hr software

Results 1 - 25 of 277Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Aug 08, 2018
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell
Published By: Workday DACH     Published Date: Sep 25, 2018
Das Thema Cloud Computing rückt immer mehr in den Mittelpunkt des Interesses. Und das erwiesenermaßen zu Recht. In der Tat haben die meisten Unternehmen bereits irgendeine Form eines Cloud-Dienstes in ihre IT- Infrastruktur eingebunden. Während standortgebundene Software und Hybrid-Lösungen den Anforderungen immer weniger gewachsen sind, eröffnen Cloud-Anwendungen neue Möglichkeiten für innovative Lösungen. Diese Lösungen sind zweckmäßig und darüber hinaus einfach zu bedienen und zu managen. Die Cloud stellt die grundlegende Infrastruktur bereit, die innovative Unternehmen benötigen um erfolgreich zu sein.
Tags : 
    
Workday DACH
Published By: Pure Storage     Published Date: Oct 09, 2018
Flash-Storage dringt immer mehr in die Mainstream-Datenverarbeitung vor. Dadurch verstehen die Unternehmen zunehmend nicht nur die Performance-Vorteile, sondern auch die sekundären wirtschaftlichen Vorteile, die mit einer Flash-Implementierung im großen Maßstab verbunden sind. Dank der Kombination all dieser Vorteile – geringere Latenzen, höherer Durchsatz und größere Bandbreite, höhere Storage-Dichten, deutlich geringerer Energie- und Platzbedarf, höhere CPU-Auslastung, geringerer Bedarf an Servern und damit verbunden geringere Softwarelizenzgebühren, geringere Administrationskosten und eine größere Zuverlässigkeit auf Einheitenebene – erweist sich die Verwendung von AFAs als eine wirtschaftlich überzeugende Alternative zu den herkömmlichen Storage -Architekturen, die ursprünglich für Festplattenlaufwerke (HDDs) konzipiert waren. Während die Wachstumsraten für Hybrid-Flash-Arrays (HFAs) und für ausschließlich in Verbindung mit HDDs verwendete Arrays steil nach unten gehen, gehören die
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Oct 09, 2018
As flash storage has permeated mainstream computing, enterprises are coming to better understand not only its performance benefits but also the secondary economic benefits of flash deployment at scale. This combination of benefits — lower latencies, higher throughput and bandwidth, higher storage densities, much lower energy and floor space consumption, higher CPU utilization, the need for fewer servers and their associated lower software licensing costs, lower administration costs, and higher device-level reliability — has made the use of AFAs an economically compelling choice relative to legacy storage architectures initially developed for use with hard disk drives (HDDs). As growth rates for hybrid flash arrays (HFAs) and HDD-only arrays fall off precipitously, AFAs are experiencing one of the highest growth rates in external storage today — a compound annual growth rate (CAGR) of 26.2% through 2020.
Tags : 
    
Pure Storage
Published By: Splunk     Published Date: Aug 21, 2018
While the modern enterprise embraces digital technology, it is also at risk of cyberattacks. In this guide, “The Essential Guide to Security”, we map out how organizations can use machine data for specific use cases and get started addressing threats and security challenges. Download your complimentary copy to learn: *How to assess your organization’s security maturity *What specific threats you should be looking for and how to fight them *What data sources are needed for specific use cases *What software solution you need to get ahead of different threats
Tags : 
    
Splunk
Published By: Hitachi Vantara     Published Date: Aug 14, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : 
data infrastructure, big data, internet of things
    
Hitachi Vantara
Published By: Spredfast     Published Date: Aug 27, 2018
Can chatbots provide a great customer experience? Watch how top brands automate social customer service practices. You'll learn how to enhance agent workflows and use AI to better connect with the people you care about most.
Tags : 
social media customer support, social media manager, social media customer service, social customer service, media com customer service, social customer care, social media and customer service, customer service through social media, social media support, social media customer care, client management software, customer support software, social media management tools, social media monitoring, social media training, social media marketing companies, social media analytics, social media marketing, social media software, social media management software
    
Spredfast
Published By: Hitachi Vantara     Published Date: Aug 02, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : 
data infrastructure, big data, internet of things
    
Hitachi Vantara
Published By: ASG Software Solutions     Published Date: Nov 09, 2009
Composite applications can provide multiple benefits, such as business agility, better utilization of business software assets through code reuse, development efficiencies, and cost optimization. Once companies are skilled at deploying them, many find that they roll out new applications and integrations faster, while maximizing the value of "tried and true" software components.
Tags : 
asg, cmdb, bsm, itil, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : 
cylance, endpoint, protection, cyber, security
    
Cylance
Published By: IT Launchpad, LLC     Published Date: Dec 05, 2011
IT experts walk you through the top 7 reasons software development projects fail and how you, the buyer of IT services, can overcome these obstacles.
Tags : 
    
IT Launchpad, LLC
Published By: Tempworks Software     Published Date: Mar 17, 2012
Freemium is a feature-light version of our award-winning business software program, TempWorks Enterprise, that helps you manage hiring and sales processes.
Tags : 
    
Tempworks Software
Published By: Neolane, Inc.     Published Date: Sep 17, 2010
With more than three decades in the hotel marketplace, Grupo Posadas operates more than 104 hotels and 19,042 rooms in 50 beach and city destinations in Mexico, Brazil, Argentina and Chile. It's brands include AQUA, Fiesta Americana Grand, Fiesta Americana, Lat 19°, Caesar Park and Caesar Business, making Posadas the leading Mexican hotel operator in Latin America. Posadas selected Neolane's enterprise marketing software to improve segmentation and deliver consistent, personalized customer communications across e-mail and direct mail channels, while streamlining campaign management within its loyalty programs.
Tags : 
neolane, grupo posadas, segmentation, loyalty, email, direct marketing, customer communications, loyalty
    
Neolane, Inc.
Published By: Group M_IBM Q4'18     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q4'18
Published By: Cisco     Published Date: Jan 04, 2016
Gleichzeitig wurden jedoch die Betriebskosten aufgrund komplexeren und arbeitsintensiveren Prozessen in die Höhe getrieben. Teilweise konnten diese Kosten durch vermehrte Integration der Server- und Netzwerkinfrastruktur und erweiterte Funktionalität der Software eingedämmt werden
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, enterprise applications
    
Cisco
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Das IT-Marktforschungsunternehmen IDC hat eine globale Studie unter mehr als 3 500 IT-Führungskräften auf der ganzen Welt durchgeführt und fand heraus, dass Unternehmen jeder Größenordnung PC Life Style as a Service-Modelle zur Reduzierung der Kosten, Verkürzung von Aktualisierungszyklen und zur Beschaffung besserer Technologie für ihre Mitarbeiter in Erwägung ziehen. Dell PC as a Service (PCaaS) vereint Hardware, Software, Lebenszyklusservices und Finanzierung in einer umfassenden Lösung, die einen einzelnen, vorhersehbaren Preis pro Arbeitsplatz pro Monat bietet und von Dell Financial Services bereitgestellt wird. Erfahren Sie mehr über Dell Lösungen in Zusammenarbeit mit Intel®
Tags : 
idc, studie, dell, intel
    
Dell PC Lifecycle
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Das Thema Sicherheit droht, sich für Unternehmen zum Problem zu entwickeln. Die Zahl der Sicherheitsbedrohungen nimmt zu und die Angriffe werden immer raffinierter. Neue Technologien wie das IoT, mobile Lösungen und Hybrid IT-Umgebungen bieten zwar neue Geschäftschancen, bringen aber auch neue Risiken mit sich. Heutzutage reicht es daher nicht mehr aus, die Server auf Softwareebene zu schützen. Unternehmen müssen den Schutz bis auf die physischen Systeme ausweiten, um gegen Sicherheitsbedrohungen gewappnet zu sein. Angesichts der immer größeren Zahl an regulatorischen Bestimmungen im heutigen Geschäftsumfeld gewinnt die Einhaltung dieser Bestimmungen an Bedeutung – zum einen, um das Sicherheitsniveau zu verbessern, zum anderen, um die Kosten zu senken, die durch die Nichteinhaltung dieser Bestimmungen entstehen. Da diese Aspekte von so kritischer Bedeutung sind, ist es wichtig, den Schutz der Hardware zu verbessern und das Sicherheitsniveau bis auf Lieferkettenebene zu erhöhen.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Jan 12, 2017
In this whitepaper, learn three reasons why companies do not actively manage profitability, understand the benefits of active profitability management, and learn how companies can overcome data and software barriers.
Tags : 
    
Oracle
Published By: Epicor     Published Date: Aug 29, 2018
Focus on your best customers and minimize time wasted on unprofitable partnerships to maximize LBM business growth through the benefits of the trending practice of customer stratification. Epicor BisTrack Software, an LBM-specific business software, provides all the tools and information you need to implement customer stratification and reap the benefits of knowing your customer’s buying habits and successes. Download the e-book from Epicor and: • Understand the Benefits of Stratification • Explore The Four Customer Types • Apply Strategies to Maximize Results • Sustain Success With a Focus on Customers
Tags : 
    
Epicor
Published By: Pega     Published Date: May 25, 2016
The customer experience is critical in today’s fast-paced, demanding world. With so many options at the buyer’s fingertips and the rise of social sharing media, one bad customer experience can haunt an organization. According to” The Forrester Wave™: Dynamic Case Management, Q1 2016” report, in order to improve customer experience, firms must tackle the incident process through smart handling of exceptions, applying analytics for context, and offering real-time and mobile interaction. Here is where dynamic case management (DCM) can be a competitive advantage and Forrester identified 14 of the most significant vendors across 21 criteria in this space with Pegasystems among vendors who lead the pack. Download this Forrester Wave report to see the full 21-criteria evaluation of the dynamic case management (DCM) market and gain insight into the 14 most significant software vendors in order to help enterprise architecture (EA) professi
Tags : 
case management, forrester, dynamics, enterprise
    
Pega
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!