hr organization

Results 1 - 25 of 867Sort Results By: Published Date | Title | Company Name
Published By: DATAVERSITY     Published Date: Nov 05, 2014
Ask any CEO if they want to better leverage their data assets to drive growth, revenues, and productivity, their answer will most likely be “yes, of course.” Ask many of them what that means or how they will do it and their answers will be as disparate as most enterprise’s data strategies. To successfully control, utilize, analyze, and store the vast amounts of data flowing through organization’s today, an enterprise-wide approach is necessary. The Chief Data Officer (CDO) is the newest member of the executive suite in many organizations worldwide. Their task is to develop and implement the strategies needed to harness the value of an enterprise’s data, while working alongside the CEO, CIO, CTO, and other executives. They are the vital “data” bridge between business and IT. This paper is sponsored by: Paxata and CA Technologies
Tags : 
chief data officer, cdo, data, data management, research paper, dataversity
    
DATAVERSITY
Published By: First San Francisco Partners     Published Date: Mar 03, 2017
Getting people successfully through a new enterprise information management (EIM) initiative requires a focus on the change’s impact to your organization’s data culture, processes and policies.
Tags : 
    
First San Francisco Partners
Published By: Melissa Data     Published Date: Mar 23, 2017
In this eBook published by Melissa, author David Loshin explores the challenges of determining when data values are or are not valid and correct, how these values can be corrected, and how data cleansing services can be integrated throughout the enterprise. This Data Quality Primer eBook gives an overview of the five key aspects of data quality management (data cleansing, address data quality, address standardization, data enhancement, and record linkage/matching), as well as provides practical aspects to introduce proactive data quality management into your organization.
Tags : 
    
Melissa Data
Published By: Experian     Published Date: Mar 12, 2018
Data is quickly becoming the currency of the emerging digital economy. As digital transformation efforts proliferate and become commonplace, data will take center stage as a critical driver of these initiatives. Organizations that are able to mobilize their data assets to power critical business initiatives will see a distinct advantage in the years to come. In fact, a majority of C-level executives (87%) believe that data has greatly disrupted their organization’s operations over the last 12 months. As the reliance on data deepens, the need for trustworthy and reliable data assets will become increasingly important. This year’s global study highlights several important issues and opportunities throughout the data management and data quality spaces. By discussing the latest advancements and challenges within our industry, we hope to empower all organizations to better leverage their data and to thrive in the digital economy.
Tags : 
    
Experian
Published By: Experian     Published Date: Mar 12, 2018
Data is quickly becoming the currency of the emerging digital economy. As digital transformation efforts proliferate and become commonplace, data will take center stage as a critical driver of these initiatives. Organizations that are able to mobilize their data assets to power critical business initiatives will see a distinct advantage in the years to come. In fact, a majority of C-level executives (87%) believe that data has greatly disrupted their organization’s operations over the last 12 months. As the reliance on data deepens, the need for trustworthy and reliable data assets will become increasingly important. This year’s global study highlights several important issues and opportunities throughout the data management and data quality spaces. By discussing the latest advancements and challenges within our industry, we hope to empower all organizations to better leverage their data and to thrive in the digital economy.
Tags : 
    
Experian
Published By: Looker     Published Date: Mar 15, 2016
Data centralization merges different data streams into a common source through unified variables. This process can provide context to overly-broad metrics and enable cross-platform analytics to guide better business decisions. Investments in analytics tools are now paying back a 13.01:1 return on investment (ROI), with increased returns when these tools integrate with three or more data sour- ces. While the perks of centralization are obvious in theory, the quantity and variety of data available in today’s landscape make this difficult to achieve. This report provides a roadmap for how to connect systems, data stores, and institutions (both technological and human). Learn: • How data centralization enables better analytics • How to redefine data as a vehicle for change • How the right BI tool eliminates the data analyst bottleneck • How to define single sources of truth for your organization • How to build a data-driven (not just data-rich) organization
Tags : 
    
Looker
Published By: IDERA     Published Date: Nov 07, 2017
Data modeling is all about data definition but has a much wider impact on the data of your organization. Quality data definition impacts how data is produced and directly impacts how the data is or will be used throughout an organization. That means that we must proactively govern the process of how we define data, to establish a common understanding across the team. In this whitepaper, Robert Seiner describes how data modeling is a form of data governance and provides insights on the three actions of governing data.
Tags : 
    
IDERA
Published By: AtomRain     Published Date: Nov 07, 2017
The world is more connected than ever before, and data relationships only continue to multiply. Yet enterprises still operate largely with an incomplete perspective caused by segmented, non-contextual and disconnected data silos. Connected data is the key to surviving, growing and thriving. However, a transformation across the entire enterprise won’t happen overnight, and each step must be measurable from both a business and technical perspective. Organizations need expert guidance to move more swiftly and avoid costly technical pitfalls in the new paradigm. This paper examines the journey to what we call, “The Connected Enterprise”.
Tags : 
    
AtomRain
Published By: First San Francisco Partners     Published Date: May 19, 2014
Master data management (MDM) is about people and process; it is not about technology. Implementing MDM technology alone will not address operational and business process challenges. Rather, “mastering” data involves people taking action through established data policies and processes. Data Governance ensures that data in the MDM hub is of high quality and can be trusted by business users. Lacking Data Governance, organizations do not have consistent data definitions or know what constitutes a data problem, who is accountable, what decisions need to be made, or how to escalate and resolve issues.
Tags : 
white paper, master data management, first san francisco partners, kelle o'neal, dataversity, data governance, mdm, master data management white paper, data governance white paper
    
First San Francisco Partners
Published By: Mimecast     Published Date: Jan 16, 2019
Employees frequently become unwitting participants in attacks, aiding the lateral movement of threats through the distribution of malicious URLS and attachments or the exposure of sensitive data. In this E-book, we’ll take a closer look into several email-related activities that employees often engage in that contribute to the spread of these insider (“hidden”) threats and then discuss what measures your organization can take to protect itself from these “hidden” threats.
Tags : 
    
Mimecast
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Threat actors increasingly look toward illicit cryptomining as an easy source of income. Cryptomining is the production of virtual currency, also known as cryptocurrency, such as Bitcoin and Monero. It comes at the expense of system performance and power consumption. Moreover, threat actors are infiltrating networks to use their victims’ computer resources to do this work for them. In this white paper, you will learn how to defend your organization from illicit cryptomining with the Cisco® security portfolio.
Tags : 
    
Cisco Umbrella EMEA
Published By: Epicor     Published Date: Jan 09, 2019
It’s important for American manufacturers to stay current if they wish to remain successful? Positioning yourself for growth means looking to the future and gaining efficiencies through new technologies? That’s why this question may be the most important one for your business— are you a future-ready manufacturer? Before you can adequately answer that question, you and the members of your organization need to know the answers to these three questions: X Where are we today? X Where do we want to be in three to five years? X How can we embrace innovation and automation? If decision-makers in your organization can’t answer these questions, you have bigger issues than you may realize? At the very least, tackling these tough questions now will put you ahead of competitors who are consumed with putting out today’s fires rather than focusing on growth opportunities? Manufacturers that aren’t prepared for the coming global megatrends and don’t invest in breakthrough technologies will be rende
Tags : 
    
Epicor
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
Threat intelligence done right is a window into the world of your adversary. Vendors and service providers are aiming to empower organizations by alerting them to the specific threat vectors and attacks they face, as well as how they should be prioritized for protection and prevention. Download this whitepaper which gives you an overview of 11 things for organization to consider when evaluating and selecting a threat intelligence solution.
Tags : 
    
Recorded Future
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, business intelligence, data integration
    
Ounce Labs, an IBM Company
Published By: Zebra Technologies     Published Date: Jan 30, 2019
Don’t let your legacy devices hold you back. Watch these three exclusive 2018 webinars to learn how Zebra can help you and your organization modernize your warehouse. Webinar #1: The Age of Android in the Enterprise Zebra’s Kevin Lollock, Regional Product Manager, Mobile Computing OS and Developer Platforms will unpack the vast migration to Android™ and the opportunities available for your warehouse and distribution centers. Webinar #2: Modernize the Warehouse with Android Warehouses without Windows®? Mark Wheeler, Zebra’s Director of Supply Chain Solutions discusses the migration to Android devices and shares a vision of the warehouse of the future. Webinar #3: How to Start your OS Migration Zebra’s Ritesh Gupta, Lead for Zebra Learning Services simplifies the steps of migrating to Android devices, including key considerations for planning, management, support and security. Get free access to these Webinars today!
Tags : 
    
Zebra Technologies
Published By: Mimecast     Published Date: Mar 01, 2010
How should you handle your growing email archiving issues? According to ESG (Enterprise Storage Group), the number of organizations using a SaaS-based email archiving solution has increased 350% in the past three years. It's not a question of if you should archive email, but how - and, the evolution of SaaS solutions makes sense to move email management to the cloud for a broader range of organizations.
Tags : 
mimecast, saas, email archiving, esg, business intelligence
    
Mimecast
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
Champion innovation through collaboration Win or lose? Jack Welch, former chairman and CEO of General Electric, said, "If the rate of change on the outside exceeds the rate of change on the inside, then the end is near." To win in today’s fast-paced market, you need to innovate. This eBook shows you how to transform your team and organization into one that is more agile and better equipped to innovate using a modern collaboration platform. A collaborative culture helps you: Widen the ideation pipeline Accelerate time to market Deliver higher quality products and new customer experiences Fill out the form to download the eBook to learn more about how to innovate with connected collaboration.
Tags : 
innovation, team organization, collaboration platform, market, culture
    
Microsoft Office 365
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality, reshaping the enterprise. This white paper is the second in a three-part series on enabling the mobile desktop while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality reshaping the enterprise. This white paper is the third in a three-part series on enabling the mobile enterprise while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Published By: Cisco EMEA     Published Date: Jun 01, 2018
Digital transformation has arrived, and it’s creating unprecedented opportunities for companies of all sizes to become market leaders through the evolution of business processes and the creation of new products and services. Organizations that master digital transformation will see a dramatic increase in revenues and profitability by converging people, processes and technologies; those that do not will struggle to survive. Evidence of this is clear to see by looking at the churn in the biggest companies in the world. For example, a Capgemini study found that since 2000, 52% of the Fortune 500 has disappeared through acquisitions or bankruptcies. The study also found that digital organizations control 70% of market share in all industries today. Therefore, making the shift to a digital business must be a top initiative for IT and business leaders. Download this whitepaper to see how Cisco has become the Market Share Leader in Online Meetings.
Tags : 
cisco, digital transformation, collabaration
    
Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept