compliance

Results 176 - 200 of 2023Sort Results By: Published Date | Title | Company Name

Workday Makes Auditing Easy

Published By: Workday Nordics     Published Date: Sep 19, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
workday, workday technology, digital strategy, financial auditing
    
Workday Nordics

The Smart Archive strategy from IBM

Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This solution brief introduces the Smart Archive strategy from IBM, which is a comprehensive approach that combines IBM software, systems and service capabilities to help you drive down costs down and help ensure critical content is properly retained and protected.
Tags : 
ibm uk, ibm smart archive, ibm smart archive strategy, hardware, software, services, optimize, unify content, ingest, infrastructure, integrate, integration, compliance, analytics, ediscovery, networking, security, storage, business technology, data center
    
Ogilvy - IBM UK

Best Practices for Ensuring Security and Trust in the Cloud

Published By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices, knowledge management, enterprise applications, data management, human resource technology, business technology
    
Salesforce

Best Practices for Ensuring Security and Trust in the Cloud

Published By: Salesforce     Published Date: Jan 15, 2016
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices, knowledge management, enterprise applications, human resource technology, business technology
    
Salesforce

A New Approach to Audit and Control in Enterprise Software

Published By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics

Financial Services: Drive Acquisition, Retention, and Innovation Using Customer Feedback

Published By: Bazaarvoice     Published Date: May 17, 2013
Learn how authentic customer feedback helps card issuers, online and retail banks, insurance companies, and credit unions drive sales, loyalty, and lifetime customer value - while remaining compliant with industry regulations.
Tags : 
customer acquisition, customer retention, customer innovation, compliance, financial service providers
    
Bazaarvoice

Managing Change and Complexity with Identity and Access Governance

Published By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, enterprise applications, access control, application security, authentication, business continuity, compliance
    
NetIQ

the Mastering the Complexity of Revenue Management white paper

Published By: Intacct Corporation     Published Date: Jan 26, 2016
Get the white paper "Mastering the Complexity of Revenue Management" to learn: • 5 specific steps you can take to ensure better compliance, improved visibility, and lower costs. • 9 key revenue management technology requirements that decision makers can't afford to miss. • Why Vendor Specific Objective Evidence (VSOE) is worrying more and more revenue managers and what you need to do about it. • 7 benefits that optimized revenue management brings to your organization, including accelerated closing, reduced revenue leakage, and forecasting visibility.
Tags : 
    
Intacct Corporation

Defending Against Insider Threats To Reduce Your IT risk

Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business, access control, anti virus, application security, identity management, internet security, security management, web service security, vulnerability management
    
CA Technologies

Content-Aware Identity & Access Management in a Virtual Environment

Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection, application security, authentication, internet security, intrusion prevention, security management
    
CA Technologies

Cloud Security Myths and Strategies Uncovered

Published By: VMware     Published Date: Aug 18, 2011
This executive level paper highlights trends and findings from CIO's 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter.
Tags : 
vmware, cloud security, trends, virtualized datacenter, compliance, cloud environments, cso, strategies, secure cloud initiative, virtualization, governance, cloud computing, vulnerability management
    
VMware

Meeting Data Residency and Compliance Challenges in Global Enterprises

Published By: Voltage Security     Published Date: Sep 28, 2012
Meeting Data Residency and Compliance Challenges in Global Enterprises
Tags : 
data residency, information privacy, patriot ii act, voltage security, business technology
    
Voltage Security

7 Essential Benefits of Hybrid Cloud Backup

Published By: Datto Inc.     Published Date: Jan 31, 2013
Business continuity, data insurance, local storage flexibility, cost benefits, standards compliance and infrastructure control. This is just some of what Datto and hybrid cloud backup can do for you, and your clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.

A Guide to Public Cloud: An inside-out approach for extending your data center to the cloud

Published By: VMware, Inc.     Published Date: Apr 05, 2016
Business teams striving to move quickly into new markets and launch new products and services are demanding more from IT organizations that have traditionally been focused on avoiding downtime, ensuring security and compliance, and holding down costs. Cloud computing offers compelling benefits for IT and the business to gain on-demand access to IT resources for new application development, as well as for running existing applications.
Tags : 
cloud, public cloud, data center, vcloud, vcloud air, it organizations, it management
    
VMware, Inc.

State of App Security

Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron

How EMM Helps with GDPR Compliance

Published By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
data security, regulation, legal system, data protection
    
MobileIron

Best Practices for Limiting Your 401(k) Liability: A Small Business Primer

Published By: Fisher Investments     Published Date: Apr 22, 2015
This is whitepaper about best practices for the specific responsibilities and obligations in managing and administering a 401K plan.
Tags : 
best practices, 401k, small business, compliance, liability, violations, responsibilities, financial, fiduciary
    
Fisher Investments

How to Squash An Insider Threat With End User Experience Monitoring

Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data, it management, knowledge management, enterprise applications
    
Aternity

The Concerto Compliant Cloud

Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
Download this whitepaper to learn more about cloud compliance.
Tags : 
    
Concerto Cloud Services

Making Collaboration Pay Off – Think Piece

Published By: SAP     Published Date: May 04, 2016
Part of a series on the Future of Procurement, by Oxford Economics
Tags : 
sap, ariba, collaboration, procurement, oxford economics, supply risk, compliance, cost saving, additional revenue, enterprise applications, business technology
    
SAP

Making Collaboration Pay Off – Think Piece

Published By: SAP Ariba     Published Date: May 05, 2016
Part of a series on the Future of Procurement, by Oxford Economics
Tags : 
sap, ariba, collaboration, procurement, oxford economics, supply risk, compliance, cost saving, additional revenue, enterprise applications, business technology
    
SAP Ariba

Elekta Radiates with Faster Innovative Solutions

Published By: CA Technologies     Published Date: Nov 02, 2016
In the past 20 years, Elekta has achieved measured growth through nearly a dozen acquisitions, pulling new radiotherapy, brachytherapy and magnetoencephalography technologies into the fold. To deliver the full benefit of these sophisticated devices to providers and patients, Elekta must tie them together into integrated solutions— an immense and complex undertaking that can be further complicated by regulatory compliance.
Tags : 
    
CA Technologies

The Basics of Encryption and Compliance

Published By: Citrix ShareFile     Published Date: Feb 06, 2017
Do you know why data encryption is important for your business? Find out how using advanced encryption lets you: - Protect your data and reputation while meeting clients’ expectations. - Support your compliance with industry regulations and ethical obligations. - Eliminate paperwork and other overhead associated with data storage and sharing.
Tags : 
networking, security, enterprise applications, business technology
    
Citrix ShareFile

Creating the Network for the Future Digital Financial Institution

Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital, connected world is fundamentally changing the dynamics of the financial services industry. Consumers expect anytime and anywhere access with a customer experience commensurate with the Internet world, while fintech start-ups disrupt established value chains, driving a need to deliver faster innovation. This is creating tremendous pressure on the network, with escalating demands for performance and agility, while cost control and compliance imperatives remain as dominant as ever. This paper looks at optimal strategies for CIOs and CTOs, exploring how the future network needs to evolve to both drive operational effectiveness and enable business change, while assessing key investment and strategic considerations for equipping the network for the digital financial institution.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
Juniper Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.