RecruitingBlogscom

Follow Us:

 

agencies

Results 101 - 125 of 242Sort Results By: Published Date | Title | Company Name
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.
Published By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : 
ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
    
NAVEX Global
Published By: Jive Software     Published Date: Jun 26, 2013
Successful marketing is, at its core, all about collaboration. Yet working together—across teams, departments and agencies, as well as with customers and partners—is getting more difficult as the pace of business and the number of moving parts increase. Most marketers still depend on the same tools and methods they used 20 years ago: email, meetings, phone calls and desktop apps, leading to a lot of disconnects, inefficiency and pain. But change is finally at hand.
Tags : 
marketing, social business technology
    
Jive Software
Published By: Tripwire     Published Date: Nov 07, 2012
The thought of continuous monitoring is an ancient concept. Many federal agencies are required to continuously monitor their systems. Read on to learn what continuous monitoring is and how organizations can devise a solution that works.
Tags : 
tripwire, continuous monitoring, security, data breach, it security, data management, business technology, data center
    
Tripwire
Published By: Workterra     Published Date: Oct 03, 2017
The world of employee benefits is changing as much for insurance agencies and brokers as it is for employers and HR and benefits leaders. Everyone is dealing with uncertainty over affordable care mandates, ever-complicated benefits administration and HCM technology options, and blurred lines among HR vendors and insurance companies and brokers. Despite that changing landscape around employee benefits, HR and insurance brokers, agencies, and consultants can all win when they have a friend in the world of HR technology — a friend who understands and can respond to the challenges that everyone in the equation is facing today.
Tags : 
    
Workterra
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
    
Forcepoint
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
    
Microsoft Windows
Published By: Entrust Datacard     Published Date: Jul 21, 2014
Learn which solutions help agencies comply with U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) standards.
Tags : 
identity, authentication, first responders, u.s. homeland security, frac
    
Entrust Datacard
Published By: HP Data Center     Published Date: Feb 18, 2009
Today's IT executives are not only expected to create and maintain high-availability IT environments, but they are also expected to implement green initiatives to satisfy customers, analysts, and government agencies that are worried about the impact of modern, energy-thirsty data centers on the environment. Is such a dual mandate reasonable? Can companies be expected to maintain service levels and reduce their carbon footprints at the same time? The White Paper offers a description of the different types of services available to improved energy efficiency data center design and a prescription for successful implementation.
Tags : 
hp data center, energy efficiency, data center, high-availability it environments, green initiatives, it infrastructure, epeat, global commerce, hvac, crah, cdpr, power usage effectiveness, pue, go green, dcie, networking, security
    
HP Data Center
Published By: Shavlik Technologies     Published Date: Apr 19, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
Shavlik Technologies
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
For most corporations and federal agencies, buildings are the biggest emitter of greenhouse gases and represent the best opportunity to cost-effectively reduce environmental impact and achieve sustainability. Investments in green building strategies consistently result in significant benefits for organizations today.
Tags : 
ibm, smarter buildings, environment, energy, go green, green building
    
IBM US Smarter Buildings
Published By: Crimson Hexagon     Published Date: Jun 13, 2013
Through deep analysis of social data, we seek to discover opportunities for automotive companies to gain insight into consumers' nuanced, evolving perceptions. In this document, we discuss our research findings and explain the implications for automakers and their creative agencies.
Tags : 
social media, nameplate marketing, social data, emerging marketing
    
Crimson Hexagon
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
Through deep analysis of social data, we seek to discover opportunities for agencies to streamline the production of compelling content to incorporate into a pitch deck. We discuss our research findings, and explain the implications for creative, media, and full-service agencies.
Tags : 
social intelligence, agency pitch, analytics, campaign roi, social media, advertising agencies
    
Crimson Hexagon
Published By: Crimson Hexagon     Published Date: Oct 10, 2013
Download this case study to learn how Crimson Hexagon developed a framework for measuring advertising effectiveness by analyzing the online conversations surrounding Target's major Black Friday ad campaigns in 2011 and 2012.
Tags : 
campaign effectiveness, ad campaign effectiveness, online conversation, ad agencies, ad appraisal, social media
    
Crimson Hexagon
Published By: McAfee     Published Date: Apr 16, 2014
This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Tags : 
siem, log management, federal agency, compliance, situational awareness, visualization, security
    
McAfee
Published By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Be more productive, collaborative, and get more done faster using Cisco WebEx Meeting Center — the proven industry leader in web and video conferencing. As a FedRAMPcompliant service, you can use Cisco WebEx to hold regular meetings with anyone — regardless of location. Manage projects, host meetings, and make faster, more informed decisions by keeping everyone on the same page with meetings that allow everyone to see, hear, and view the same information at the same time. And host engaging and creative sessions with colleagues, internal teams and other agencies.
Tags : 
    
Cisco
Published By: HP     Published Date: Jan 20, 2015
Today's data landscape brings enormous opportunity to organizations to derive insights from all their data. Learn how government departments, agencies, public healthcare providers, and educational institutions can harness the value of Big Data today.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: CradlePoint     Published Date: Sep 04, 2014
In a world where traditional tethers to the central office have all but vanished, enterprises that operate vehicle fleets require constant and dependable mobile Internet connectivity to keep up. Businesses, organizations, and public agencies with vehicle fleets find productivity gains and improved fleet management by deploying dependable mobile connectivity in vehicles. Additionally, travelers and mass transit commuters now expect constant connectivity, and not just through their mobile phones.
Tags : 
constant connectivity, dependable mobile connectivity, cradlepoint, mobile phones, wireless
    
CradlePoint
Published By: Bounty Jobs     Published Date: Oct 14, 2015
In this e-book, you'll learn how to: -Increase hiring velocity for high-demand talent -Create stronger recruiting teams -Find and engage the right agencies The six data points in this e-book are critical to unlocking the full potential of direct hire agencies in order to land those highly sought-after job candidates. Commanding this data will also position your recruiting teams to become strategic advisors to your company and its business units.
Tags : 
direct hire agencies, headhunters, job candidates, recruiting teams, recruitment, human resources
    
Bounty Jobs
Published By: Lenovo and Intel®     Published Date: May 02, 2017
Body cam technology produces terabytes of data to manage and maintain. It’s no secret that video is the new paradigm in law enforcement; but, with video comes the need to log, manage, store, and secure thousands of hours of content?—?and that makes HUGE demands on your data center infrastructure. In this white paper, we detail infrastructure challenges faced by state and local agencies and how they are overcoming them with powerful infrastructure solutions.
Tags : 
    
Lenovo and Intel®
Published By: Datastax     Published Date: Apr 04, 2017
Enterprises today continue to differentiate themselves with cloud applications – any application that needs to be always-on, distributed, scalable, real-time, and contextual. With DataStax Enterprise, DataStax delivers comprehensive data management with a unique always-on architecture that accelerates the ability of enterprises, government agencies, and systems integrators to power the exploding number of cloud applications. DataStax Enterprise (DSE) powers these cloud applications that require data distribution across data centers and clouds, by using a secure, operationally simple platform. At its core, DSE offers the industry’s best distribution of Apache Cassandra™. This paper provides a summary of the features and functionality of DataStax Enterprise that make it the best choice for companies that are looking to leverage the promise of Apache Cassandra™ for production environments.
Tags : 
distribution, apache cassandra, cloud, datastax
    
Datastax
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top