Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Monitoring Employees

RSS Feed    Add to Google    Add to My Yahoo!
Monitoring EmployeesReports
 
E-Guide: Uniting SIM and IAM to Boost Security
sponsored by SearchSecurity.com
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

SearchSecurity.com

Workday and Chiquita - Managing a Fast-Moving, Global Workforce
sponsored by Workday
CASE STUDY: This case study explains how global food giant Chiquita harnessed a unified platform of HR, payroll and expenses to increase the speed of transactions and decrease errors. Learn how this platform in the cloud helped Chiquita free up IT resources and increase visibility at all levels of the organization.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

Workday

Human Capital Management
sponsored by IBM
WHITE PAPER: The following white paper explores a human capital management solution that HR organizations can leverage to manage content and processes associated with the employee lifecycle. Learn how you can promote efficient, consistent and accurate interaction, collaboration, and much more.
Posted: 22 May 2014 | Published: 22 May 2014

IBM

Recruiting 101: Establish a Process to Hire Right the First Time
sponsored by ConnectWise
WHITE PAPER: Recruiting is an essential process to build the infrastructure of your business. By planning out the recruiting and hiring process, you will have much greater success finding the right candidates the first time around. In this eBook, you'll learn how to plan, interview, and make hiring decisions with confidence.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

ConnectWise

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Learn the legal issues and security risks associated with unmanaged employee Internet use. This white paper discusses the security controls needed to mitigate risk, reduce threats and achieve compliance in the enterprise.
Posted: 27 Sep 2007 | Published: 27 Sep 2007

St. Bernard Software

Password Management Survey
sponsored by RoboForm Enterprise
WHITE PAPER: This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

RoboForm Enterprise

The future of productivity - Office 365
sponsored by Microsoft India
WHITE PAPER: Access the following white paper to uncover a cloud-based and collaborative solution that allows for both reduction of operating costs as well as an ability to increase the productivity of your employees.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Microsoft India

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007

Imprivata

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement