Hr Using Encryption AsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Hr Using Encryption As returned the following results.
RSS What is RSS?
Related Categories

 •   Human Resource Management
 •   Workforce Management
 •   Employee Performance (EPM)/ Talent Management
 •   Human Capital Management
 •   Data Security
 •   Encryption and Key Management
 •   Enterprise Data Protection and Privacy
 •   Employee Relationship Management (ERM)
 •   Integrated Human Resources Utilities
 •   Business Intelligence Solutions

Related Searches
 •   Access Hr
 •   Companies Hr Using
 •   Developments Hr Using Encryption
 •   Hr Article
 •   Hr Group
 •   Hr Intranet
 •   Hr Using Consulting
 •   Hr Using Encryption File
 •   Hr Using Encryption Info
 •   Need Hr Using Encryption
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Beyond the Security Breach: Protecting Sensitive Data Using Encryption & Key Management by Linoma Software

February 10, 2009 - (Free Research)
This paper identifies how organizations need to deploy new solutions to protect their information assets from theft and misuse, it also explores the landscape of legal liabilities and identifies the technical hurdle facing both management and IT. 
(WHITE PAPER) READ ABSTRACT |

Killing Data by Voltage Security, Inc.

February 10, 2012 - (Free Research)
Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals. 
(WHITE PAPER) READ ABSTRACT |

2009 Annual Study: U.S. Enterprise Encryption Trends by PGP Corporation

September 17, 2009 - (Free Research)
Check out this study, which analyzes survey results from 997 U.S. business and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection. 
(ANALYST REPORT) READ ABSTRACT |

Network Security Checklist by Cisco Systems, Inc.

February 28, 2008 - (Free Research)
Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company. 
(WHITE PAPER) READ ABSTRACT |

How to Cut Overhead Costs Right Now: Connect Remote Workers, Using VPN Security by Cisco Systems, Inc.

August 14, 2009 - (Free Research)
Giving remote workers easy and secure access to your network with virtual private network (VPN) technology can result in big savings. 
(WHITE PAPER) READ ABSTRACT |

What's Working in HR Today, and the Biggest Gaps to Fill by Oracle Corporation

November 30, 2012 - (Free Research)
This study explores talent management tactics that are working for companies today and the extent to which companies have been able to integrate talent management applications and move toward a holistic process. Read on to learn about current talent management pros as well as areas that could use some improvement. 
(WHITE PAPER) READ ABSTRACT |

Looking under the hood: Answers to top questions CIOs ask cloud-based HR vendors by SuccessFactors

August 14, 2013 - (Free Research)
Not every HR cloud application is made equal, but how can you identify the right software-as-a-service (SaaS) HR strategy? This resource counts down seven questions that savvy CIOs and business leaders need to ask HR SaaS application vendors in order to find success. 
(WHITE PAPER) READ ABSTRACT |

AMN Healthcare Simplifies HR Management, Streamlines Reporting by Workday

September 11, 2012 - (Free Research)
AMN Healthcare Services, Inc., the nation's leading provider of healthcare staffing and management services, was struggling with multiple systems that kept track of HR data, due to a number of acquitions over the years. In this video, learn how AMN was able to consolidate their HR data in one system of record. 
(VIDEO) READ ABSTRACT |

Talent Management Trends and Tech: The Value of the Cloud by Workday

October 31, 2013 - (Free Research)
In this guide, learn about the technology and market forces at play in the world of talent management systems, and what they mean for HR buyers. Read best practices and advice from experts and HR practitioners on the daily management and use of talent management systems, and get definitions for common terms. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly – 16 July 2013: Cloud takes to the stage at the Royal Opera House by ComputerWeekly.com

July 16, 2013 - (Free Research)
In this week's Computer Weekly, we talk to the Royal Opera House about how using public cloud boosted ticket sales and improved performance of its IT infrastructure. We examine why agile development failed in the government's flagship Universal Credit welfare programme. And we analyse the real risks of sweating your IT assets. Read the issue now. 
(EZINE) READ ABSTRACT |

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

CW Buyers Guide: Human Resource Management by ComputerWeekly.com

August 08, 2013 - (Free Research)
In this 10-page buyer's guide, Computer Weekly looks at the HR Management technologies available and what they can offer to organisations. 
(ESSENTIAL GUIDE) READ ABSTRACT |

When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption by WatchGuard Technologies, Inc.

February 24, 2011 - (Free Research)
WatchGuard XCS SecureMail Email Encryption (XCS SecureMail) technology, powered by Voltage, provides easy-to-use, business-class encryption to enable organizations to securely transmit and receive private and sensitive data. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Aker Shipyard Reduces Fees and Payroll Error to Achieve 110% ROI Fast. by Kronos Incorporated

December 01, 2008 - (Free Research)
In September 2003, Aker's payroll and human resources team determined that its current human resources application, Abra could no longer support the company in pursuing its organizational objectives. Aker evaluated solutions from Kronos, ADP, and Ceridian. Kronos Workforce HR and Kronos Workforce Payroll were chosen for a number of reasons... 
(CASE STUDY) READ ABSTRACT |

What Every HR Manager Needs to Know about Online Recruiting by Sage Abra

March 03, 2008 - (Free Research)
This white paper discusses topics that HR Managers need to know to understand the growing importance of online recruitment, and to create strategies that fully utilize the Internet as a key source of highly-qualified applicants. 
(WHITE PAPER) READ ABSTRACT |

Oracle Business Intelligence Applications Overview by Oracle Corporation

January 22, 2011 - (Free Research)
This paper explains how Oracle Business Intelligence (BI) Applications are complete, prebuilt BI solutions that deliver intuitive, role-based intelligence for everyone in an organization - from front line employees to senior management - that enable better decisions, actions, and business processes. 
(WHITE PAPER) READ ABSTRACT |

6 Reasons Why Software-Based Encryption Doesn’t Stack Up by MXI Security

April 30, 2010 - (Free Research)
Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations. 
(WHITE PAPER) READ ABSTRACT |

Modern HR in the Cloud: Social Job Distribution by Oracle Corporation

April 01, 2014 - (Free Research)
In this brief, find best practices for automating your recruiting via social media channels so that you can access new audiences on Facebook and Twitter, and better understand the ways of the modern HR world. 
(WHITE PAPER) READ ABSTRACT |

Q-EKM: Quantum Encryption Key Manager: Enterprise Proven Security for Your Valuable Data at Rest by Quantum Corporation

July 07, 1967 - (Free Research)
Quantum's Encryption Key Manager (Q-EKM) is an Enterprise proven, easy-to-use solution for managing encryption keys across multiple Quantum libraries. 
(WHITE PAPER) READ ABSTRACT |

Smarter human resources with IBM business analytics by IBM

November 04, 2013 - (Free Research)
The following webcast depicts how business analytics for your HR department can help to effectively forecast workforce requirements and how to best fill open positions. 
(WEBCAST) READ ABSTRACT |

HR Technology Toolkit by ComputerWeekly.com

January 27, 2014 - (Free Research)
Leading European & international academic offer insights into HR technology in this in-depth report from HR Zone. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Accelerate Performance in Human Resources by SAP America, Inc.

January 27, 2012 - (Free Research)
This white paper addresses HR challenges and metrics solutions for improving operations. 
(WHITE PAPER) READ ABSTRACT |

Technology value matrix: Human Resources solutions by ComputerWeekly.com

October 19, 2012 - (Free Research)
Recent developments in programming languages and platforms made HR solutions more user friendly and easier to deploy and manage, says analyst Nucleus Research. 
(ANALYST REPORT) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 01, 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts