X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 security hr


Outsourcing Security Part 2: Measuring the Cost
Evaluating the cost of outsourcing can be challenging because most organizations cannot fully estimate the financial impact of such a decision.

security hr  in different types of security issues. Recruiting Due to high turnover rate in the IT field, organizations also need to consider the cost of recruiting. Whether internal HR staff or external recruiters are used, the cost of recruiting may average 20 to 30 percent of total annual compensation costs of the position being recruited. Training and education Ongoing training and education of security professionals is essential to honing skills and, more importantly, keeping staff current in an ever-changing, fa

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » security hr

Brave New World-Biometrics in HR


Human resources (HR) professionals often have to deal with errors in recording employees’ effectiveness while accomplishing their jobs. My colleague Ted Rohm gives an overview in this recent blog post of how biometrics can help with these HR challenges. He makes the case that biometrics technology is an option worth considering for certain aspects of business operations. As Ted mentions in his

security hr   Read More

State of the Market: HR


Despite predictions that it would be subsumed by enterprise resource planning (ERP) vendors encroaching from above and automation vendors encroaching from below, the manufacturing execution systems (MES) market has been growing steadily. This guide from TEC and Flexware Innovation provides state-of-the-market analysis, success stories from your peers, in-depth information on solutions, and a spotlight on leading vendors.

The products covered in this guide address the management of a company’s workforce, including hiring, payroll, benefits, training, health and safety, and more.

While HRIS are also commonly referred to as human resource management systems (HRMS) or as human capital management (HCM), for the purpose of this guide, we will refer to the systems that support HR functionality as HRIS throughout. All these systems—in one way or another—encompass core HR functionality.

We’ve included customer success stories to illustrate how the various HR solutions have helped companies like yours solve personnel, payroll, and benefit management problems.

For your convenience, there is also a vendor directory to assist companies looking for an HRIS, whether it’s an end-to-end on-premise solution, an on-demand or software-as-a-service (SaaS) solution, a third party solution, or a best-of-breed solution.

We hope you’ll find this guide a useful tool in determining which HRIS is best suited to your company’s business model and particular needs.


Table of Contents


Introduction

State of the Midsize HR Marketplace

Executive Summary: Core HR

Thou Shalt Manage Human Capital Better

Customer Success Story: Core HR

Nikon Reaps Benefits from Ultimate Software’s Ultipro

Executive Summary: Human Capital Management

Tactical Human Resources Evolves into Strategic Human Capital Management

Customer Success Story: Talent Management

Commerce Bank is Counting on Lawson

Vendor Spotlight

Auxillium West

Ceridian Canada Limited

CheckPoint HR

Lawson

NuView Systems, Inc.

Sage Software

Ultimate Software

Unicorn HRO


Download the full copy of the TEC 2008 HR Buyer’s Guide for SMBs.



Report Preview


State of the HR Marketplace


For many years, HR management has been viewed as the enterprise function responsible for staffing and personnel-related issues, such as recruiting and hiring, establishing employment policies, handling pay and retirement plans, and administering benefits. Today, company executives see the HR function in an entirely different way. From recruiting, hiring, and training new staff, to the transfer of key functions from the back office to the front line, it is evident that executives are looking to transform HR from a seemingly low-priority function into a strategic and vital part of the business.

What is fueling this transformation is that SMB executives are beginning to understand the critical link between their people and the bottom line. To remain competitive as an SMB in today’s job market, employers need to know what their employees are doing, what skills they have, their ambitions, how they are progressing, and how they fit into the future of the business.

SMBs that continue to view HR as strictly a department or administrative service and that fail to infuse HR functions throughout the organization will inevitably limit their ability to compete and grow.

We’ll review some of the trends in the HR space, as well as some of the challenges facing SMBs in the wake of globalization and the changing HR landscape.


Download the full copy of the TEC 2008 HR buyers guide for SMBs.

security hr   Read More

Incident Handling and Response Capability: An IT Security Safeguard Part 2: Establishing the Capability


As long as human intervention is part of network operations, there will always be vulnerabilities and an Incident Response capability establishes a force to minimize the effect of system security breaches.

security hr   Read More

Incident Handling and Response Capability: An IT Security Safeguard Part 1: Are You Ready to Support an Incident Response Capability?


The Internet has few boundaries, thus each business is required to build and implement their own safeguards. Unfortunately, most IT department's requests for security technology and training are turned down, UNTIL a system security incident occurs. This could be a costly mistake.

security hr   Read More

TCO & Security of Enterprise Grade Mobility


While mobility has been a key factor behind the consumerization of IT in the enterprise, it has created a new set of security challenges in the workplace. Read this research with IT decision makers from the various departments across the UK public sector to understand the challenges they are encountering in the face of compliance, control, cost, and consumerization, and to gain best-practice lessons in mobile enterprise management.

security hr   Read More

Understanding the PCI Data Security Standard


The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC DSS and learn the costs and benefits of compliance.

security hr   Read More

Application Security, Inc.


Application Security, Inc. (AppSecInc) is the leading provider of application security solutions for the enterprise. AppSecInc's products – the industry's only complete vulnerability management solution for the application tier – proactively secure enterprise applications at more than 350 organizations around the world. Historically, organizations have secured their networks and host operating systems by applying the vulnerability management methodology. This four-step process allows organizations to proactively manage risk by baselining what elements they have and identifying what vulnerabilities are present on them; prioritizing security measures based on value and risk; intelligently applying protection based on this prioritization; and then applying ongoing monitoring to flag any issues. AppSecInc products are the industry's most complete line of security solutions for the application tier that apply to applications the same vulnerability management methodology organizations use to secure their networks and general-purpose operating systems. By securing data at its source, we enable organizations to more confidently extend their business with customers, partners and suppliers while meeting regulatory compliance requirements. Our security experts, combined with our strong support team, deliver up-to-date application safeguards that minimize risk and eliminate its impact on business. Please contact us at 1-866-927-7732 to learn more, or visit us on the web at www.appsecinc.com

security hr   Read More

Core HR: Becoming a True Business Partner


Core HR is the essential (if not the most glamorous) component of an organization's human capital management strategy. And what successful companies understand is that core HR lays the foundation for not just compliance, but employee engagement and business success. Based on data from nearly 300 organizations, this Aberdeen Research Brief examines how core HR service delivery is linked to true HR/business partnership.

security hr   Read More

Compaq, HP, IBM, Intel and Microsoft Create New PC Security Alliance


Five key vendors, Compaq, HP, IBM, Intel, and Microsoft have allied together to develop a new hardware and software specification for personal computer security. The alliance has set a goal of publishing a specification proposal by the second half of 2000. It remains to be seen what impact this will have on the rapidly increasing number of information security attacks.

security hr   Read More

Selecting Your Hosted Security Service Provider: What Every IT Manager Needs to Know


Do-it-yourself (DIY) security can be daunting. It requires significant time, effort and expertise to maintain strong security while complying with information access and disclosure regulations. Find out how a hosted security solution can provide reliable and comprehensive security coverage for your company’s e-mail, Web, and instant messaging (IM), without requiring extensive expertise or equipment in-house.

security hr   Read More