E-mail Monitoring Reports

Stronger collaboration platforms emerge as pandemic legacy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Developing an Integrated Customer and Employee Experience
sponsored by Microsoft
WHITE PAPER: Employees often use software that's much older and hard to use than the applications that customers use. Increasingly that gap detracts from both experiences. Learn how to fix it with our new guide to integrating both types of applications. Get it free in exchange for taking our brief survey on your employee experience platfrom purchase plans.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

Microsoft

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

Geiger Ready-Mix Improves Decision Making and Controls Costs with Kronos
sponsored by Kronos Incorporated
CASE STUDY: Geiger upgraded from a paper timecard system that required manual processing - a significant challenge for an organization with a weekly payroll cycle. The system could handle some of Geiger's unique pay features, but they had no way to track this information historically. Read on to learn how Geiger overcame this and other challenges.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Kronos Incorporated

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

Swimming with the Current: Six Major Trends in Workforce Management Compliance
sponsored by Workforce Software
WHITE PAPER: This white paper provides an overview of the major trends affecting workforce management compliance. Discover tips and recommendations to help your organization cultivate a culture of compliance.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Workforce Software

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Skill Level and Training Key Factors in IT Project Success
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper provides an analysis of a comprehensive survey with 144 senior IT managers examining the impact training and skill level had on the success of 377 IT projects.
Posted: 01 Dec 2008 | Published: 26 Nov 2008

Hewlett Packard Enterprise

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc