Email Monitoring Reports

How to Choose an HR Software System in 2022: A Complete Guide
sponsored by Microsoft
WHITE PAPER: Evaluating HR software can be complex. Our new, free 40-page guide to choosing HR software is a great placeĀ  to start. It's yours now in exchange for taking our short survey on your employee experience purchase plans.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

Microsoft

Stronger collaboration platforms emerge as pandemic legacy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Seagate: Driving Success through HCM
sponsored by Ramco Systems
WHITE PAPER: Seagate is the worldwide leader in storage solutions, offering the industry's broadest portfolio of hard disc drives. In order to maintain its market leadership, the company needed to centralize its HR services to manage its worldwide operations. View this resource to find out how they simplified HR and workforce management.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

Ramco Systems

Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
sponsored by SpectorSoft
PRODUCT DEMO: Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
Posted: 23 May 2013 | Premiered: 23 May 2013

SpectorSoft

Elliott Reduces Cost and Increases Efficiency with its Kronos Solution
sponsored by Kronos Incorporated
CASE STUDY: Elliott Company decided to implement the Kronos Workforce Central suite in 2004 to help improve its ability to track and manage attendance, overtime, and vacation while remaining compliant with complex labor laws and union pay policies. Read this case study to find out how it worked out for them.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Kronos Incorporated

Geiger Ready-Mix Improves Decision Making and Controls Costs with Kronos
sponsored by Kronos Incorporated
CASE STUDY: Geiger upgraded from a paper timecard system that required manual processing - a significant challenge for an organization with a weekly payroll cycle. The system could handle some of Geiger's unique pay features, but they had no way to track this information historically. Read on to learn how Geiger overcame this and other challenges.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Kronos Incorporated

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Eliminate Performance Anxiety Manage Employee Performance Better
sponsored by Epicor Software Corporation
WHITE PAPER: How do you manage the performance of your workforce today? Access this guide to learn how to implement effective goal setting around 5 key traits, construct an efficient feedback loop, and harness the right tools to manage performance across your entire organization.
Posted: 30 Jun 2014 | Published: 31 Oct 2012

Epicor Software Corporation

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security