hr services

Results 351 - 375 of 405Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 30, 2008
Organizations must adapt more rapidly than ever before - which means that they must align their IT environments with their business goals and deliver information on demand, when and where it is needed. In this white paper, the experts at IBM discuss how your company can meet this need for information on demand with Service Oriented Architecture (SOA), a business-centric approach to IT architecture that supports integration through linked, repeatable business tasks or services.
Tags : 
xml, soa, service oriented, information management, leveraging information, li campaign, ibm li, business intelligence
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
End-to-end storage means that your data is well-managed, protected, and available when you and your customers need it most. IBM System Storage products simplify your infrastructure with servers and storage in one, allowing you to grow, and lowering the total cost of ownership through advanced energy management. Discover the IBM System Storage family of products, services and solutions, and see how they can bring value to your bottom line.
Tags : 
ibm, express seller, storage
    
IBM
Published By: IBM     Published Date: Nov 13, 2008
To grow your subscriber base, reduce churn and control costs, it is imperative that you achieve and maintain a deep understanding of the customer experience throughout your organization. This white paper highlights IBM Tivoli® Netcool® Service Quality Manager Service Solutions — how it can change the way telecommunications providers are taking new services to market and helping to crystallize.
Tags : 
ibm, tivoli, voip, iptv, blackberry, service level agreement
    
IBM
Published By: Reactivity     Published Date: Aug 21, 2009
This white paper discusses the three critical Web services deployment issues-security, provisioning connections, and operations. As each is owned by different factions within an enterprise, each can become a 'show stopper' to Web services deployment initially, and every time a change must be made.
Tags : 
web service security, secure web services, web service, internet security, web applications, file sharing, network security, reactivity
    
Reactivity
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When Spyder Active Sports offered to pay its IT outsourcing provider more money in return for more services, and the provider not only refused the offer but its service levels continued to go downhill, it was time to look for a new provider. It came down to three potential vendors, however, a number of factors lead Spyder to select OneNeck IT Services.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, outsourcing, governance, outsource
    
OneNeck IT Services
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : 
messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce
    
Symantec.cloud
Published By: SAS     Published Date: Aug 03, 2016
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
finance, best practices, digital channels, demand, financial services, fraud, customer experience
    
SAS
Published By: N-able     Published Date: Nov 23, 2010
IT Service Delivery: From Basic Automation through to Managed Services
Tags : 
it automation, network monitoring, remote desktop, network management, msp, managed services software
    
N-able
Published By: Adam Phones Ltd     Published Date: Dec 21, 2010
One in three SMEs and half of larger enterprises still do not have a company policy in place to govern the procurement and management of their mobile and wireless services
Tags : 
mobile, wireless, data, tariff
    
Adam Phones Ltd
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
field employees, screening, hireright, human resources, in home services screening
    
HireRight
Published By: NetApp     Published Date: Jan 21, 2014
According to this global survey, in three years more than half of all IT services will be delivered via private, public and hybrid clouds. This study highlights the challenges faced by IT organizations as they move into a new role as “cloud brokers” and how a common data platform can help enable seamless data management across multiple clouds.
Tags : 
    
NetApp
Published By: IBM     Published Date: Feb 05, 2014
From a communications equipment manufacturer optimizing investments with a security scan to a mutual insurance company reducing spam and threats with hosted web and email services, IBM security consultants have helped many companies evaluate their existing security practices against their business requirements and objectives. Read these customer references to learn how organizations managed risk, security and compliance with help from IBM.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, banking, security, cyber security, financial, insights
    
IBM
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : 
clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla
    
Globalscape
Published By: Mimecast     Published Date: Oct 02, 2019
If you are an moving to or already using Office 365 then it’s essential for you to formulate a plan toward a risk-free cyber resilience experience. Cyber resilience requires you to prepare for the before, during and after an attack/outage/incident. Doing so will protect your organization from security threats, compliance concerns, unplanned outages and more. To mitigate concerns and form a resilient strategy you have to first KNOW the risks. The right third-party solution can ensure email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Microsoft Office 365™. But, what are the key areas of concern around Office 365 email you should be aware of? Read what Microsoft Office Apps and Services MVP J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
    
Mimecast
Published By: IBM     Published Date: Jul 07, 2015
Through the IBM Network Innovation Centers, IBM brings together networking services and technology capabilities together to demonstrate infrastructure agility.
Tags : 
demonstrations, network innovation, networking solutions, interoperability, manageability, scalability, performance
    
IBM
Published By: MuleSoft     Published Date: Apr 15, 2019
The future of financial services is under pressure from profound digital disruption. Across the globe, there are forces, both regulatory and customer-led, that open up the market to new entrants and disrupt what customers are buying — and how. The advent of Open Banking is one major influence, with Open APIs paving the way for third-party developers to build applications and services independently. This whitepaper outlines the challenges facing financial services firms and how a new approach to enterprise integration — API-led connectivity — can help banks and financial services firms not only survive, but thrive in an increasingly competitive future. Download this whitepaper to learn: What financial services firms should do about Open Banking, based on the experiences of the impact of PSD2 in Europe How an API strategy could define the future of financial services How a global bank successfully completed a digital transformation initiative
Tags : 
    
MuleSoft
Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Apr 01, 2016
To understand your organization’s risk profile: “You should start with a simple question: What are your digital assets and the cyber threats facing them,” says HPE Security Services CTO, Andrzej Kawalec. Watch the insight Kawalec and Marshall Heilman of FireEye Inc. share in order to protect your organization from what has become daily, even hourly, attacks for many.
Tags : 
    
Hewlett Packard  Enterprise
Published By: AWS     Published Date: Oct 07, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Dell EMC PowerEdge-Server mit Intel® Xeon® Platinum Prozessoren bieten eine schnellere und zuverlässigere Performance für Virtualisierung, konvergente IT, Hybrid Cloud und Big Data. Profitieren Sie von mehr Automatisierung, Skalierbarkeit und Sicherheit, indem Sie ein Upgrade auf die PowerEdge-Server der neuen Generation durchführen. Über Dell Financial Services stehen flexible Finanzierungsoptionen zur Verfügung.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Durch die Optimierung der IT-Infrastruktur mit regelmäßig aktualisierten erstklassigen Servern können Unternehmen die Flexibilität steigern, die Effizienz verbessern und Betriebskosten reduzieren. Das Dell EMC PowerEdge- Portfolio mit Intel® Xeon® Platinum Prozessoren bietet mehr Automatisierung, Skalierbarkeit und Sicherheit und sorgt so für eine optimal ausgeführte IT Infrastruktur. Erfahren Sie mehr über unsere PowerEdge-Server der neuesten Generation. Über Dell Financial Services stehen flexible Finanzierungsoptionen zur Verfügung. Intel Inside®. Neue Möglichkeiten Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside
    
DellEMC and  Intel®
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library