policies

Results 251 - 275 of 397Sort Results By: Published Date | Title | Company Name

Improve Time Off Accruals with Time & Attendance

Published By: nettime solutions     Published Date: Mar 04, 2014
This webinar covers the best practices, methods and standards for time off accruals that are enhancing PTO policies nationwide, while showing you how a customizable automated time and attendance platform can provide workforce analytics and labor management solutions — all from your web-browser.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform
    
nettime solutions

4 Steps to Successful IT Systems Management

Published By: Kaseya     Published Date: Feb 11, 2014
Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.
Tags : 
kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies
    
Kaseya

The Future of IT: A Customer First Approach

Published By: BMC Software     Published Date: Jan 31, 2014
IT is embracing to this new world of consumerized technology, with a focus on its own employees as internal customers. Explore how customer-first policies can make use of social, mobile and cloud technologies to give workers the freedom and flexibility they desire to drive company productivity. Please download the white paper for more information.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
BMC Software

A SANS White Paper: SIEM Integration with Endpoint Data for Accuracy and Speed

Published By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus
    
McAfee

Simplify Your ACA Compliance

Published By: nettime solutions     Published Date: Jan 27, 2014
Learn how automated time and attendance works, and how an Affordable Care Act module that was built specifically for managing ACA compliance can support multiple classes of employees in different policies.
Tags : 
time and attendance, cloud based time and attendance, aca compilance, affordable care act, saas time and attendance, workforce management, time off tracking, labor analytics
    
nettime solutions

Smarter Policy Implementation – Enabled by IT

Published By: Oracle     Published Date: Jan 15, 2014
The latest IT tools and techniques can bring benefit to policy implementation in Government, as well as to administration and operations. This new role for IT can not only speed up the implementation of policy changes, but enable more effective targeting of those policies. This paper explains how. Oracle provides standard COTS software that can do this, and how such solutions have already been proven in Government Ministries.
Tags : 
oracle, government, cots software, smarter policy implementation, government ministries
    
Oracle

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : 
firewall, palo alto, security, network security, safe applications, cyber threats, application security, firewalls
    
Palo Alto Networks

Getting It In Writing: The Art of Policy Management

Published By: NAVEX Global     Published Date: Nov 19, 2013
Is your organization benefiting from the full ROI of automated policy and procedure management? Policies and procedures are the building blocks of every organization. This eBook offers articles geared toward managing the policy lifecycle from drafting and validating to approving and implementing, as well as increasing security and important steps toward protecting against data breaches.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global

Defrag Your Enterprise & Liberate Your Data

Published By: Mimecast     Published Date: Oct 17, 2013
"Storage Anywhere & Everywhere" is a new study by Free Form Dynamics sponsored by Mimecast. It includes lessons from expert or 'elite' organizations on how to get control of your data and make it work to your advantage.
Tags : 
mimecast, free form dynamics, inforgraphic, defragmentation, liberating data, controlling data, elite organizations, measure roi
    
Mimecast

A SANS White Paper: SIEM Integration with Endpoint Data for Accuracy and Speed

Published By: McAfee     Published Date: Oct 14, 2013
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, network security, email security
    
McAfee

Wiley: Object Storage for Dummies

Published By: NetApp     Published Date: Sep 19, 2013
Learn how to maximize the business value of your data by having a storage infrastructure that will easily address long-term retention policies, finds and retrieves content quickly from long-term repositories, and uses object storage efficiently.
Tags : 
wiley, object storage, business value, data, big data, enterprise data, application integration, analytical applications
    
NetApp

HP 2012 Cyber Risk Report

Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise

HP 2012 Cyber Risk Report Infographic - Mobile Vulnerabilities

Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise

HP 2012 Cyber Risk Report Infographic - Vulnerability Trends

Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise

Insurance Contact Centers in the Cloud

Published By: Interactive Intelligence     Published Date: Sep 11, 2013
Contact centers have long played a vital role in the insurance industry. Prospects and customers use them to get product information and quotes and then submit applications. Insurance agents and advisors rely on contact centers to tap into expertise and handle business and technical issues. Policyholders and members make inquiries or changes to their policies, or conduct financial transactions. Claimants call in to report accidents and check on the status of their claims. The list could go on, but the meaning is clear. Contact centers are major contributors to many key parts of the insurance business, especially the parts that require direct interaction with customers or agents. As a result, contact centers now play a critical role in an insurer’s journey toward becoming more customer-centric.
Tags : 
interactive intelligence, contact centers, insurance industry, prospects, customers, product information, quotes, members
    
Interactive Intelligence

Privileged Users: Managing Hidden Risk in Your Organization

Published By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies
    
NETIQ

Toolkit: Benchmarking your Ethics and Compliance Hotline Data

Published By: NAVEX Global     Published Date: Sep 05, 2013
The data from your ethics and compliance helpline should be benchmarked against comparable organizations to assess program health and make improvements such as implementing policies, training employees, and conducting investigations. Learn everything you need to know about benchmarking your helpline data in our toolkit.
Tags : 
incident, hotline, helpline, ethics, compliance, whistleblower, data, analysis
    
NAVEX Global

Practical Steps to Help Ensure Proper Form I-9 Compliance

Published By: HireRight     Published Date: Jul 31, 2013
As state E-Verify legislation becomes more ubiquitous, coupled with federal legislation and increasingly stringent enforcement policies, it has never been more important for all organizations, regardless of size or industry.
Tags : 
hireright, i-9 compliance, ice fines, e-verify legislation, human resources
    
HireRight

2013 Employment Screening Benchmarking Report

Published By: HireRight     Published Date: Jul 31, 2013
As talent management leaders create and refine their hiring policies, increasingly they are driven by overarching strategic themes,
Tags : 
hireright, human resources, 2013 employment screening, benchmarking report, employment screening practices
    
HireRight

The Top Three Components to Selling and Renewing Insurance Policies

Published By: Teradata     Published Date: Jul 30, 2013
This paper examines the obstacles that make interactive customer management a challenge for many insurance carriers. It describes how they can create a more customer-centric business by using a sophisticated analytics platform to uncover valuable insights into their business and provides concrete examples of specific areas where insurers gain value. The adoption of a customer-centric approach need not be accomplished all at once. Rather, it can be managed and self-funded by following a roadmap that delivers incremental capabilities and revenue.
Tags : 
insurance policies, integrated data warehousing, interactive customer management, customer management, insurance carriers
    
Teradata

HP Cloud Design Service: “Seven design principles for building a converged cloud”

Published By: HP and Intel ®     Published Date: Jul 26, 2013
Without the proper policies governing cloud usage, a shared infrastructure design, and without a comprehensive yet effective cloud service portfolio, your organization will end up spending more time and money fixing issues rather than delivering desired results to the business.
Tags : 
cloud, converged infrastructure, cloud design, software development
    
HP and Intel ®

Top 5 Requirements for Guest Wi-Fi Access

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
"While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? Dive into the requirements for Wi-Fi security by consulting this brief resource today. Inside, find five essential recommendations to help you make Wi-Fi security your business reality – read on to get started now."
Tags : 
free wi-fi, security, acceptable use, application security, wireless application software, wireless infrastructure, wireless service providers
    
Blue Coat Systems

Mobile Security Challenge Emerges

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile, security, devices, users, bluecoat, mobile computing, mobile data systems, smart phones
    
Blue Coat Systems

IT Governance, Risk and Compliance with ServiceNow

Published By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : 
it governance, risk, compliance, servicenow, webinar, software development, it management, knowledge management
    
ServiceNow

Which Mobile Device Is the Most Secure?

Published By: Sophos     Published Date: Jul 01, 2013
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot. The rising trend of mobility consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a standard mobile device. This whitepaper will help you identify each device platform’s security features—and choose the right platform for your business.
Tags : 
mobile device, security
    
Sophos
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.