compliance

Results 1851 - 1875 of 1975Sort Results By: Published Date | Title | Company Name

Recognize the Many Faces of Fraud

Published By: IBM     Published Date: Jul 24, 2012
Detect and prevent fraud by finding subtle patterns and associations in your data. IBM SPSS predictive analytics solutions have proved to be very effective at helping tax collection agencies to maximize revenues by detecting non-compliance more efficiently and by focusing investigations on cases that are likely to yield the biggest tax adjustments.
Tags : 
fraud, business, healthcare, taxes, government, ibm, spss
    
IBM

Realizing the Full Value of Workforce Management (WFM) Systems

Published By: Skillsoft     Published Date: Jun 25, 2015
Workforce Management (WFM) systems have clearly evolved from the strictly transactional platforms used to deploy workers, track their time and attendance, manage their costs, pay them, administer benefits and provide compliance support. However, WFM systems are actually vital for driving overall business performance … not just for achieving excellence in HR, payroll and benefits administration, time and attendance management Read this white paper to learn how to realize the full value of workforce management systems.
Tags : 
workforce management system, wfm, attendance, cost, payroll, benefits, compliance, administration
    
Skillsoft

A Conversation with The Johns Hopkins Hospital on Lowering the Cost of Healthcare

Published By: IBM     Published Date: Apr 18, 2012
This webcast features a conversation with Tom Lentz, Manager of IT and Finance for the Facilities Department at The Johns Hopkins Hospital in Baltimore, MD/USA. During this Webcast, Axendia Industry Analyst Daniel Matlis discusses with Mr. Lentz how The Johns Hopkins Hospital uses its Integrated Asset and Service Management solution to improve uptime to support patient care; control costs for procurement, maintenance, labor and materials; support regulatory compliance activities; and use workflow capabilities for internal controls.
Tags : 
healthcare, johns hopkins, cost, asset management, service management, ibm
    
IBM

PCI DSS Compliance with Stingray Traffic

Published By: Riverbed     Published Date: Nov 08, 2012
Payment Card Industry Data Security Standard is a set of best practices and security measures that any organization must follow if they accept and handle cardholder data online. Read on to learn about securing your applications for security standard.
Tags : 
riverbed, stingray, pci dss compliance, stingray traffic, security, enterprise applications, business technology
    
Riverbed

eBook: Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance

Published By: Rapid7     Published Date: Nov 27, 2012
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook.
Tags : 
rapid7, technology, security, it management, business technology, access control, application security, compliance
    
Rapid7

Accelerating "Time to Value" Through Network Automation

Published By: Infoblox     Published Date: Jun 11, 2012
Companies require products that offload routine functions from the technology staff so that they can focus on more-important tasks. Download this whitepaper to learn what automation can do for you.
Tags : 
infoblox, time, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance, networking
    
Infoblox

Private Cloud Without Network Automation - Can It Be done?

Published By: Infoblox     Published Date: Jun 11, 2012
The dynamic nature of virtual and private cloud environments cannot be accommodated by an underlying infrastructure that is a static, physical assembly of routers, switches, servers, and firewalls. Find out more in this complimentary white paper
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls, agilitytime, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox

Ensuring Business Continuity Through IPv6 Adoption. What To Do Now and What Can Wait

Published By: Infoblox     Published Date: Jun 11, 2012
Learn why any organization relying on the IT ecosystem enabled by the Internet Protocol - especially those organizations with public-facing content - are at great risk. Get your free complimentary white paper NOW!
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls, agilitytime, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox

How Does IBM Deliver Cloud Security?

Published By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : 
security, cloud, ibm, access management, identity management, governance, risk management, compliance, access control, anti spam, anti spyware, anti virus, application security, business continuity, disaster recovery, encryption, firewalls, hacker detection, internet security, intrusion detection
    
IBM

Learn how organizations improve IAM strategy to achieve greater value

Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, data management, business technology, data center
    
Courion

Do risk and compliance factor in your security strategy?

Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, data management, business technology, data center
    
Courion

Learn how you can manage access risk in your organization

Published By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, security, database security, business technology
    
Courion

The Legal and Commercial Risks and Issues to Consider When Managing Emails

Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, disaster recovery, email security, encryption, high availability, security management
    
Mimecast

Enterprise Information Archiving

Published By: Mimecast     Published Date: Apr 04, 2013
Enterprise information archiving is contributing to organizational needs for e-discovery and compliance requirements, and reducing primary storage costs. Gartner evaluates vendors offering products and services that provide archiving for email, files and other content types.
Tags : 
enterprise, information archiving, email, ediscory, compliance, primary storage costs, roi, storage, archiving, data, backup and recovery, storage management, storage virtualization, email security, encryption, high availability, internet security, intrusion detection, intrusion prevention, email archiving
    
Mimecast

Protecting Unstructured Data on File Servers, NetApp, EMC and SharePoint

Published By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : 
security, data security, file share security, sharepoint, file servers, netapp, data management, data center
    
Quest Software

HP Converged Medical Infrastructure, with Meditech Software

Published By: HP-Intel®     Published Date: Feb 28, 2013
Hospitals today are responsible for much more than providing direct patient care including disease management, regulatory compliance with JCAHO, HITECH and HIPAA, and physician interoperability.
Tags : 
healthcare, converged medical infrastructure, meditech software
    
HP-Intel®

Bring Your Own Mobile Devices To School

Published By: HP - Intel®     Published Date: Oct 19, 2012
This white paper can help you address the security and management of multiple devices being introduced into your network. Read on and learn how to embrace a BYOD.
Tags : 
byod, bring your own device, mobile device, education applications, education, security risk, security compliance, security, business technology
    
HP - Intel®

Bring Your Own Device In Healthcare

Published By: HP - Intel®     Published Date: Oct 19, 2012
This paper discusses the challenges and solutions on how HP addresses the security and management of multiple Wi-Fi devices being introduced into the wireless/wired network.
Tags : 
byod, healthcare, bring your own device, mobile devices, security risk, security compliance, security, business technology
    
HP - Intel®

Software Asset Management

Published By: ServiceNow     Published Date: Apr 19, 2013
Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges.
Tags : 
software, lincense, compliance, software asset management, service management, application integration, application performance management, business activity monitoring, business integration, business intelligence, business management, enterprise software
    
ServiceNow

IT Governance, Risk and Compliance with ServiceNow

Published By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : 
it governance, risk, compliance, servicenow, webinar, software development, it management, knowledge management, platforms, data management, business technology
    
ServiceNow

Drive More Value from Your IT Assets

Published By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
asset management, technology, software asset management, compliance, mitigation of security risks, automation, security, it management, business technology
    
ServiceNow

Snow Secures Man-Sized Cost Savings For FTSE 250 Investment Specialist

Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, man investments, asset, softcat, it management
    
CDW

SAM in an Imperfect World: How to Address The Real-World Challenges of Managing Software Assets

Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management, remote access
    
CDW

Avoid costly fines: Ten compliance mandates you can't afford to ignore

Published By: Sage     Published Date: Jul 30, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
sage, compliance, workforce, fines, reporting, mandates
    
Sage
Start   Previous    65 66 67 68 69 70 71 72 73 74 75 76 77 78 79    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.