hr compliance

Results 1 - 25 of 251Sort Results By: Published Date | Title | Company Name
By: Dell and Intel®     Published Date: Mar 30, 2015
Dell has teamed with Intel® to create innovative solutions that can accelerate the research, diagnosis and treatment of diseases through personalized medicine. The combination of leading-edge Intel® Xeon® processors and the systems and storage expertise from Dell create a state-of-the-art data center solution that is easy to install, manage and expand as required. Labelled the Dell Genomic Data Analysis Platform (GDAP), this solution is designed to achieve fast results with maximum efficiency. The solution is architected to solve a number of customer challenges, including the perception that implementation must be large-scale in nature, compliance, security and clinician uses.
Tags : 
     Dell and Intel®
By: Group M_IBM Q4'19     Published Date: Sep 26, 2019
Get a step-by-step walkthrough of what it takes to take your organization to the next level of compliance, focused on ASPICE for automotive engineering. Join Michael Halder from IBM to learn how you can integrate ASPICE compliance into your engineering workflow
Tags : 
     Group M_IBM Q4'19
By: NetApp     Published Date: Dec 14, 2013
Read how the NetApp Distributed Content Repository Solution is an efficient and risk-reducing active archive solution. Based on customer data, Forrester created a composite organization and concluded that the NetApp Distributed Content Repository delivered a three year ROI of 47% with a payback period of 1.3 months. The key benefits are reduced risk of losing unregulated archived data, denser storage, storage solution efficiency, and compliance for regulated data. The study also provides readers with a framework to do their own financial impact evaluation. Source: The Total Economic Impact Of The NetApp Distributed Content Repository Solution (StorageGRID On E-Series), a commissioned study conducted by Forrester Consulting on behalf of NetApp, March 2013.
Tags : forrester tei
     NetApp
By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
     AWS
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Hewlett Packard Enterprise
By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneur's will eventually face.
Tags : trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance, compliance
     TriNet
By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : trinet, compliance, smb, small business, human resources, infrastructure, retirement, health, insurance, benefits, litigation, qualified guidance, payroll, legal, procedure
     TriNet
By: Dell EMC Storage     Published Date: Jun 10, 2019
Die Automobilindustrie befindet sich mitten in einer hart umkämpften Übergangsphase, deren letztendliches Ziel darin besteht, innerhalb eines Jahrzehnts vollständig autonome oder „fahrerlose“ Fahrzeuge zu realisieren. Die Größenordnung und Intensität, mit der OEMs und Tier1-Lieferanten Innovationen auf den Markt bringen und gleichzeitig Kosten eindämmen, Risiken mindern, die Produktkomplexität managen und die Compliance aufrechterhalten müssen, bedeuten eine große Herausforderung. Die Entwicklung von Fahrerassistenzsystemen (Advanced Driver Assistance Systems, ADAS), die die Sicherheit von Insassen, Fahrzeugen und Straßen verbessern sollen, bringt revolutionäre Anforderungen an die Engineering-IT-Infrastruktur mit sich–insbesondere für Speicher, bei dem selbst Entry-Level-Kapazitäten in Petabyte gemessen werden. In diesem Whitepaper werden die Infrastruktur-herausforderungen erkundet, vor denen OEMs und Tier1-Lieferanten bei der Entwicklung und Validierung vonADAS-Technologien steh
Tags : 
     Dell EMC Storage
By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
     Fortinet EMEA
By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : entrepreneurship, human resources, managing risk, compliance, risk management
     TriNet
By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneurs will eventually face.
Tags : trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance, compliance
     TriNet
By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : trinet, compliance, smb, small business, human resources, infrastructure, retirement, health, insurance, benefits, litigation, qualified guidance, payroll, legal, procedure
     TriNet
By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : entrepreneurship, human resources, managing risk, compliance, risk management
     TriNet
By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : technology, bluecoat, infrastructure
     Blue Coat Systems
By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
     Panasonic Business Mobility Solutions
By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
     CA Technologies
By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security, compliance exposures, mobile security, security, enterprise applications
     ForeScout
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : risk, attack, security, business
     CA Technologies
By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : app security, mobile apps, operating systems, corporate security, enterprise data
     MobileIron
By: CA Technologies     Published Date: Nov 02, 2016
In the past 20 years, Elekta has achieved measured growth through nearly a dozen acquisitions, pulling new radiotherapy, brachytherapy and magnetoencephalography technologies into the fold. To deliver the full benefit of these sophisticated devices to providers and patients, Elekta must tie them together into integrated solutions— an immense and complex undertaking that can be further complicated by regulatory compliance.
Tags : 
     CA Technologies
By: TIBCO Software     Published Date: May 31, 2018
With data the new competitive battleground, businesses that take advantage of their data will be the leaders; those that do not will fall behind. But gaining an advantage is a more difficult technical challenge than ever because your business requirements are ever-changing, your analytic workloads are exploding, and your data is now widely-distributed across on-premises, big data, the Internet of Things, and the Cloud. TIBCO® Data Virtualization is data virtualization software that lets you integrate data at big data scale with breakthrough speed and cost effectiveness. With TIBCO Data Virtualization, you can build and manage virtualized views / data services that access, transform, and deliver the data your business requires to accelerate revenue, reduce costs, lessen risk, improve compliance, and more.
Tags : 
     TIBCO Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com