hr strategy

Results 1 - 25 of 322Sort Results By: Published Date | Title | Company Name
Published By: Avanade DACH     Published Date: Jan 08, 2019
To compete in today’s world, business leaders are placing increased demands on IT. Unfortunately, many IT departments are not able to deliver future innovation with their current infrastructure, applications and processes. To meet these demands, IT must digitally transform the enterprise through the adoption of cloud native practices, allowing them to both optimize and transform their existing infrastructure and applications. Recent Avanade research supports this thinking, finding that 88% of senior IT decision-makers believe that IT modernization is crucial to addressing the emerging requirements of the digital business1 . On the upside, those surveyed also indicated that by modernizing their IT infrastructures they expect to deliver real business results, such as boosting annual revenue by 14%, while at the same time reducing business operating costs by 13%1 . For many, this sounds like a winning strategy but what does it mean to adopt cloud native approaches, and how does it impact
Tags : 
    
Avanade  DACH
Published By: Workday UK     Published Date: Sep 18, 2018
In this Argyle Executive Forum webinar replay, leading HR executives across industries provide expert insight and recommendations for building an analytics strategy and putting a data foundation in place.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Sep 18, 2018
Ready to reshape the future of work? Watch this video series to learn how you can use workforce technology to transform your organisation. After viewing the series, you’ll know how to develop a digital HR strategy, get executive buy-in, and maintain success.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Sep 18, 2018
In this five-episode video series, Jason Averbook shows you the ins and outs of workforce technology and how to use it to achieve HR success. Watch the series to learn ways to develop a digital HR strategy, get executive buy-in, and maintain success.
Tags : 
    
Workday UK
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
We are renegades and realists who blend strategy, technology and creativity to tackle every client challenge. We imagine the businesses that will shape tomorrow’s world and help our clients make them real. We uncover insights from data that others can’t see and deliver progressive ideas through the use of IBM Design Thinking. We ground every strategy with a focus on delivering the ultimate experience – for customers, for employees, for shareholders. Everything we do drives measurable impact at scale. For more information, visit ibm.com/ibmix
Tags : 
    
Group M_IBM Q119
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications, business intelligence, data quality
    
Virtela Communications, Inc.
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: Engagio     Published Date: Jan 14, 2019
B2B demand generation has almost completely re-invented itself over the last decade. The collision of inbound, content marketing, lead nurturing, marketing automation, analytics, email, search, social media and native advertising has transformed the discipline from a dark art to an increasingly data-driven science. But there’s a problem When it comes to helping to land and expand these major deals, today’s marketing teams are seriously handicapped. The Clear & Complete Guide to Account Based Marketing (ABM) is your guide to solving this problem. It will take you, step-by-step, through this fast-emerging discipline, showing you how to align your sales and marketing team around a strategy that’s optimized for the biggest, most important deals.
Tags : 
    
Engagio
Published By: Cantaloupe     Published Date: Mar 30, 2010
The hype about video search has just begun which means lots of questions, lots of new experts, and not enough time to sort through it all. This new whitepaper "An Effective Video SEO Strategy in Three Phases" will give you the blueprint for getting started and beyond. Learn all about: the 2 things you should be doing right now to improve your video search engine optimization; widespread myths about what works and what doesn't; Advanced tips for even greater results and more!
Tags : 
cantaloupe, online video, social media, search, communication, facebook, twitter, seo, engagement
    
Cantaloupe
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Digital transformation (DX) is a must for midsize firms (those with 100 to 999 employees) to thrive in the digital economy. DX enables firms to increase competitive advantage through initiatives such as automating business processes, creating greater operational efficiencies, building deeper customer relationships, and creating new revenue streams based on technology-enabled products and services. DX is a journey, and it starts with firms embracing an IT-centric vision that guides a data-driven, analytics-first strategy. The outcome of DX initiatives depends on the ability of a firm to efficiently leverage people (talent), process, platforms, and governance to meet the firm’s business objectives.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Glint     Published Date: Sep 19, 2017
When building an employee engagement survey, one question outweighs all others: How can the results be made as actionable as possible? This white paper explores new approaches being leveraged by enterprises today.
Tags : 
employee engagement, hr metrics, employee engagement survey, employee engagement strategies, employee engagement strategy
    
Glint
Published By: Workday Spain     Published Date: Sep 19, 2018
In this Argyle Executive Forum webinar replay, leading HR executives across industries provide expert insight and recommendations for building an analytics strategy and putting a data foundation in place.
Tags : 
    
Workday Spain
Published By: Workday Spain     Published Date: Sep 19, 2018
In this five-episode video series, Jason Averbook shows you the ins and outs of workforce technology and how to use it to achieve HR success. Watch the series to learn ways to develop a digital HR strategy, get executive buy-in, and maintain success.
Tags : 
    
Workday Spain
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
    
Akamai Technologies
Published By: Websense     Published Date: Jul 08, 2014
This paper provides 5 essentials for protecting against advanced persistent threats (APTS)
Tags : 
apts, understanding apts, apt security strategy
    
Websense
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
apis, risks of apis, apis can increase organization's risks, api security, data integration
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper outlines the defense-in-depth strategy that complements the traditional security solutions to provide protection against ATP's across all four phases of the attack.
Tags : 
advanced persistent threats, apts, defense-in-depth strategy, new security strategies, ca security, security
    
CA Technologies
Published By: TriNet     Published Date: Jan 17, 2012
This white paper provides valuable insight on how to build an HR strategy that produces results in any economy.
Tags : 
trinet, integrated hr outsourcing, in-house infrastructure, internal costs, human resources, cost structure, finance
    
TriNet
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Everybody has their favorite apps. But can you name even three mobile websites you like? We can’t. it’s because responsive retrofits to 20-year-old desktop web designs fail to serve us in our mobile moments of need. That’s a shame because even with lousy sites, web traffic around the world will be majority-mobile by 2019. eBusiness pros have a choice: hand your mobile moments over to a bunch of apps you don’t own, or do a radical reset of your mobile web strategy. This report carries the evidence to convince your company to make your mobile website a firstclass citizen.
Tags : 
mobile, app, web design, media
    
Akamai Technologies
Published By: Websense     Published Date: Oct 06, 2014
This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain
Tags : 
apts, understanding apts, apt security strategy, stages of advanced threats
    
Websense
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept