hr systems

Results 301 - 325 of 331Sort Results By: Published Date | Title | Company Name

Achieve and Maintain Compliance with PCI Data Security Standard - Part 1

Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 4

Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, vulnerability management
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 3

Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, vulnerability management
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 2

Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance, vulnerability management
    
Ecora Software

Protecting Linux Systems

Published By: Microworld     Published Date: Dec 12, 2007
Due to its nature of open source code, Linux is fast becoming popular and is being deployed in ever increasing numbers on mail servers, corporate networks and desktops. Till recently, systems running on Linux were relatively free from virus and other threats. But with the greater penetration of Linux operating systems, virus authors have begun to target them.
Tags : 
virus, spam, linux, anti-spam, anti spam, anti virus, anti-virus, mailscan, email security, internet security, email filter, filter, filtering, blocking, white list, black list, microworld
    
Microworld

Why your HR spreadsheets are OUT, and innovative HR software is IN.

Published By: BambooHR - HR Software     Published Date: Jan 25, 2011
Administrative demands leave HR practitioners with time for little more than keeping up with growing workloads. A voice at the strategy table requires efficient HR information systems to and create real value in the HR function.
Tags : 
bamboohr, spreadsheets, excel, administrative demands, workloads, human resources, talent management, hr software, hrms, hris, employee database
    
BambooHR - HR Software

Why and When to Get Out of Spreadsheets and into HR Software

Published By: BambooHR - HR Software     Published Date: Oct 31, 2012
This whitepaper recognizes HR's struggle with using spreadsheets to track employee data and advises how to evaluate HR software system to start realizing the benefits. Included is a checklist of what to look for when considering HR software for your organization.
Tags : 
human resources management, hr information, hr information systems
    
BambooHR - HR Software

Selecting an HRIS: Finding the Right HR System for Your Organization

Published By: Epicor HCM     Published Date: Sep 20, 2011
Using a fully integrated HR system to streamline and improve overall operations can help companies become leaders in their respective industries. In this white paper, learn the steps to finding the right HRIS for your organization.
Tags : 
hris, hcm, technology, implementation, systems, performance management, epicor hcm, ivantage, spectrum, workforce management, talent management, business technology
    
Epicor HCM

Video Demo: Provision and Refresh Oracle Databases in 3 Clicks

Published By: Delphix     Published Date: Apr 15, 2011
See how Delphix database virtualization shrinks nonproduction database storage requirements by up to 10x, and reduces database provisioning and refresh times from days to minutes with zero impact to production systems.
Tags : 
delphix, database virtualization, storage requirement, development, testing, storage virtualization, database development, virtualization
    
Delphix

Realizing the Full Value of Workforce Management (WFM) Systems

Published By: Skillsoft     Published Date: Jun 25, 2015
Workforce Management (WFM) systems have clearly evolved from the strictly transactional platforms used to deploy workers, track their time and attendance, manage their costs, pay them, administer benefits and provide compliance support. However, WFM systems are actually vital for driving overall business performance … not just for achieving excellence in HR, payroll and benefits administration, time and attendance management Read this white paper to learn how to realize the full value of workforce management systems.
Tags : 
workforce management system, wfm, attendance, cost, payroll, benefits, compliance, administration
    
Skillsoft

IDC: Server Transition Alternatives: A Business Value View Focusing on Operating Costs

Published By: IBM     Published Date: Sep 27, 2013
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
    
IBM

HRG Assessment: Comparing IBM PureSystems and HP Converged Systems - 2012

Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking, security, data management, servers, operating system, infrastructure, ibm puresystems, storage, business technology
    
IBM

Social Media and Business Intelligence: Creating the Integrated Customer Hub

Published By: Oracle     Published Date: Nov 05, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : 
business intelligence, integrated marketing, social media strategy, content marketing, insight, social data, customer hub, social analytics, content integration, customer experience management, business technology
    
Oracle

IBM PowerVM Virtualization Technology on IBM POWER7 Systems

Published By: IBM     Published Date: Jan 09, 2014
Consolidating data center servers through virtualization is integral to successful IT systems design. Read the white paper and see how IBM PowerVM on POWER7 offers higher ratios of server virtualization than VMware on comparable Intel x86 platforms. This enables superior performance, greater operational savings and improved efficiency.
Tags : 
ibm power7 systems, virtualization, powervm, vsphere, powervm technology, virtualization performance, intel xeon, hp proliant, tpox benchmark, throughput performance, memory vios, gb system, virtualization infrastructure, edison group, workload management, lifecycle management, ibm systems, virtualized environment, cloud computing, infrastructure
    
IBM

IDC Server Transition Alternatives : A Business Value View Focusing on Operating Costs

Published By: IBM     Published Date: Jan 09, 2014
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years. An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server ""footprint""
Tags : 
power7, power system, power cooling, power5 based, workload consolidation, power processors, server infrastructure power7 system, ibm, power7 servers, mission-critical, data center, it infrastructure, architecture, cloud computing, infrastructure, design and facilities, power and cooling, infrastructure management
    
IBM

2017 EMEA & APAC Whistleblowing Benchmark Report

Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global

Choose Wisely on the Path to Lumber and Building Materials Business Growth

Published By: Epicor     Published Date: Jun 22, 2017
If you’ve started to think your lumber and building materials (LBM) business could be getting more from your software, then it might be time for a change. It is no longer sufficient to own a solution that is “good enough.” The most successful LBM companies know that growth comes from integrated online trading, access to business intelligence tools, and using technology to be more efficient. It can be daunting to make the switch to a new enterprise resource planning (ERP) system, and with so many options, it’s hard to know when if you’re choosing the right one. Epicor has provided LBM businesses with the tools needed to make the most informed software choice. The lumber and building materials solutions evaluation kit consists of three white papers that tell you: • How to know when you’ve outgrown your current software solution • How to choose between generic and industry-specific ERP systems • How to outperform in an era of LBM sales growth You’re ready for growth. Learn how Epicor ca
Tags : 
lumber, building materials, lbm, erp, bistrack, building materials distributors, lumber distributors, lumber manufacturers
    
Epicor

The Security Industry’s Dirty Little Secret - The Debate Over Advanced Evasion Techniques (AETs)

Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, networking, application security, authentication, business continuity, ddos, disaster recovery, encryption, firewalls, hacker detection, network security appliance, security management
    
McAfee

The Security Industry’s Dirty Little Secret - The debate over advanced evasion techniques (AETs)

Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, security
    
Intel Security

Advanced Evasion Techniques for Dummies

Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security

Market Guide for Mobile Threat Defense Solutions

Published By: Lookout     Published Date: Mar 28, 2017
It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used. Gradually add MTD systems to the organization to mitigate attacks, emphasizing integration, and avoid long-term contracts.
Tags : 
mobile, threat, defense, lookout, mtd
    
Lookout

CrowdStrike Threat Graph™: Stopping Breaches with Graph Data Models and Analytics

Published By: CrowdStrike     Published Date: Feb 01, 2017
One of the biggest challenges to effectively stopping breaches lies in sifting through vast amounts of data to find the subtle clues that indicate an attack is imminent or underway. As modern computer systems generate billions of events daily, the amount of data to analyze can reach petabytes. Compounding the problem, the data is often unstructured, discrete and disconnected. As a result, organizations struggle to determine how individual events may be connected to signal an impending attack. Download the white paper to learn: • How to detect known and unknown threats by applying high-volume graph-based technology, similar to the ones developed by Facebook and Google • How CrowdStrike solved this challenge by building its own proprietary graph data model • How CrowdStrike Threat Graph™ collects and analyzes massive volumes of security-related data to stop breaches
Tags : 
    
CrowdStrike

Predictive Malware Response Test

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance

Gartner CARTA

Published By: Gigamon     Published Date: Oct 19, 2017
You know that visibility is critical to security. You simply can’t secure what you can’t see. Read this Gartner research note to learn why visibility through a continuous adaptive risk and trust assessment (CARTA) approach is key to securing digital business. Download now to learn eight ways this approach can be deployed to optimize the visibility into your organization’s cloud services, mobile endpoints, and digital ecosystems. Compliments of Gigamon.
Tags : 
    
Gigamon

Stop Rowing Alone: Integrated Cybersecurity Ecosystems Will Get You Further

Published By: IBM     Published Date: Jun 05, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.