Share us:
 

hr services

Results 326 - 350 of 387Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security
    
Cisco
Published By: HP     Published Date: May 05, 2014
Discover, map, and optimize assets to streamline global data centers, speed audits, slash costs: Using HP’s Business Services Management portfolio, GE Capital has realized an $8 million annual savings through data center consolidation. Find out how they addressed their key IT challenges of data center simplification, asset management and capacity management. GE Capital is the financial services unit of the American conglomerate General Electric. GE Capital provides commercial lending and leasing, as well as a range of financial services.
Tags : 
bsm, business service management, ddma, discovery and dependency mapping, it operations group, it performance suite, it case study, ge capital
    
HP
Published By: HP     Published Date: Aug 26, 2014
Eliminate the guesswork from selecting products and services for your evolving network access and business protection needs. HP Just Right IT portfolio solutions help avoid business interruptions by ensuring reliable access to your data. HP servers and storage solutions help consolidate islands of business information while delivering cost savings, reliability, and agility. HP offers the industry’s most comprehensive data protection and retention portfolio for midsize businesses like yours. And through its cloud-based support portal, HP Technology Services can proactively identify and fix them remotely to keep your business running smoothly. Discover how
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution
    
HP
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.
Tags : 
messagelabs symantec, web threat, security safeguard, malware, web security services, anti spam, anti spyware, anti virus
    
MessageLabs Ltd.
Published By: Oracle     Published Date: Mar 18, 2014
Customer relationship management (CRM) deployments are most effective when they legitimately support all three words that make up the acronym itself. Customers of the modern business-to-business (B2B) enterprise benefit when they purchase goods and services from companies who are focused on the buyer’s experience. Internal relationships within the selling organization are more effectively maintained when all customer-facing stakeholders have access to the rich data contained in a well-maintained CRM. And the management of the enterprise providing solutions can run their business like a finely-tuned machine when the maximum levels of visibility into customers and accounts are clear and accurate. This Research Brief combines research from a number of Aberdeen Sales Effectiveness research data sets, to create a holistic view of the most effectively deployed CRM systems.
Tags : 
oracle, customer relationship management, crm, b2b, internal relationships, sales effectiveness, sales teams, sales strategy
    
Oracle
Published By: IBM     Published Date: Nov 19, 2014
IBM DevOps for Bluemix provides an integrated set of DevOps services in the IBM Bluemix PaaS, for individuals and teams building mobile and cloud applications (‘systems of engagement’) that enable teams to shrink the application delivery cycle time, and consistently deliver software with speed, quality and accuracy. This session provides an overview of IBM DevOps services on Bluemix, focusing on quickly getting started with new projects and collaborative development with agile tracking and planning.
Tags : 
ibm, bluemix, devops, collaborative development, productivity, networking, software development, it management
    
IBM
Published By: IBM     Published Date: Feb 04, 2015
Read this white paper to discover how to: Accelerate the flow of messages throughout your organization and extend business value outward to smart devices and mobile phones. Create a more-responsive business by supporting rapid, reliable, and secure transport of information between your applications, systems and services. Reduce cost when you diminish complexity and reduce maintenance. Take action to drive
Tags : 
application systems, application services, it solutions, application complexity, it management, knowledge management, enterprise applications, data management
    
IBM
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Norse     Published Date: Mar 10, 2014
Learn how to properly select the right real-time security options for your organization and see how the right actionable security intelligence will allow for safer and more secure data and security operations.
Tags : 
norse, esg, security intelligence, commercial threat intelligence, security data, open source security intelligence, product based security intelligence, real-time security
    
Norse
Published By: IBM     Published Date: Feb 25, 2008
This reference guide can help you understand IBM’s capabilities in the site and facilities services area through real-world scenarios that demonstrate those services in action. Download this guide now and use it to quickly find stories that illustrate how IBM has delivered high-quality, value-add services for the site and facilities needs of companies of all sizes in a variety of industries around the world.
Tags : 
it management, network management, infrastructure, servers, ibm
    
IBM
Published By: IBM     Published Date: May 30, 2008
Organizations must adapt more rapidly than ever before - which means that they must align their IT environments with their business goals and deliver information on demand, when and where it is needed. In this white paper, the experts at IBM discuss how your company can meet this need for information on demand with Service Oriented Architecture (SOA), a business-centric approach to IT architecture that supports integration through linked, repeatable business tasks or services.
Tags : 
xml, soa, service oriented, information management, leveraging information, li campaign, ibm li, business intelligence
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
End-to-end storage means that your data is well-managed, protected, and available when you and your customers need it most. IBM System Storage products simplify your infrastructure with servers and storage in one, allowing you to grow, and lowering the total cost of ownership through advanced energy management. Discover the IBM System Storage family of products, services and solutions, and see how they can bring value to your bottom line.
Tags : 
ibm, express seller, storage, storage management
    
IBM
Published By: IBM     Published Date: Nov 13, 2008
To grow your subscriber base, reduce churn and control costs, it is imperative that you achieve and maintain a deep understanding of the customer experience throughout your organization. This white paper highlights IBM Tivoli® Netcool® Service Quality Manager Service Solutions — how it can change the way telecommunications providers are taking new services to market and helping to crystallize.
Tags : 
ibm, tivoli, voip, iptv, blackberry, service level agreement, knowledge management, tcp/ip protocol
    
IBM
Published By: Reactivity     Published Date: Aug 21, 2009
This white paper discusses the three critical Web services deployment issues-security, provisioning connections, and operations. As each is owned by different factions within an enterprise, each can become a 'show stopper' to Web services deployment initially, and every time a change must be made.
Tags : 
web service security, secure web services, web service, internet security, web applications, file sharing, network security, reactivity
    
Reactivity
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When Spyder Active Sports offered to pay its IT outsourcing provider more money in return for more services, and the provider not only refused the offer but its service levels continued to go downhill, it was time to look for a new provider. It came down to three potential vendors, however, a number of factors lead Spyder to select OneNeck IT Services.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, outsourcing, governance, outsource
    
OneNeck IT Services
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : 
messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce, mobile computing, mobile data systems
    
Symantec.cloud
Published By: SAS     Published Date: Aug 03, 2016
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
finance, best practices, digital channels, demand, financial services, fraud, customer experience, business analytics
    
SAS
Published By: N-able     Published Date: Nov 23, 2010
IT Service Delivery: From Basic Automation through to Managed Services
Tags : 
it automation, network monitoring, remote desktop, network management, msp, managed services software, productivity, service management
    
N-able
Published By: Adam Phones Ltd     Published Date: Dec 21, 2010
One in three SMEs and half of larger enterprises still do not have a company policy in place to govern the procurement and management of their mobile and wireless services
Tags : 
mobile, wireless, data, tariff, mobile workers
    
Adam Phones Ltd
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
field employees, screening, hireright, human resources, in home services screening
    
HireRight
Published By: NetApp     Published Date: Jan 21, 2014
According to this global survey, in three years more than half of all IT services will be delivered via private, public and hybrid clouds. This study highlights the challenges faced by IT organizations as they move into a new role as “cloud brokers” and how a common data platform can help enable seamless data management across multiple clouds.
Tags : 
    
NetApp
Published By: IBM     Published Date: Feb 05, 2014
From a communications equipment manufacturer optimizing investments with a security scan to a mutual insurance company reducing spam and threats with hosted web and email services, IBM security consultants have helped many companies evaluate their existing security practices against their business requirements and objectives. Read these customer references to learn how organizations managed risk, security and compliance with help from IBM.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, banking, security, cyber security, financial, insights
    
IBM
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service