E-mail Monitoring Reports

Developing an Integrated Customer and Employee Experience
sponsored by Microsoft
WHITE PAPER: Employees often use software that's much older and hard to use than the applications that customers use. Increasingly that gap detracts from both experiences. Learn how to fix it with our new guide to integrating both types of applications. Get it free in exchange for taking our brief survey on your employee experience platfrom purchase plans.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

Microsoft

How to Choose an HR Software System in 2022: A Complete Guide
sponsored by Microsoft
WHITE PAPER: Evaluating HR software can be complex. Our new, free 40-page guide to choosing HR software is a great place  to start. It's yours now in exchange for taking our short survey on your employee experience purchase plans.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

Microsoft

Uncovering assessment response bias
sponsored by IBM
WHITE PAPER: The following white paper details the importance of being able to evaluate nearly every aspect of a potential candidate and most importantly, how to do so.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

IBM

Power HR's Business Contribution
sponsored by Oracle Corporation
WEBCAST: In this educational webcast, human resources management expert Gretchen Alarcon explains how HR teams can ramp up their contribution towards meeting business goals by using actionable insights from both embedded and predictive analytics - along with "what if" modeling – to manage the workforce effectively and in real time.
Posted: 16 Jan 2014 | Premiered: Jan 16, 2014

Oracle Corporation

Geiger Ready-Mix Improves Decision Making and Controls Costs with Kronos
sponsored by Kronos Incorporated
CASE STUDY: Geiger upgraded from a paper timecard system that required manual processing - a significant challenge for an organization with a weekly payroll cycle. The system could handle some of Geiger's unique pay features, but they had no way to track this information historically. Read on to learn how Geiger overcame this and other challenges.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Kronos Incorporated

The future of productivity - Office 365
sponsored by Microsoft India
WHITE PAPER: Access the following white paper to uncover a cloud-based and collaborative solution that allows for both reduction of operating costs as well as an ability to increase the productivity of your employees.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Microsoft India

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
sponsored by SpectorSoft
PRODUCT DEMO: Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
Posted: 23 May 2013 | Premiered: 23 May 2013

SpectorSoft

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security