CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

hr analytics

Results 301 - 325 of 339Sort Results By: Published Date | Title | Company Name
Published By: Epicor     Published Date: Jan 09, 2019
Behind the scenes of the world’s leading industrial and manufacturing companies, a profound digital transformation is now underway .1 As with any profound transformation, the opportunities for competitive advantage and growth are enormous, but so are the challenges . How do you determine what your next digital transformation steps should be? How do you position your manufacturing business to take the next step—and the one after that? This eBook will help you answer these questions . In it we will: XX Introduce the role of visibility in digital transformation XX Consider three key trends that are shaping the future of manufacturing by delivering the visibility that enables transformation: – Growth of the Internet of Things (IoT) – The advance of analytics – The migration of applications to the cloud XX Identify the traits you need in your core systems to take advantage of these trends—giving you the visibility to identify and take the steps that will help transform your business into
Tags : 
    
Epicor
Published By: Limelight Networks     Published Date: May 03, 2011
In this whitepaper you will learn about the three major trends re-shaping the ecommerce landscape: Video as a way to enhance the shopping experience; Mobile as a channel for expanding marketing reach; and Personalization informed by advanced analytics.
Tags : 
limelight networks, rich-media strategies, ecommerce, online retail, consumer behavior, video, mobile, personalization, analytics
    
Limelight Networks
Published By: Cloudreach     Published Date: Apr 02, 2019
Why data analytics initiatives are worth the investment
Tags : 
    
Cloudreach
Published By: Splunk     Published Date: Aug 21, 2018
Alice Bluebird, a quirky security analyst for hire, is hunting down a nation state of hackers thirsty for the recipes of Frothly, a cutting-edge craft brewery. Follow Alice as she works to solve the mystery of the breach. Did she catch the incident before the hackers managed to steal Frothly’s super secret formulas? Did the hackers act alone or — scarier yet In this light hearted graphic novel “Through the Looking Glass Table”, discover how machine data, as well as an analytics-driven platform, log management, SIEM, UEBA and SOAR solutions, can help anyone — IT managers and sophisticated SOC analysts — better understand and respond to incidents, breaches, phishing attempts, insider threats and more.— did they have help from the inside?
Tags : 
    
Splunk
Published By: EMC Corporation     Published Date: Mar 20, 2014
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis, security
    
EMC Corporation
Published By: RSA Security     Published Date: Oct 24, 2013
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
rsa, emc, secuirty, warning, threat, analytics, security
    
RSA Security
Published By: Motorola Solutions     Published Date: Jun 24, 2019
At Motorola Solutions, our purpose is simple; we create mission-critical communication solutions to help our customers build safer cities and thriving communities. That’s why we recently acquired Avigilon, an industry leader in video, access control and video analytics solutions, in our ongoing effort to provide trusted security solutions to our customers to help them be their best in the moments that matter. In the modern world of utilities, when it comes to providing electricity to light the family kitchen, transporting clean drinking water across many miles to the tap, or delivering the natural gas that heats the oven — everything must follow a process. At the frontline of ensuring these processes remain consistent, is having the ability to instantly know when an incident occurs that can disrupt the critical work that needs to be done. Avigilon access control and video management software is available to help utility operations ensure their critical processes are protected, so servi
Tags : 
    
Motorola Solutions
Published By: Sage People     Published Date: Dec 04, 2017
What is People Science? With People Science, organisations can finally use people data to understand how and why the workforce behaves the way it does. Once they have an insight into how their people interact with their environment and how that affects systems and performance, they can go about making better people decisions.
Tags : 
analytics, workforce, data, sources, record, organisation
    
Sage People
Published By: Cisco     Published Date: Jan 15, 2015
In today’s dynamic network environment, point-in-time solutions lack the visibility and control you need to implement an effective security policy that will accelerate threat detection and response. And disparate solutions only add to capital and operating costs and administrative complexity.
Tags : 
operating costs, capital, threat detection, visibility, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, data management
    
Cisco
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions delivered via Software as a Service (SaaS). More than 2,800 customers with employees in 150 countries count on Ultimate’s award-winning UltiPro® suite to unite all aspects of HR, payroll, and talent management throughout the employee life cycle, all supported by powerful reporting and analytics.
Tags : 
software, network management, network solutions, best practices, business intelligence, productivity, business optimization
    
SolidFire_NetApp
Published By: Microsoft     Published Date: May 16, 2016
In this eBook, we cut through the hype about advanced analytics and present it in a straightforward, actionable way that shows how it leads to value and a competitive advantage for retailers.
Tags : 
advanced analytics, iot, internet of things, microsoft, customer experience, consumers, retailers, purchase path, personalized service
    
Microsoft
Published By: Forcepoint     Published Date: Oct 03, 2019
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. This webinar explores how companies should rethink data security, focusing on the following three principles: Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of context and user intent Learn more about how to embrace a risk-adaptive approach to data protection.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Oct 03, 2019
In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs. Understanding the location of all data, whether at-rest, in-use, or in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify their riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data. This webinar explores how companies should rethink data security. Protecting critical data and intellectual property requires a risk-adaptive, dynamic approach, including these three main components. Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of c
Tags : 
    
Forcepoint
Published By: IBM     Published Date: Jun 13, 2016
Unlock the people equation: Using workforce analytics to drive business results
Tags : 
ibm, human resources, hr analyrics, workforce analytics, workforce strategies
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Unlock the people equation: Using workforce analytics to drive business results
Tags : 
ibm, human resources, hr analyrics, workforce analytics, workforce strategies, human resource technology
    
IBM
Published By: Business.com     Published Date: Jun 03, 2009
At a time when most businesses are facing lengthening sales cycles, reduced budgets and staff cut-backs, its imperative to keep leads flowing into the business and at a lower cost. In this study of over 27,000 B2B web sites, Business.com found 93% of B2B companies are in danger of having their best intentions come back to haunt them. Learn more today!
Tags : 
black box, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: IBM     Published Date: Jan 20, 2016
Workforce analytics can challenge conventional wisdom, influence behavior, and enable HR and business leaders to make smarter decisions that impact business outcomes.
Tags : 
ibm, analytics, workforce, workforce analytics, enterprise applications, business technology, human resources
    
IBM
Published By: Google     Published Date: Oct 26, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Google     Published Date: Jan 24, 2019
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Skillsoft     Published Date: Jun 25, 2015
Read this white paper to learn why HR divisions are turning to analytics as a key capability to proactively drive business strategy. HR professionals need a consistent analytical point of reference to make human capital decisions that impact business results.
Tags : 
analytics, business strategy, human capital decisions, human resources
    
Skillsoft
Published By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS’ unique, hybrid approach to insider threat deterrence – which combines traditional detection methods and investigative methodologies with behavioral analysis – enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
    
SAS
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, you’ll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search