compliance

Results 226 - 250 of 2023Sort Results By: Published Date | Title | Company Name

The Hidden Costs Of Microsoft Office 365 Security & Compliance

Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint

The Cost Of Microsoft Office 365 Security And Compliance

Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint

Die Sicherheitsund Compliance- Kosten für Microsoft Office 365

Published By: Proofpoint     Published Date: Aug 21, 2017
Angreifer gehen heute kreativ vor und nutzen automatisierte Tools, um in Profilen bei sozialen Netzwerken (die häufig öffentlich zugänglich sind) nach Informationen über ihre Opfer zu suchen. Die Angreifer wissen daher, wo Sie arbeiten (und in welcher Position), ob Sie verheiratet sind und wo Sie in der Vergangenheit gearbeitet haben. Sie kennen Ihre Interessen, Hobbys und viele weitere Details. All diese Informationen werden zum Verfassen äußerst überzeugender E-Mail-Nachrichten verwendet, die Sie zum Klicken auf eine schädliche URL oder angehängte Datei verleiten sollen. Und sobald Sie geklickt haben, werden die Schaddaten auf Ihrem System abgelegt.
Tags : 
phishing, malware, bec, angriffe zielen auf menschen ab, für sicherheitsteams
    
Proofpoint

What Do You Mean TLS 1.3 Might Degrade My Security?

Published By: Gigamon     Published Date: Feb 20, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon

Regulatory Compliance and the IBM Mainframe- Key Requirements

Published By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : 
ca mainframe, mainframe, compliance, network performance, servers
    
CA Mainframe

As Your Network Gets Complex, Managing It Must Get Simple

Published By: HP - Enterprise     Published Date: Jun 05, 2013
As the networks become ever more essential to business processes, they are also increasing rapidly in size and complexity. Many factors can affect network availability and performance—increasing traffic, configuration problems, failed network elements, changes, and more. Since not all of these problems are hard failures, managing the network to detect and correct business-impacting problems requires new tools, strategies, and initiatives. To deliver the availability and performance business demands, network management teams need to optimize fault management and ensure availability, unify fault and performance management, automate change and configuration management to ensure compliance, and automate IT processes. This integrated approach is called Automated Network Management (ANM).
Tags : 
network management, network, infrastructure, network architecture, network performance, network performance management, network security
    
HP - Enterprise

How Life Science Organizations Can Reduce Costs with Cloud-Based Training

Published By: UL EduNeering     Published Date: Jul 05, 2012
Cost reduction is a key criteria that executives often use when choosing initiatives to focus on. They are the ones that have the greatest potential to impact an organization's bottom line. Across life science organizations, a critical area for cost containment is training management.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
    
UL EduNeering

ComplianceWire® 2011 Benchmarking Survey to Over 200 Life Science Organizations

Published By: UL EduNeering     Published Date: Jul 05, 2012
This paper summarizes the results of a quantitative benchmarking survey to over 200 Life Science organizations. The study identifies the key compliance and performance improvement training topics they had addressed in 2011 along with key issues for 2012.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
    
UL EduNeering

Making SOP Training More Effective

Published By: UL EduNeering     Published Date: Jul 05, 2012
SOPs are critical to efficient manufacturing operations, quality control, and regulatory compliance. This paper reviews best practices for the Life Science industry for training on SOPs, and how learning management technology has the potential to improve learner retention through automated assessments.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
    
UL EduNeering

Mitigating Compliance Risk from Third Party Intermediaries

Published By: UL EduNeering     Published Date: Jul 05, 2012
Third party intermediaries have played starring roles in some of the most highly publicized global corruption trials. By any measure, third party intermediaries routinely rank high on the list of compliance worries for brand companies.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
    
UL EduNeering

Four Reasons Your FDA Compliance Training Is Not Preventing Violations

Published By: UL EduNeering     Published Date: Jul 05, 2012
Good Manufacturing Practices (GMP) violations have become the new healthcare fraud as the Department of Justice (DOJ) tests out new legal theories under the False Claims Act (FCA). The Food and Drug Administration (FDA) has dusted off its regulatory authority to prosecute GMP violations.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
    
UL EduNeering

Top 5 HR Compliance Concerns for Small Business

Published By: TriNet     Published Date: Jul 28, 2015
Top 5 HR Compliance Concerns for Small Business
Tags : 
hr compliance, small business, infrastructure, administration results, hr functions, workplace litigation, benefit regulations, hr policies
    
TriNet

PEO: Taking Outsourcing a Step Beyond Pays Off for Small and Mid-Sized Companies

Published By: TriNet     Published Date: Jul 28, 2015
This paper acts as a well-qualified resource for those desiring quantitative data to support the validity of how outsourcing key HR functions can produce positive business results.
Tags : 
hr outsource, peo, data analysis, hr functions, in-house hr processes, co-employment models, compliance risk, healthcare reform regulation
    
TriNet

Options for Handling Your HR Functions

Published By: TriNet     Published Date: Jul 28, 2015
Options for handling HR functions
Tags : 
hr in-house, multi-vendor, hr outsourcing, hr functions, regulations, compliance, co-employment, peo
    
TriNet

Six Steps for Scaling a Startup

Published By: TriNet     Published Date: Jul 28, 2015
6 considerations from a serial entrepreneur and investor.
Tags : 
startup management, infrastructure, employee performance management, hr infrastructure, compliance, hr functions, safe harbors, tax benefits
    
TriNet

Free White Paper: Six Ways to Dial in Your Talent Strategy

Published By: Success Factors     Published Date: Aug 10, 2012
The difference between a compliance-driven HR organization and a business-integrated one? An effective talent program. This complimentary white paper shows the six areas to focus on when making a business case for talent. Download it today.
Tags : 
successfactors, sap, best practices, strategic talent initiatives, talent strategy, talent management, effective talent program, hr organization
    
Success Factors

Big Data, Security & Operational Intelligence: Survey Results on the Existing Processes & Challenges

Published By: LogLogic     Published Date: Mar 15, 2012
"Big Data" is the latest buzzword, yet over 70% of companies don't know what Big Data means and how to solve the data management challenges, finds LogLogic survey.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage
    
LogLogic

IANS Return on Investment Analysis Report on Log Data management and Compliance

Published By: LogLogic     Published Date: Mar 15, 2012
IANS CUSTOM RESEARCH AND INFORMATION SECURITY INVESTMENT ANALYSIS (ISIA) REPORT on Log data management and compliance products
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage
    
LogLogic

IT Data Management: Gleaning deep insights with a digital crystal ball

Published By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage
    
LogLogic

Gartner 2012 Magic Quadrant for Enterprise Information Archiving Solutions

Published By: Symantec     Published Date: Dec 19, 2012
We recommend this analyst report for anyone considering an investment in an archive solution.
Tags : 
information archiving, enterprise, magic quadrant, e-discovery, compliance, storage
    
Symantec

Performance-Driven Learning: 3 Methods to Develop Employee Skills

Published By: SumTotal Systems     Published Date: Oct 10, 2013
E-learning is already known to be the most efficient and cost effective way to deliver training to a workforce. However, the best way to truly prepare employees for meeting organisational objectives is to focus the training on three major areas of skill development. Using a learning solution that is capable of delivering optimal training on each type of skill and checking for comprehension by examining the outcomes from other HR processes will drive performance within the company as employees develop their soft, functional and compliancebased skills.
Tags : 
e-learning, sumtotal, training, development, employee training, employee development, workforce, workforce management
    
SumTotal Systems

CEB Risk Intelligence Quarterly: Q4 2013

Published By: CEB     Published Date: Nov 08, 2013
How is your company managing risk? Download the whitepaper to learn how cross-functional groups can work together to uncover broader enterprise-wide risks that might go unforeseen.
Tags : 
risk, compliance, audit, risk management, cyber security, fraud
    
CEB

5 Steps to Managing Third Party Corruption Risk

Published By: CEB     Published Date: Dec 09, 2013
This guide is designed to break down the complex challenge of mitigating third-party corruption risk into manageable components. Based on hundreds of member conversations and extensive research, we believe that successful companies conduct third party due diligence in five key phases.
Tags : 
corruption risk, managing risk, compliance, risk, anticorruption, third-party corruption
    
CEB

Top 7 Benefits of an Enterprise-Class Hybrid Cloud for Government

Published By: VMware, Inc     Published Date: Oct 30, 2014
VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud service that delivers the tried and tested VMware capabilities widely used by government organizations today, with the added security and compliance assurance of FedRAMP authorization. The hybrid cloud is becoming more and more prevalent – in fact, nearly three-fourths of large enterprises expect to have hybrid deployments by 2015.
Tags : 
enterprise-class hybrid, government organizations, cloud service, networking, it management, data center
    
VMware, Inc

Internet Performance Management is Key to Maximizing Enterprise Online Performance

Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm, cloud computing
    
Dyn
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.