E-mail Monitoring Reports

Stronger collaboration platforms emerge as pandemic legacy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Stronger collaboration platforms emerge as pandemic legacy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

HR Makes Major Strides Toward Improving Employee Engagement
sponsored by TechTarget Data Management
EZINE: Boosting your employee engagement just got easier. In this e-zine, discover 3 avenues your organization can take to enhance employee engagement. Unlock the fundamentals of a killer employee experience strategy, and explore how to boost your business through the use of employee engagement tools.
Posted: 13 May 2019 | Published: 13 May 2019

TechTarget Data Management

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey

Ten Key Steps to Effective Succession Planning
sponsored by Halogen Software
WHITE PAPER: Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.
Posted: 21 Aug 2008 | Published: 20 Aug 2008

Halogen Software

How can HR protect employee data privacy during COVID-19?
sponsored by Kronos
EGUIDE: Collecting COVID-19 workforce health information is riddled with potential missteps. That's why HR needs to revisit compliance and data collection basics. Get expert tips on protecting employee data during COVID-19 in this expert guide.
Posted: 03 Aug 2020 | Published: 03 Aug 2020

Kronos

Web Monitoring for Employee Productivity Enhancement
sponsored by GFI Software
WHITE PAPER: Employees both want and don't want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement. Web monitoring is good for business.
Posted: 03 Jun 2009 | Published: 01 Jun 2009

GFI Software

TOTSA Unearths Greater IT Efficiency with DYS CONTROL!™
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
CASE STUDY: Messaging management, when deployed effectively, has the power to provide IT with knowledge regarding how many messages have been delivered, system measurements and cost allocation. Learn about an email management system that provides these...
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security