hr services

Results 176 - 200 of 405Sort Results By: Published Date | Title | Company Name
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
Download this whitepaper for a look at how organizations are becoming much more efficient through the use of virtualization and the separation of physical devices from the computing, storage, and networking services they deliver.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors
Published By: SunGard Availability Services     Published Date: Nov 13, 2013
Learn the three essential steps for a strategic approach to Hybrid IT in order to reduce capital costs while simultaneously delivering your product and services more efficiently.
Tags : 
sungard, sungard availability services, hybrid, hybrid it, hybrid it strategies, management services, integration, cloud-based solutions, internal it services, external it services, hybridization, hybrid it mangament
    
SunGard Availability Services
Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Throughout its operations, Broadlawn Manor Nursing & Rehabilitation Center has embraced technology as a means of enhancing resident safety and independence, and staff productivity. The facility had been a satisfied user of STANLEY Healthcare’s WatchMate wander management system for many years, but in 2010, Vice President of Senior Services Gerard Kaiser and his team embarked on a review of Broadlawn Manor’s wander management needs and took the decision to migrate to a new generation of technology with greater functionality. Read this case study to learn how Long Island Nursing & Rehabilitation Center achieves more accurate, convenient and efficient wander management with RoamAlert® Solution.
Tags : 
wander management, healthcare, nursing, rehabilitation, resident safety, resident independence, medical technology
    
STANLEY Healthcare
Published By: Blue Coat     Published Date: Mar 11, 2016
The cloud creates new risks and compliance issues for organizations already struggling with traditional threats. Get Blue Coat’s new E-Book, “Securing Cloud Applications & Services.”
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application
    
Blue Coat
Published By: Sitrion     Published Date: Mar 24, 2016
This white paper highlights how mobile technologies can help transform human resources by enabling mobile HR self-services, getting rid of tedious and time consuming processes, and letting you to play a more strategic role in your organization.
Tags : 
    
Sitrion
Published By: Staples     Published Date: May 24, 2016
It’s a business reality: Companies are always looking to trim costs, and IT budgets are no exception. In your next deep dive, don’t overlook printing expenses. By assessing your existing infrastructure and processes through a managed print services (MPS) program, you can lower your total cost of ownership by 15 to 30 percent. Learn more by reading this white paper from Staples Business Advantage.
Tags : 
managed print services, print costs
    
Staples
Published By: VMware     Published Date: May 10, 2017
What is a digital workspace and what does it take to create one? If we break it down, the workspace is a portal for end users into all of their apps and online services that they canseamlessly and securely access across devices and locations. But what makes the workspace of today different from the desktop or mobile device of the past? And how can you move forward with delivering a digital workspace? Download this solution brief to learn how VMware® Workspace™ ONE™is designed to deliver a digital workspace that integrates device management, application delivery, and identity management into a single platform on your terms, via your data center, in the cloud, or through a combination of the two. This workspace can be accessed by your end users across devices and locations and be centrally secured and supported to streamline management and improve the quality of services you deliver across the entire organization.
Tags : 
    
VMware
Published By: Intel     Published Date: Jul 27, 2017
As organizations go through major business and technology changes, they will increasingly depend on digital platforms to deliver products and services. More than half of the organizations we spoke with said they would increase spending with their primary hosting and cloud service provider (CSP) in 2017, and individual quarterly plans for hosting and cloud services suggest that the growth in spending will be persistent.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Viele Unternehmen möchten sich in stark umkämpften Märkten einen Ruf als Innovatoren erarbeiten und streben daher die Flexibilität an, die erfolgreiche Internet-Unternehmen auszeichnet. Die Komplexität der Anwendungsentwicklung nimmt dadurch jedoch schnell stark zu. Der umfangreiche und oft monolithische Quellcode herkömmlicher Unternehmensanwendungen ist keine geeignete Basis für die schnelle Einführung neuer Services. Voneinander isolierte und möglicherweise auch geografisch verteilte Entwickler- und Administratoren-Teams bringen zusätzliche Herausforderungen auf organisatorischer Ebene mit sich. Gleichzeitig steigen die Ansprüche der Anwender. Unternehmen müssen ihre Anwendungen effektiv skalieren und überwachen können, um eine gleichbleibend hohe Leistung und Benutzerfreundlichkeit zu gewährleisten. Dabei gilt es inzwischen als selbstverständlich, dass Services rund um die Uhr uneingeschränkt verfügbar sind.
Tags : 
    
AstuteIT_ABM_EMEA
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
"Chrome Browser provides secure, trusted access to data, apps, and cloud services, connecting employees on any device to a new generation of powerful tools for work. With proactive securitymeasures protecting them while they work, users get a consistent, customizable experience whenever and wherever they access it."
Tags : 
    
Google Chrome Enterprise
Published By: ServiceNow     Published Date: May 15, 2018
Increase service visibility and improve your service delivery by efficiently mapping IT infrastructure to business-critical services. Shine a spotlight on IT issues that threaten your business services. Read this eBook and learn how to transform the way you solve IT service delivery issues today.
Tags : 
    
ServiceNow
Published By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? This is not the right question to ask first. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services – or add additional ones – that are appropriate for your business. After examining each use case, we’ll show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix
Published By: TIBCO Software     Published Date: Feb 26, 2019
Digital Transformation of America's largest family controlled financial services institution with a history dating back to three generations. Learn how the role of data changed at the bank during a continued evolution of customer experience. First Citizens Bank has been using TIBCO's integration and advanced analytics technology to provide a seamless, consistent, customer self-service experience, to tackle fraud, or to provide more accurate and proactive financial services.
Tags : 
financial services, digital transformation, banking, fraud
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 20, 2019
The biggest headache for most payment operations teams is cost control — and a large part of it comes from fraud management: Investigation teams waste large amounts of time just assembling the data needed to make decisions. Detection engines are always playing catchup with the latest fraud patterns. Ever changing regulations increase the time and cost required to reach compliance and meet audit standards. Given their scope and impact, replacing core fraud systems is not an option for most firms. But instead of replacing them, you can improve the investigative process with augmented investigation, and improve the detection process by enhancing current systems. This whitepaper describes three ways financial services firms can use TIBCO solutions to lower the cost of investigations through faster results, reduce fraud losses through better detection, and simplify audit and regulatory compliance through centralized access to information.
Tags : 
compliance, audit, fraud, data, detection, transactions, investigation, cost
    
TIBCO Software
Published By: Mimecast     Published Date: May 15, 2014
This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : 
email fraud, threat protection, mimecast, cyber security, email security
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
The right third party solution can ensure that email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Office 365. But, what are the three key areas of concern around Office 365 email that you should be aware of? Read what Microsoft Office Servers and Services MVP, J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
office 365, risk mitigation, geek book, sla, cyberattacks
    
Mimecast
Published By: VMware AirWatch     Published Date: Nov 12, 2015
VMware continues to raise the bar in business mobility. It offers the most streamlined process for deployment and management of business mobility solutions through its EUC products, and has given IT administrators the perfect set of options to efficiently manage the challenges of business mobility. The company continues to grow by bringing complete solutions that go beyond simply providing basic client or desktop monitoring services. Frost & Sullivan believes that VMware is in an ideal position to help its customers execute on their next-generation business mobility strategies; based on this analysis Frost & Sullivan recognizes VMware with the 2015 Visionary Innovation Leadership Award.
Tags : 
vmware, business mobility, euc products, end user computing
    
VMware AirWatch
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times.
Tags : 
sap, lean, lean enterprise, three-tierd, operations, lehman, costs, operations, shared services level, corporate level, division level, leadership, crisis management, corporate strategy, enterprise visibility, enterprise applications, governance, united pipe, benchmark, procurement
    
SAP Inc.
Published By: Kaseya     Published Date: Aug 10, 2010
IT professionals need to support users through innovative and cost-efficient IT services but currently lack the budget, staff and tools to meet their goals.
Tags : 
kaseya pps, automation framework, systems management, it systems management pain points, roi, user satisfaction, automation, it platform
    
Kaseya
Published By: Intacct Corporation     Published Date: Sep 18, 2014
The professional services market is back—and more competitive than ever. How will you outperform your competitors? By monitoring the financial metrics that matter. Through years of thorough research, Service Performance Insight has analyzed and identified the profit-centric measures that are highly correlated with financial success in professional services. Download the white paper, "The 5 KPIs that Matter for Professional Services," to learn: • The importance and primary characteristics of financial maturity. • The 5 financial metrics critical to service organizations. • Where successful service organizations fall in these metrics.
Tags : 
intacct, kpi, professional services, financial metrics, service performance insight
    
Intacct Corporation
Published By: NetApp     Published Date: Apr 02, 2014
According to this global survey, in three years more than half of all IT services will be delivered via private, public and hybrid clouds. This study highlights the challenges faced by IT organizations as they move into a new role as “cloud brokers” and how a common data platform can help enable seamless data management across multiple clouds.
Tags : 
netapp, software storage, sds, forrester, software defined storage, data center, performace, capacity requirements
    
NetApp
Published By: GE Healthcare     Published Date: Jun 04, 2014
The central theme of industry wide adoption of EHRs is based on the concept of “meaningful use,” which by design is a metric that will connect all the moving parts of this complicated initiative into a system that communicates and delivers high-grade electronic healthcare services. To qualify as a “meaningful user,” eligible providers must demonstrate use of a “qualified EHR” in a “meaningful manner.” It is a lofty and worthwhile goal. This white paper examines the total cost of ownership for “meaningful” EHR adoption in a physician practice.
Tags : 
ge healthcare, emr, emr replacement, electronic medical records, emr adoption, meaningful use, productivity, vendor, change management, healthcare it
    
GE Healthcare
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library