people data

Results 201 - 225 of 253Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
     Proofpoint
By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : cloud, aws, security, organizations, visibility, control, networks, platforms
     Amazon Web Services
By: Visier     Published Date: Jan 25, 2019
Global competition for talent, outsourcing labor, compliance legislation, remote workers, aging populations—these are just a few of the daunting challenges faced by HR organizations today. Yet the most commonly monitored workforce metrics do very little to deliver true insight into these topics. Leaders need to graduate from metrics to people analytics in order to uncover the important connections and patterns in their data that lead to better workforce decisions.
Tags : 
     Visier
By: IBM     Published Date: Apr 18, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : ibm, trusted data, data optim, big data, hybrid data environments, data management
     IBM
By: IBM     Published Date: Jul 06, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : ibm, trusted data, data optim, big data, hybrid data environments, data management, data center
     IBM
By: IBM     Published Date: Oct 13, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : ibm, trusted data, data governance, governance, big data, hybrid data environments, data management, data center
     IBM
By: Workday     Published Date: Jul 19, 2017
The shift to SaaS is gaining momentum and there are clear business benefits that can be derived. To optimise success, transformation strategies need to encompass all elements of people, processes, technology and organisational design. Adopting SaaS technologies drives significant change to the way organisations operate – from business processes to support model design and company culture. The implications of cloud adoption and technical challenges such as integrations, data migration and configuration must be fully understood and addressed from the outset.
Tags : finance technology, communication processes, protocols, interaction management, relations, technology, cloud
     Workday
By: Symantec Health     Published Date: Feb 08, 2011
Read this white paper to learn if cloud archiving translated into a good night's sleep, freeing them from worrying if their people were good stewards of patient and corporate data.
Tags : symantec health, cio, cloud archiving, corporate data, healthcare industry, cloud computing
     Symantec Health
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
     Proofpoint
By: SAP     Published Date: May 22, 2012
Business intelligence technology must meet the demands of tomorrow's "digital natives"; integrate seamlessly with cloud data and platforms; align people, conversations, and data with business strategy; and make the most of the infrastructures we have today.
Tags : sap, business intelligence, business analytics, technology
     SAP
By: Alterian Inc     Published Date: May 03, 2010
A little book about a BIG subject. Integrated marketing means different things to different people: ...integrating campaigns? ...integrating process? ...integrating data & applications?
Tags : integrated marketing, alterian
     Alterian Inc
By: SAS     Published Date: Mar 06, 2018
Machines learn by studying data to detect patterns or by applying known rules to: • Categorize or catalog like people or things • Predict likely outcomes or actions based on identified patterns • Identify hitherto unknown patterns and relationships • Detect anomalous or unexpected behaviors The processes machines use to learn are known as algorithms. Different algorithms learn in different ways. As new data regarding observed responses or changes to the environment are provided to the “machine” the algorithm’s performance improves. Thereby resulting in increasing “intelligence” over time.
Tags : 
     SAS
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
     F5 Networks Singapore Pte Ltd
By: ThreatTrack Security     Published Date: May 26, 2015
Organizations have a serious “people problem” when it comes to securing networks. It’s time to address the bad habits of all users that have a hand in nearly every major data breach. Read this white paper to explore the issue and the solution to your cybersecurity “people problem.”
Tags : cybersecurity, misconfiguration, patch management, passwords, mobile devices, viruses, security, it management
     ThreatTrack Security
By: Cognos     Published Date: Jun 19, 2007
The Performance Manager, Proven Strategies for Turning Information into Higher Business Performance, strengthens the partnership between decision-makers and the people who provide the information that drives better decisions. It suggests 42 decisions areas, or information sweet spots, to help you understand your data, plan, and monitor your performance.
Tags : performance, business analytics, business metrics, evaluation, analyze, analytical applications, cognos, business intelligence
     Cognos
By: SAS     Published Date: Apr 20, 2017
With more data in the hands of more people – and easier access to easy-to-use analytics – conversations about data and results from data analysis are happening more often. And becoming more important. And expected. So it’s not surprising that improved collaboration is one of the most common organizational goals. Let’s take a look at how you can use results produced by SAS Visual Analytics with Microsoft Office applications. You’ll see how easy it is to combine sophisticated analytic visualizations and reports with Microsoft’s widely used productivity tools – to share insights, improve collaboration and drive increased adoption of analytics and BI across your organization.
Tags : 
     SAS
By: SAS     Published Date: Aug 02, 2017
With more data in the hands of more people – and easier access to easy-to-use analytics – conversations about data and results from data analysis are happening more often. And becoming more important. And expected. So it’s not surprising that improved collaboration is one of the most common organizational goals. Why? Because two heads, or 10 heads, are better than one. Because bouncing ideas off of others helps you consider more options. And because sharing what you know may help someone else make better decisions.
Tags : 
     SAS
By: IBM     Published Date: Aug 06, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today it is a business imperative and is providing solutions to long-standing business challenges for banking and financial markets companies around the world. Financial services firms are leveraging big data to transform their processes, their organizations and soon, the entire industry.
Tags : ibm, banking, data, big data, financial services, technology, data management
     IBM
By: IBM     Published Date: May 27, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : ibm, big data, insurance, insurance technology, big data solutions, business value, financial data, risk data
     IBM
By: IBM     Published Date: Aug 06, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : ibm, insurance, data, big data, technology, business
     IBM
By: IBM     Published Date: Aug 08, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : big data, technology, insurance industry
     IBM
By: SAP     Published Date: Nov 17, 2016
SAP Jam is a cloud-based social software platform that transforms the way people work by bringing together people, data, and decision-making capabilities when and where workers need them. In this Forrester Total Economic Impact (TEI) study commissioned by SAP, learn about the potential return on investment you can realize by deploying SAP Jam.
Tags : sap, human resources, employee, sap jam, total economic impact
     SAP
By: MobileIron     Published Date: May 07, 2018
The global BYOD and enterprise mobility market continues to experience impressive growth. Preparing for this transformation is more than just a matter of security. It’s a matter of leveraging the people, processes and tools needed to become a Mobile First organization that’s ready to explore a whole new opportunity landscape. This BYOD guide is a great first step toward achieving your mobile transformation by implementing a successful BYOD program. By following the recommendations in this guide, you can deliver a program that meets the needs and preferences of mobile workers, while upholding corporate security and budget requirements. But the true success of any BYOD program depends on its long-term sustainability, which means you must ensure the security of your corporate data, drive user adoption by supporting employees’ device preferences and maintain a flexible technology portfolio that enables business innovation.
Tags : guide, byod, mobility, landscape, organization, program, mobile
     MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com