post

Results 426 - 450 of 462Sort Results By: Published Date | Title | Company Name
Published By: Work4     Published Date: Feb 27, 2013
The essence of great recruiting is to fish where the fish are. As times change, the "recruiting waters" get overfished. This is what makes the profession so highly flexible. Over the course of a decade, the success of one technique creates the demand for the next.
Tags : 
facebook recruiting, facebook recruitment, social recruiting, employer branding, social media recruitment, recruiting on facebook, how to post a job on facebook, how to recruit on facebook
    
Work4
Published By: ExtraHop     Published Date: Jul 25, 2013
ExtraHop enables healthcare IT organizations to harness the massive amounts of wire data flowing through their environments. See how ExtraHop can help to manage departmental and legacy applications while also supporting new initiatives such as meaningful use, compliance, VDI, EHR/EMR, and mobile applications.
Tags : 
operations, wire data, extrahop, applications, storage, compliance, vdi, mobile applciations
    
ExtraHop
Published By: RES Software     Published Date: Apr 08, 2013
RES Software, diteur leader de solutions de poste de travail dynamique, annonce le dploiement de sa solution de gestion des environnements de travail au sein du Groupe Chque Djeuner. Le Groupe Chque Djeuner est une entreprise sociale cre en 1964, considr comme le numro 3 mondial sur le march des titres spciaux de paiement vocation sociale et culturelle. Fort dune prsence linternational dans 13 pays, regroupant plus de 2130 collaborateurs, en 2011, le Groupe Chque Djeuner a realise un volume daffaires de 4,3 milliards deuros et un chiffre daffaires de 290,3 millions.
Tags : 
    
RES Software
Published By: HP and Intel      Published Date: May 06, 2013
With the gaining popularity of virtualization in todays enterprise data centers, you need a virtual security solution that allows you to confidently adopt virtualization throughout your data center without compromising on your existing security postures.
Tags : 
virtualization, security, enterprise, data center, virtual security, access control, anti spam, anti spyware
    
HP and Intel
Published By: Oracle     Published Date: Nov 05, 2013
The key is knowing your target audience and creating video content relevant to them. This paper provides some key insights into how you can maximize your videos effectiveness in social streams.
Tags : 
branding, branded video posts, video posts, multimedia, engagement, audience targeting, video content, social media
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
In this sophisticated threat environment,traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization. This whitepaper presents best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.
Tags : 
security, threat enviornment, security posture, cyber resilient enterprise, minimize cyber risk
    
Symantec
Published By: FireEye     Published Date: Feb 28, 2014
Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.
Tags : 
fireeye, gartner research, cyber attacks, security posture, system exploitation, advanced attacks, malware download, control established
    
FireEye
Published By: GuideSpark     Published Date: Nov 19, 2018
Successful executives are increasingly recognizing that effective compensation communication is essential to strengthen the employee value proposition (EVP) and make it easier for employees to understand it. As a result, theyre creating communication strategies that connect the dots between performance and pay in ways that build trust and engagement, transform the workplace culture, and help drive productivity.
Tags : 
    
GuideSpark
Published By: PostUp     Published Date: Sep 25, 2014
Learn about the best practices regarding mobile email design and see what process your organization should be following in order to decide between a responsive or scaleable design.
Tags : 
postup, mobile responsive, mobile email, email marketing best practices, design mobile, designing for mobile, mobile email design
    
PostUp
Published By: PostUp     Published Date: Sep 25, 2014
Learn how to create an inspiring and exciting email program and see how 13 of the top industry B2C leaders have structured their campaigns.
Tags : 
postup, email creative, creative newsletter design, creative newsletter, creative email newsletters, email marketing solutions, email campaign, email marketing program
    
PostUp
Published By: Intel Security     Published Date: Oct 20, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of todays dynamic threat landscape.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking
    
Intel Security
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfhigkeit verschiedener E-Mail Security Lsungen. Der ESRA Report wird quartalsweise durchgefhrt und auch der aktuelle Report stellt Lcken bei vielen Systemen im Schutz von Unternehmen gegen bsartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen ber E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingnge der Benutzer bermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience fr E-Mails erhhen und mit einem mehrschichtigen Ansatz deutlich die Sicherheit fr Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Les postes de travail et applications Windows sont des lments vitaux pour lentreprise encore aujourdhui, malgr ladoption massive des plates-formes mobiles, smartphones et autres tablettes. Et pourtant, contrairement aux architectures mobiles, les architectures de postes de travail nont pas su voluer au fil des ans. Lheure de la transformation du poste de travail a sonn.
Tags : 
byod, emm, mobility, mobile computing, mobile data systems, mobile workers, enterprise software
    
VMware AirWatch
Published By: Akamai Technologies     Published Date: Dec 05, 2018
Akamai now mitigates the more than 65% of the 10,000-plus yearly DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. We attribute this growth to our proactive engagement with customers, and the ability to implement and manage proactive mitigation postures based upon their baselined network traffic. Akamai has been detecting and successfully mitigating DDoS attacks in an industry-leading SLA for 15 years. We will illustrate how Akamai continues to lead the industry with new capabilities including advanced customer traffic profiling and proactive mitigation controls to ensure the best possible results during an actual DDoS event.
Tags : 
    
Akamai Technologies
Published By: IBM     Published Date: Jul 20, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : 
ibm, aberdeen group, talent acquisition, recruitment, human resource technology
    
IBM
Published By: AWS     Published Date: Oct 07, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Pokmon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokmon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokmon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
    
AWS
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Cloud economics with entreprise-class performance. Updated legacy infrastructure and improved disaster recovery posture onboard resource-constrained FPSO vessel.
Tags : 
    
Hewlett Packard Enterprise
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: Lookout     Published Date: Dec 09, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2016
A key takeaway from this research is that adding mobile threat defense to EMM is the next step for enterprises looking to strengthen their mobile security posture. Get your copy of this report to learn more about how EMM and mobile threat defense deliver more than the sum of their parts.
Tags : 
mobile security, device encryption, enterprise mobility management, integration, mobile indetity, security management
    
Lookout
Published By: Fitbit     Published Date: Mar 20, 2017
February may have been the official American Heart Month - but it's never too late for you and your employees to take better care of your tickers. Fitbit Group Health has designed a poster and three tip sheets, that you can share within your organization. Your employees will get the heart-healthy advice they need, and youll get to shine as the wellness rock star that you are. Things to keep in mind as you download the kit: * The posters and tip sheets can be shared any number of ways, including via print, email, or uploaded to your company intranet. * Consider hanging the poster in well-trafficked areas like your lobby, kitchen, and hallways. * Think about giving one tip sheet a week to keep heart health top of mind. Enjoy the poster and tip sheets and good for you, for helping your employees love their hearts this month.
Tags : 
    
Fitbit
Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
    
FICO
Published By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in todays digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.