dp

Results 76 - 100 of 1039Sort Results By: Published Date | Title | Company Name
Published By: Sage EMEA     Published Date: Dec 19, 2018
We are in the midst of a global productivity crisis. The IMF estimates that if productivity growth had followed its pre-2008 financial crisis trend, overall GDP in advanced economies would be about 5% higher today. However, to blame everything on the financial crisis is misleading. The overall trend in productivity growth is stagnant and has been on a downward trend for the last several years. This is costing the U.S. a staggering $450–$550 billion a year. In the U.K., concern is such that there have been calls for the government to set new targets and create an independent watchdog to monitor progress to improve national productivity. There is also a workforce engagement crisis. Most people are simply not engaged at work, with industry research showing that typically 66% of people are either partly or not engaged at all at work. This means that only 1 in 3 people at work are fully motivated and productive. Yet most companies are oblivious to this fact. Some run annual employee sa
Tags : 
    
Sage EMEA
Published By: Sage EMEA     Published Date: Dec 19, 2018
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPR’s focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handled—and it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and it’s vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world where 2,
Tags : 
    
Sage EMEA
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Adobe     Published Date: Jul 31, 2013
This paper compares some of the issues to consider when evaluating app production platform like Digital Publishing Suite, versus custom app development.
Tags : 
digital publishing, mobile strategies, app development, dps apps
    
Adobe
Published By: ADP     Published Date: Jun 09, 2017
Managing payroll in-house can be challenging to maintain for growing businesses. Fortunately, you can free up a lot of time, energy, and resources by letting a provider handle it. Find out why you should outsource with these top-5 reasons
Tags : 
outsourcing, payroll, resource, energy
    
ADP
Published By: ADP     Published Date: Jun 09, 2017
Payroll mistakes are common—but you can help avoid them if you know what to look out for. Follow our 5-step guide to hassle-free payroll.
Tags : 
common mistakes, steps, guide, payroll, adp
    
ADP
Published By: ADP     Published Date: Jun 09, 2017
The first step begins with envisioning your perfect employee. By the end of Part One you’ll know what role they’ll play in your business, as well as the skills and attributes that qualify them for the job.
Tags : 
hiring, guide, steps, employee, adp
    
ADP
Published By: ADP     Published Date: Jun 09, 2017
One of the most powerful ways to save time – and to defuse a potential payroll time bomb – is by automating tasks to help simplify your job. When you do, you can benefit from time-savings, greater accuracy and improved compliance.
Tags : 
time, errors, payroll, simplify, adp
    
ADP
Published By: ADP     Published Date: Jun 09, 2017
If you’re reading this guide and considering investing in a new payroll system – or even just thinking about thinking about a change – you’re doing it for a reason.
Tags : 
payroll, solution, guide, adp
    
ADP
Published By: ADP     Published Date: Jun 09, 2017
Software, outsourcing, service bureau, ASO, PEO… it’s little wonder the market for payroll solutions has a reputation for being confusing and hard to navigate. Where does one solution end and the other begin? And how do you know which one you need? This complexity is the reason we’ve created a comparison guide.
Tags : 
payroll, solutions, software, aso, peo, adp
    
ADP
Published By: ADP     Published Date: Jun 09, 2017
When you run a small business, you have to wear a hundred hats. As well as managing the day-to-day, you’ve got to get acquainted with a whole new world of paperwork and back-office administration. It’s not everybody’s strong suit, but traditionally it’s seen as the price of running a business.
Tags : 
business, payroll, employees, administration, back-office, adp
    
ADP
Published By: NFP Advisor Services     Published Date: Feb 27, 2015
Clients, especially those with a high net worth, are increasingly demanding guidance for all of their financial needs from a single source. A multidiscipline practice enables you to provide them with complete wealth management solutions, resulting in higher rates of client satisfaction, retention and referral. Learn how to exploit social media opportunities, build a strategy that's right for you, design online profiles that match your goals and much more.
Tags : 
business models, growth performance, advisor services, multidiscipline practices, business owners, complex mdp, iinvestments, insurance, financial needs, investing, small business, finance
    
NFP Advisor Services
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Digital security has never taken on greater urgency. Today we live in a fundamentally connected ecosystem where we increasingly work, play, and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered to us on our connected devices - wherever we are, whenever we want them. For InfoSec professionals, this interconnected ecosystem is wreaking havoc with the idea of "the perimeter." In fact, the perimeter as we know it no longer exits. The attack surface is always shifting and continues to disperse across a wider area. At the same time, attacks continue to grow in size and volume, and are increasingly targeted. No longer can you secure the perimeter and trust that nothing will get in or out. What you need to deploy and manage is being redefined right before your eyes, with or without you. You need to take security to the edge.
Tags : 
    
Akamai Technologies
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
A mobile, flexible work experience doesn’t just help you attract the best employees—it also helps your organization become more productive and innovative. Read this ebook to find out how Citrix Workspace can help you: • Empower employees and teams anywhere, on any device • Simplify and improve both security and endpoint management • Adopt new technologies more quickly and effectively
Tags : 
    
Citrix ShareFile
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesn’t need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: Symantec.cloud     Published Date: Mar 02, 2011
Most companies already have an endpoint security solution in place. But a single security product is not sufficient to address the challenges of securing and managing the endpoint. This paper explains how a hosted endpoint solution can help.
Tags : 
symantec.cloud, messagelabs, endpoint security, security threats
    
Symantec.cloud
Published By: Dell     Published Date: Nov 09, 2017
How to empower your workforce and IT. Access this short webcast to hear how new workforce trends have created a paradox between employees desire for greater flexibility and IT's need to control cost and data. Luckily, with a reliable partner like Dell, you can take advantage of our entire Lifecycle Services and Endpoint Security to make both groups happy while still cutting costs. In this webcast you'll hear... - What workforce trends have impacted employee expectations of technology - How IT can balance costs and security with employee happiness - How to apply this approach to the 4 phases of the PC Lifecycle - What solutions can help you save up to 25% of PC Lifecycle costs Watch on-demand now.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 09, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and Intel® and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about what you need to keep endpoints and data secure Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S.
Tags : 
    
Dell
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Dell EMC     Published Date: Feb 14, 2019
Disaster recovery and long term retention (LTR) of data can be challenging for mid-sized organizations. Keeping a secondary site up for disaster recovery can be expensive and dealing with tape for LTR can be slow and costly. IDPA DD4400 enables mid-size organizations to take advantage of clould efficiencies for data protection with cloud disaster recovery and long term retention. Download this summary from Dell and Intel® to learn more. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: Webroot     Published Date: Nov 02, 2012
These days, fixing your endpoint security software requires a new approach and it's called "forget the old approach". Download this white paper to learn more.
Tags : 
it security, endpoint security, endpoint protection, security software
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot® SecureAnywhereTM Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint security, virtualization, virtualized environments
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : 
endpoint security, endpoint protection, it security, malware solutions, malware, malware protection
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
This paper looks at this problem and how Webroot, by going back to the drawing board on counering malware threats, is revolutionizing endpoint protection and solving the issues that hinder existing endpoint security solutions.
Tags : 
antivirus protection, endpoint protection, endpoint security, malware
    
Webroot
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library