it organizations

Results 51 - 75 of 2711Sort Results By: Published Date | Title | Company Name
By: HireVue     Published Date: May 18, 2018
Recruiting leaders know that if their companies aren’t sourcing and hiring for diversity they are missing valuable talent and experience. This is one of the reasons diversity has been a focus area for improvement in recent years. Many organizations start with training. While diversity training is important for creating awareness, it doesn’t a¬ffect human behavior. A 2017 meta-analysis of studies investigating bias training confirmed this. Formal training can reduce unconscious bias, but it does not change behavior.13 This has put talent leaders in a di cult position. The way to make real progress on diversity hiring initiatives is by using systematic processes that apply data-driven decision making. With structured interviews and AI, you can overcome unconscious bias and make hiring more equitable for all candidates.
Tags : 
     HireVue
By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : aws, aws vpc, aws openvpn, aws bastion, aws remote access
     Aviatrix
By: DocStar     Published Date: Jun 11, 2018
Accounts Payable is a fundamental activity for nearly all businesses. Pick any enterprise and you can bet there is an AP function at the heart of financial operations. The obligation to pay off short-term debt is one that every company must satisfy. But more than that, the process to do it must be efficient and productive. If you get behind on your obligations you risk missing important financial discounts, defaulting with creditors, and damaging your reputation with suppliers and stakeholders. CFOs face the challenges associated with Accounts Payable…and it’s easy to lose sleep. As other areas of business and commerce have become more and more paperless, the accounts payable process in most organizations remains mired in paper copies and manual workflow. The result is an often costly and people intensive process that leaves companies vulnerable to competitors and financial executives with a growing unease over the inherent inefficiencies.
Tags : 
     DocStar
By: Workday UK     Published Date: Mar 15, 2018
For both finance and HR, this separation is often driven by organizational obstacles, disparate systems and data sources, regulatory uncertainty, and a lack of complete visibility into the business. As Joseph Fanutti, CFO of Bill Gosling Outsourcing, says of his own organization’s challenges, “Finance operated its own silo, HR its own, operations its own. There was a lack of consistency in terms of how we viewed the business.” He recalls, “Numbers were always challenged, no one could agree on metrics, and people couldn’t agree on what actions to take going forward.” If this situation sounds familiar, that’s because it’s commonplace across organizations the world over. Strategic uncertainty and incomplete data are symptoms of a larger problem: a lack of unification among finance, HR, and operations teams. Managers need to make financial and people decisions in tandem, yet traditional systems store this information independently. This separation creates multiple versions of the same u
Tags : 
     Workday UK
By: NAVEX Global     Published Date: Apr 20, 2018
An effective third party risk management program is in the interest of all organizations—regardless of size, industry, and number of third party providers. This report will help you benchmark your third party risk management program and its performance against trends in the market and best practices. What you'll learn: The top issues and challenges organizations are facing with their third party risk management programs How organizations are using outside providers to help with third party due diligence The inconsistency of top concerns year over year and what this might indicate How to leverage the findings in this benchmark report to increase program effectiveness in your own organization
Tags : 
     NAVEX Global
By: Genesys     Published Date: Jun 08, 2018
In Gartner’s 2018 Magic Quadrant for Contact Center Infrastructure, Worldwide, Genesys has once again maintained a leadership position. Placed furthest among all vendors in completeness of vision for 10 years and counting, our position continues to validate our mission to power the world’s best customer engagement solutions for organizations of all sizes—both in the cloud and on-premises. And according to Gartner peer insights, customers agree. “Great implementation that was on-time and on-budget!” — CTO in the finance industry “Solid platform with a lot of features at a reasonable cost.” — IT Manager of Software Engineering in the Services Industry Get the report now to learn: • How contact center vendors compare and which quadrant they are aligned to • Analyst views on the strengths and cautions of all participating vendors • How to evaluate key criteria to guide your decision-making process
Tags : contact center, infrastructure, customer engagement, cloud, on-premises
     Genesys
By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
     Kronos
By: Kronos     Published Date: May 30, 2018
Employee engagement is being challenged by the increasing diversity of today’s workforce. From aspiring Millennials to aging Baby Boomers — working in a complex mix of full-time, part-time, contingent, temporary, and contract roles — the 21st-century workforce is more diverse than ever, challenging organizations to build and support a corporate culture that fosters employee engagement and drives the employment brand.
Tags : 
     Kronos
By: CA Technologies EMEA     Published Date: May 23, 2018
In the digital economy, application programming interfaces (APIs) are essential for executing ideas quickly and seizing new business opportunities. They are the building blocks of digital transformation, enabling organizations to deliver exceptional customer experiences, create new revenue streams and connect employees, partners, apps and devices to data—anytime, anywhere. APIs are not necessarily a new technology, but in today’s digital world, they have risen in prominence and become important to every facet of the enterprise. This in turn has increased the demand for effective API management. But what does an effective solution look like? The API Management Playbook will help you understand: • Why digital transformation is crucial in the application economy • How APIs are the building blocks of digital transformation • Which key stakeholders in your organization are impacted by APIs • What the API lifecycle is and how it relates to API management • Thirteen key “plays” that API manag
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 25, 2018
Software drives competitive advantage more than ever at an increasing velocity for releases along with higher, overwhelming levels of deployment complexity. Dramatic growth in mobile applications, analytics, systems of engagement, and cloud demands that organizations respond adaptively, even as resource constraints make it challenging to nearly impossible to do so. As a result of these combined factors, IDC sees increased interest in, demand for, and adoption of agile approaches to development and also for business initiatives driving adoption of agile approaches to overall project, program, and portfolio management.
Tags : idc, marketscape, agile, ppm, vendor, assessment
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 25, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user.CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel® -like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools. Today, CA PPM provides financial managers with the ability to visualize, manage and take advantage of data like never before—all from inside the solution.
Tags : budgets, project, cash, flows, finance, project, management
     CA Technologies EMEA
By: Trend Micro     Published Date: May 03, 2018
This whitepaper looks to address the Top 3 challenges your team faces when building in the cloud and what it means for your business. Although the capabilities and cost of select SecOps solutions have kept pace with the widespread adoption of the Amazon Web Services (AWS) Cloud, many organizations try to protect their expanding cloud workloads without the proper support.
Tags : 
     Trend Micro
By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
     Trend Micro
By: Trend Micro     Published Date: May 03, 2018
The evolution of cyber threats ad the cybercriminal community has evolved from the days of pranksters launching annoying viruses and spam that would be considered primitive today. While enterprises make concentrated efforts to protect their critical data, the lack of correlated and contextual network visibility can leave IT security organizations unable to prioritze the threats that matter the most.
Tags : 
     Trend Micro
By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
     Great Bay Software
By: Great Bay Software     Published Date: Apr 12, 2018
"Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!"
Tags : 
     Great Bay Software
By: Great Bay Software     Published Date: Apr 12, 2018
"IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security"
Tags : 
     Great Bay Software
By: Intouch Insight     Published Date: Apr 23, 2018
Customer Experience (CX) has become a critical differentiator for companies. Consulting company Forrester has declared that we are in the “Age of the Customer,” and Gartner argues, “A superior customer experience is one of the few remaining means of sustainable competitive differentiation as the effects of globalization take their toll.” Despite its widely-recognized importance, CX continues to be a loosely-defined concept, with each organization seeming to have its own definition. Approaches to the discipline and the arrangement of CX teams and related roles vary widely from business to business, leading to some confusion within organizations trying to select a CX approach. Whether you are just starting your company’s CX journey or you are well on your way, this white paper will help you develop a thorough understanding of the discipline and the many ways organizations view and implement CX strategies, processes, and technologies. We’ll start by defining customer experience and its im
Tags : 
     Intouch Insight
By: NetApp     Published Date: Dec 13, 2013
Interested in running a Hadoop proof of concept on enterprise-class storage? Download this solutions guide to get a technical overview on building Hadoop on NetApp E-series storage. NetApp Open Solution for Hadoop delivers big analytics with preengineered, compatible, and supported solutions based on high-quality storage platforms so you reduce the cost, schedule, and risk of do-it-yourself systems and relieving the skills gap most organizations have with Hadoop. See how on going operational and maintenance costs can be reduced with a high available and scalable Hadoop solution.
Tags : open solutions, hadoop solutions guide
     NetApp
By: NetApp     Published Date: Dec 13, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson, as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : big data problems, how to get the most from your big data
     NetApp
By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
     Tenable
By: Tenable     Published Date: Apr 30, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : devops, dev sec ops, infosec, container security, idg, digital transformation
     Tenable
By: AWS - ROI DNA     Published Date: Jun 12, 2018
Traditional data processing infrastructures—especially those that support applications—weren’t designed for our mobile, streaming, and online world. However, some organizations today are building real-time data pipelines and using machine learning to improve active operations. Learn how to make sense of every format of log data, from security to infrastructure and application monitoring, with IT Operational Analytics--enabling you to reduce operational risks and quickly adapt to changing business conditions.
Tags : 
     AWS - ROI DNA
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
     Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
     ASG Software Solutions
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com