compliance

Results 151 - 175 of 2023Sort Results By: Published Date | Title | Company Name

Enterprise Term Licensing: Simple, Flexible, and Predictable

Published By: Adobe     Published Date: Feb 20, 2014
As a valued customer, Adobe understands that your enterprise takes extensive advantage of our software, with anywhere from hundreds to thousands of licenses for a variety of Adobe solutions. With the Adobe Enterprise Term License Agreement (ETLA), we are now making the management and procurement of your Adobe software simpler, more flexible, and predictable.
Tags : 
adobe, adobe software, enterprise term licensing, etla, adobe solutions, software management, software compliance, tco
    
Adobe

Accelerate Your Salea Performance

Published By: Adobe     Published Date: Mar 21, 2017
While most business is digital, most organizations still rely on paper for the “last foot” of the process: the sign-off. Continued reliance on paper-based signatures is fraught with risks, including impeding productivity, reducing visibility, hampering compliance?and diminishing the customer experience. Electronic signatures (e-signatures), which are easily implemented from the cloud, help speed up the sales process by reducing errors and bottlenecks, while also ensuring greater security and mobility.
Tags : 
    
Adobe

IDC Report: Architecting a Flexible Strategy for Securing Enterprise BYOD

Published By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : 
forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security
    
ForeScout

NAVEX Global’s 2015 EU, ME, Africa and Asia Pacific State of Compliance Programmes Benchmark Report

Published By: NAVEX Global     Published Date: Aug 18, 2016
In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.
Tags : 
compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas, security management
    
NAVEX Global

2016 EMEA & APAC Ethics & Compliance Whistleblowing Hotline Benchmark Report

Published By: NAVEX Global     Published Date: Oct 18, 2016
This report is an excellent starting point for organisations committed to benchmarking and improving programme effectiveness. To leverage more advanced benchmarks, NAVEX Global offers custom benchmarking options as part of our Integrity DiagnosticsTM and Integrity MetricsTM report service. These services allow you to get apples-to-apples benchmarking for your organisation based on your industry, company size, or other defining factors.
Tags : 
    
NAVEX Global

2016 Ethics & Compliance Training Benckmark Report

Published By: NAVEX Global     Published Date: Oct 18, 2016
In 2016 NAVEX Global partnered with an independent research firm to survey ethics and compliance (E&C) professionals from a wide range of industries about their approach to E&C training.
Tags : 
    
NAVEX Global

A PRESCRIPTIVE GUIDE TO Third Party Risk Management

Published By: NAVEX Global     Published Date: Oct 18, 2016
This report aims to help you identify the compliance program you have in place, how to document your program elements and finally, develop and implement a work plan for addressing gaps.
Tags : 
    
NAVEX Global

The New FCA Whistleblower Rules: What You Need to Know

Published By: NAVEX Global     Published Date: Oct 18, 2016
This paper summarises: What the new FCA whistleblower rules are and why they were introduced, how the rules will impact your company’s ethics and compliance efforts and what actions to take both before and after the rules are fully enforced
Tags : 
    
NAVEX Global

UPMC: The Future of Personalized Medicine

Published By: Infomatica     Published Date: Jul 15, 2015
UPMC is a cutting edge leader in harnessing the power of technology and accelerating innovation. This case study explores how UPMC was able to integrate clinical, financial, administrative, genomic and other information and use this data to: • Improve research outcomes in search of cures and other diseases • Determine the true cost of providing care with longitudinal patient records • Examine clinical practice variations to benchmark and improve future procedures • Strengthen information security, privacy and compliance capabilities
Tags : 
    
Infomatica

Think Beyond the Pay Slip: Strategic Workforce Management

Published By: Workforce Software     Published Date: Jun 04, 2015
If you ask ten different people to define workforce management, you are likely to get ten different answers. Download to learn the answers.
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software

Best Practices for Selecting an Enterprise Time and Attendance System

Published By: Workforce Software     Published Date: Jun 04, 2015
This paper provides a guide to large employers confronted by the time and attendance evaluations dilemma.
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software

Overcoming the 5 Roadblocks to Workforce Management Success

Published By: Workforce Software     Published Date: Jun 04, 2015
In the case of a technology project seeking to hit its mark—from staying on budget to achieving the desired results—these failures can be traced back to shortcomings in how the human element of the project was managed. Download to learn more!
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software

Think Beyond the Pay Slip: Strategic Workforce Management

Published By: Workforce Software     Published Date: Jun 04, 2015
If you ask ten different people to define workforce management, you are likely to get ten different answers. Download to get the answers!
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software

Maximizing IT Security with Configuration Management

Published By: Puppet     Published Date: Mar 09, 2017
Configuration management can play an incredibly important role in IT security due to its basis in establishing and maintaining a known and consistent state of the physical and software elements at your organization’s disposal. This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including: • Creation of a Standard Operating Environment (SOE) • Reporting on and control of configuration drift • Enhanced change remediation • Insight into configuration knowledge • And more
Tags : 
    
Puppet

How to Accelerate Your AWS Cloud Journey to Reach Cloud Maturity

Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Organisations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimise your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
    
CloudHealth by VMware

Five Operational Imperatives to Fuel FI Growth

Published By: Q2 eBanking     Published Date: Jul 30, 2017
Banks and credit unions face multiple challenges to operational efficiency: tightening budgets, limited headcount, a challenging regulatory climate, ongoing security concerns and others. Efficiency and process enhancements can limit the impact these challenges could have on your institution. The following five questions—and your responses—may help your financial institution (FI) as you look to drive operational efficiencies, improve compliance and security, keep account holders happy and attract new ones.
Tags : 
    
Q2 eBanking

Cultivating a Culture of Compliance

Published By: SAP Concur     Published Date: Sep 25, 2019
"Regardless of your organization’s industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. However, by establishing checks and balances to put you in control of employee spend, and making it easy for employees to comply with policies, you can mitigate, detect, and prevent losses due to accidental errors or fraudulent activities. Download this tipsheet to find out how you can cultivate compliance to better protect your business today."
Tags : 
    
SAP Concur

Frost & Sullivan report on improving IT security and compliance with IBM's Cloud Managed Services

Published By: IBM APAC     Published Date: Nov 13, 2018
This Frost & Sullivan whitepaper explores some of the common fears and challenges related to security and compliance, and how a skilled managed service provider can help you overcome them as you deploy sensitive, business-critical workloads in the cloud.
Tags : 
    
IBM APAC

How to grow insurance revenue, reduce risk and ensure compliance by going digital

Published By: Equinix EMEA     Published Date: May 22, 2019
This playbook outlines how insurance companies can evolve their business architectures to meet user demand, reduce risk and comply with regulations. Insurers’ employees, partners and customers are increasingly interacting at the digital edge, where commerce, population centers and digital ecosystems intersect. A distributed interconnection platform at the digital edge allows insurance companies and ecosystem participants to accelerate their transformation and effectively compete with increasingly nimble challengers.
Tags : 
    
Equinix EMEA

The Hidden Costs of Microsoft Office 365 Security & Compliance

Published By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : 
cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
    
Proofpoint

The Hidden Costs of Microsoft Office 365 Security & Compliance

Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint

The Cost Of Microsoft Office 365 Security and Compliance

Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint

IBM QRadar Vulnerability Manager

Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC

How to Defend Your Perimeter from Today's Outsized Threats

Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai

Protecting Your Online Channels and Web Applications

Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.