Email Monitoring Reports

Developing an Integrated Customer and Employee Experience
sponsored by Microsoft
WHITE PAPER: Employees often use software that's much older and hard to use than the applications that customers use. Increasingly that gap detracts from both experiences. Learn how to fix it with our new guide to integrating both types of applications. Get it free in exchange for taking our brief survey on your employee experience platfrom purchase plans.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

Microsoft

2021 UKI Salary Survey Results
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: We take a look at our 2021 Salary Survey results from over 300 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2021 and the current diversity landscape residing in the UK tech sector.
Posted: 15 Mar 2021 | Published: 22 Feb 2021

TechTarget ComputerWeekly.com

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

Stronger collaboration platforms emerge as pandemic legacy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

2010 Asset Management Operations and Compensation Survey Findings
sponsored by Advent Software, Inc
WHITE PAPER: In this survey you will learn how asset management has changed over the years and the different challenges asset management professionals have been facing.
Posted: 18 May 2011 | Published: 17 May 2011

Advent Software, Inc

Skill Level and Training Key Factors in IT Project Success
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper provides an analysis of a comprehensive survey with 144 senior IT managers examining the impact training and skill level had on the success of 377 IT projects.
Posted: 01 Dec 2008 | Published: 26 Nov 2008

Hewlett Packard Enterprise

Ten Key Steps to Effective Succession Planning
sponsored by Halogen Software
WHITE PAPER: Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.
Posted: 21 Aug 2008 | Published: 20 Aug 2008

Halogen Software

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
sponsored by SpectorSoft
PRODUCT DEMO: Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
Posted: 23 May 2013 | Premiered: 23 May 2013

SpectorSoft

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security