Measured Workday RisksWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Measured Workday Risks returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Policies
 •   Security Monitoring
 •   Treasury / Cash / Risk Management
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Application Security
 •   Network Security
 •   Wireless Security
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Implementation Measured Workday Risks
 •   Integrated Measured
 •   Java Measured
 •   Measured Agency
 •   Measured Workday Benefit
 •   Measured Workday Risks Example
 •   Measured Workday Risks Summary
 •   Measured Workday Risks Web Cast
 •   Measured Workday Specialists
 •   Providers Measured
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Workday Security: A Technology Perspective by Workday

October 2008 - (Free Research)
Workday uses industry-standard measures to protect the integrity of all communications with its online services, its production network, and across its network. 
(WHITE PAPER) READ ABSTRACT |

Workday Solutions: Human Capital Management by Workday

Change is the one constant in business. Workday Human Capital Management is designed to help your organization develop its global workforce. People are your company's most valuable resource. Commit to growing not only your business, but also your people. 
(SOFTWARE PRODUCT)

Workday Security: An Application Perspective by Workday

October 2008 - (Free Research)
Read this white paper to learn about the innovative security features of Workday products, which focus on user authentication, authorization, and validation. 
(WHITE PAPER) READ ABSTRACT |

Workday Security: A Compliance Perspective by Workday

October 2008 - (Free Research)
Workday understands that compliance is a critical business requirement for their customers and they have designed Workday Enterprise Business Services™ with strict compliance demands in mind. 
(WHITE PAPER) READ ABSTRACT |

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension

January 2010 - (Free Research)
Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment. 
(WHITE PAPER) READ ABSTRACT |

Video: Developing Workday Big Data Analytics with Customers by Workday

March 2014 - (Free Research)
View the following webcast to get a firsthand look at how big data analytics offers a solution to the typical BI dilemma. See how BDA also allows for the user to manipulate data in real time to craft powerful visualizations, reports, and more. 
(VIDEO) READ ABSTRACT |

The Workday Advantage: Human Capital Management in the cloud by Workday

October 2013 - (Free Research)
Workday HCM delivers real-time business insight using Software as a Service (SaaS) technology for the global enterprise. View this fascinating webcast now to learn more about HCM in the cloud! 
(WEBCAST) READ ABSTRACT |

Cisco Continuous Data Protection for Files by Cisco Systems, Inc.

March 2009 - (Free Research)
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software. 
(WHITE PAPER) READ ABSTRACT |

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction by Qualys, Inc.

October 2009 - (Free Research)
Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk? 
(WHITE PAPER) READ ABSTRACT |

Securing the Borderless Enterprise by Websense, Inc.

February 2010 - (Free Research)
A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Embedded Analytics for Financial Management in Workday 19 by Workday

May 2013 - (Free Research)
This brief article reveals how the latest update to Workday's financial management system puts embedded analytics in the palm of your hands. 
(WHITE PAPER) READ ABSTRACT |

Measure Risks and Vulnerability Effectively by Hewlett-Packard Limited

May 2013 - (Free Research)
This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals. 
(WHITE PAPER) READ ABSTRACT |

Workday VP Champions Mobile, Data-Driven Decisions for 2014 by Workday

March 2014 - (Free Research)
In this SearchFinancialApplications e-guide, our experts sit down with Leighanne Levensaler, Workday vice president of HCM products, as she explores the future of HCM and financials. Also inside, learn how one organization successfully made the leap from Excel to SaaS financial management. 
(EGUIDE) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

Three Ways to Prevent USB Insecurity by Lumension

October 2013 - (Free Research)
This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools. 
(WHITE PAPER) READ ABSTRACT |

Workday User Experience by Workday

March 2014 - (Free Research)
Access the following white paper to uncover how you can enable a stronger and more efficient workforce by implementing the right software UI. Inside, gain a firsthand look at how a simple UI can improve productivity, data accuracy, and more. 
(WHITE PAPER) READ ABSTRACT |

Video: Workday's Mobile Solutions for iPad by Workday

March 2014 - (Free Research)
View the following video to uncover what a user-centric application solution looks like. Learn how with simplicity, usability, and of course, the right functions, you can enable your workforce to do their job more efficiently ultimately driving innovation and higher revenue. 
(VIDEO) READ ABSTRACT |

Innovation from the Ground Up: The Next Generation of Enterprise Business Solutions by Workday

July 2008 - (Free Research)
This paper describes three step approach taken to create the next generation of enterprise business solutions "from the ground up". 
(WHITE PAPER) READ ABSTRACT |

Data Risk Management Solutions by IBM Software Group

May 2007 - (Free Research)
This white paper details the benefits of effectively calculating and quantifying risk to data within an organization, highlighting a holistic approach to monitoring, measuring and managing data risk and compliance. 
(WHITE PAPER)

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 2012 - (Free Research)
<p>To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.</p> 
(WHITE PAPER) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 2011 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

 Five tips to reduce risk from modern web threats by Sophos, Inc.

October 2010 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

The CISOs Guide to Measuring IT Security by Lumension

January 2012 - (Free Research)
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Changing Nature Of Cyber Crime, Attackers, Counter Measures and New Models For Defense In Depth by ESET

December 2009 - (Free Research)
The threat environment has changed drastically in recent years. Threats are more complicated and attackers are part of organized groups seeking profit rather than fame. In this Presentation Transcript, Charles Kolodgy of IDC highlights some attackers' successes, countermeasures in risk reduction, and a new model for defense-in-depth. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Human Capital Management in the Cloud by Workday

January 2012 - (Free Research)
In this video, explore the challenges that HR professionals face with legacy human resource systems and how to overcome them with a unified human capital management (HCM) technology. 
(VIDEO) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts