5 steps to effective MPS assessments.
Tags : lexmark, mps assessments, 5 steps to effective mps assessments
     Lexmark
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : vulnerability management, security, threat management, security, assessment
     SilverSky
By: AWS     Published Date: Nov 15, 2018
"Getting the right analytics, quickly and easily, is important to help grow your organization. But analytics isn’t just about collecting and exploring data. The truly important step resides in converting this data into actionable insights. Acquiring these insights requires some planning ahead. While ease of deployment, time-to-insight, and cost are all important, there are several more assessments you need to take before choosing the right solution. Learn the 8 must-have features to look for in data visualization. Download this white paper to learn how TIBCO® Spotfire® in AWS Marketplace assist in providing you advanced, cost-effective analytics."
Tags : 
     AWS
By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
     SecureAuth
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager
     IBM
By: Palo Alto Networks     Published Date: Jul 05, 2012
The Application Usage and Risk Report from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide.
Tags : palo alto networks, risk report, application usage
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
     Palo Alto Networks
By: IBM     Published Date: Oct 10, 2014
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : ibm, requirements management, risk analysis, conformance assessments, addressing complexity, manage requirements, manage compliance
     IBM
By: IBM     Published Date: Mar 10, 2015
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : ibm, oil industry, gas industry, requirements management, risk analysis, conformance assessments
     IBM
By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy
     HP Data Center
By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that when properly designed, built and operated, are an integral part of the business strategy driving the success of any enterprise, yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems, with little thought given to the structure and space in which it is to be housed, serviced and maintained. This invariably leads to facility infrastructure problems, such as thermal hot spots, lack of UPS, rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy
     HP Data Center
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: IBM     Published Date: Mar 28, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : ibm, aberdeen group, talent acquisition, recruitment
     IBM
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics