compliance

Results 1851 - 1875 of 2046Sort Results By: Published Date | Title | Company Name

Banking on Digitally Enabled Risk

Published By: TIBCO Software     Published Date: Nov 07, 2019
Is your risk infrastructure showing signs of strain in the face of FRTB, Basel III, and BCBS 239? Imagine a risk function where discrepancies among business, risk, and finance views are eliminated, setting the stage for advanced technologies, robotic process automation, and machine learning. Take a step beyond first generation data governance towards unified data and analytics across the enterprise. In this whitepaper, we explore how technology can help financial institutions not just automate compliance, but demonstrate organizational commitment to the change management process and adherence to the principles of regulations and law. Get insights into: How you can master regulatory change as part of transforming the risk function, elevating knowledge and data resources through governance, MDM, data science, and analytics An overview of the key market challenges for delivering a unified data management and governance model Real-world case studies from G-SIBs focused on data governanc
Tags : 
    
TIBCO Software

Manufacturing Intelligence: Keep Your Processes Under Control

Published By: TIBCO Software     Published Date: Feb 01, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and no need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
data, product, manufacturers, manufacturing, processes, technologies, analysis, quality
    
TIBCO Software

Ten Innovative Financial Services Applications Powered by Data Virtualization

Published By: TIBCO Software     Published Date: Feb 26, 2019
Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. In the mid-2000s, Financial Services was the first industry to strongly adopt data virtualization as a disruptive, new technology for accessing and integrating more data, faster and more easily than ever before. Buy and sell side groups at the largest institutions led the charge, followed soon after by risk management and compliance units. The leading mutual fund providers, along with hedge funds, led the next wave of adoption. In recent years, commercial banks and insurers have accelerated their use of data virtualization. And today, analyst firms such as Gartner, Inc. and Forrester project continued data virtualization adoption for both first-time use at new firms and expanded deployments at existing sites. This whitepaper provides 10 examples of TIBCO Data Virtualization enabled applications f
Tags : 
    
TIBCO Software

Convergex Trades Up for Better Exchange Monitoring, Compliance Surveillance, and Development

Published By: TIBCO Software     Published Date: Feb 28, 2019
“Convergex takes a great deal of pride in making its clients’ interests and service needs of top priority,” says CIO Ann Neidenbach. “We like to tackle the industry’s toughest challenges—from complex trades to complex business solutions. Since regulation changes in 2008, there’s been a proliferation of places to trade. In the US alone, there are over 50 light pool (LIT) and dark markets. This makes it incredibly expensive, complicated, and very difficult for our customers to find best execution. They’re seeking liquidity and trying to figure out the best place to fill their orders. We’re trying to simplify that for them. “Convergex historically had consisted of several different affiliated companies, which meant that we had silos of trading systems, technology solutions and data. As a result, it was difficult to understand the revenue and profitability for each client across our businesses.” “My number one objective is to help us improve operational efficiencies, and I’m doing that in
Tags : 
    
TIBCO Software

Three Ways to Drive Cost Reductions in False Positive Investigations

Published By: TIBCO Software     Published Date: May 20, 2019
The biggest headache for most payment operations teams is cost control — and a large part of it comes from fraud management: Investigation teams waste large amounts of time just assembling the data needed to make decisions. Detection engines are always playing catchup with the latest fraud patterns. Ever changing regulations increase the time and cost required to reach compliance and meet audit standards. Given their scope and impact, replacing core fraud systems is not an option for most firms. But instead of replacing them, you can improve the investigative process with augmented investigation, and improve the detection process by enhancing current systems. This whitepaper describes three ways financial services firms can use TIBCO solutions to lower the cost of investigations through faster results, reduce fraud losses through better detection, and simplify audit and regulatory compliance through centralized access to information.
Tags : 
compliance, audit, fraud, data, detection, transactions, investigation, cost
    
TIBCO Software

Manufacturing Intelligence: Keep Your Processes Under Control

Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and no need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
    
TIBCO Software GmbH

Rogue IT: Compliance of IT in the Capital Markets

Published By: Tideway Systems     Published Date: Dec 11, 2007
A world class IT organization needs to be better than even the regulators require – and good IT governance doesn't have to tie the IT department up in red tape. Judicious application of IT best practices, frameworks and methodologies can help achieve this, based on an accurate picture of the IT environment, at which point regulatory compliance becomes a happy side effect. Find out how you can have an up-to-date true view of your infrastructure on a daily basis – not just at a point in time by reading this white paper.
Tags : 
compliance, regulation, regulations, regulator, regulators, governance, compliant, infrastructure
    
Tideway Systems

E-book: Defending the BYOD Healthcare Landscape: Strategies for Safeguarding Patient Data

Published By: TigerText     Published Date: Aug 30, 2015
Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.
Tags : 
tigertext, tiger text, byod, hippa compliance, patient data, secure data, records management, hacker detection
    
TigerText

Midmarket ERP Solutions Comparison Guide

Published By: Tippit ERP     Published Date: May 18, 2009
Download this side-by-side comparison guide that breaks down the industry's top 11 ERP players (including Epicor, Infor, Microsoft, and NetSuite) so you can quickly and easily compare the features and costs of each. Learn more today!
Tags : 
erp, midmarket, inside erp, epicor, infor, microsoft, netsuite, lawson
    
Tippit ERP

To Outsource or Keep Email Marketing In house?

Published By: Topica     Published Date: May 12, 2011
This whitepaper will look into the areas of cost, time and reliability to prove in a simple manner that the benefits of outsourcing a company's email marketing outweigh those of starting an in-house solution.
Tags : 
topica, email marketing, email marketing help, email marketing for businesses, choosing an esp, cost analysis for esp, can-spam compliance, in-house marketing solution
    
Topica

Intrusion Prevention System Solutions Enable Sarbanes Oxley Compliance

Published By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : 
sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime
    
TopLayer

Mitigating IT Security Risks with Penetration Tests

Published By: TraceSecurity     Published Date: Sep 15, 2010
This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.
Tags : 
penetration, test, pen, tracesecurity, risk, assessment, social, engineering
    
TraceSecurity

Deep Security - Enterprise Virtualization Security

Published By: Trend Micro Inc.     Published Date: Aug 23, 2011
Learn how you can maintain compliance in your virtual environments in a video.
Tags : 
trend micro, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business
    
Trend Micro Inc.

InterScan Messaging Hosted Security

Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth
    
Trend Micro SaaS

Protecting Sensitive Information in an Increasingly Leaky World

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.

Addressing Compliance Requirements for Privacy, Data Retention, and e-Discovery

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
    
Trend Micro, Inc.

Meet PCI Compliance using Security Information and Event Management (SIEM)

Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss), networking, security, network security, compliance, security management
    
TriGeo Network Security

Proactive Network Defense - The Case for Security Information and Event Management (SIEM)

Published By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : 
trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance
    
TriGeo Network Security

An Executive's Guide to Cutting HR Costs

Published By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneur's will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance
    
TriNet

Top 5 HR Compliance Concerns for Small Business

Published By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : 
trinet, compliance, smb, small business, human resources, infrastructure, retirement, health
    
TriNet

An Executive's Guide to Cutting HR Costs

Published By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneur's will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance
    
TriNet

Top 5 HR Compliance Concerns for Small Business

Published By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : 
trinet, compliance, smb, small business, human resources, infrastructure, retirement, health
    
TriNet

Entrepreneurship Is Risky Business - How to Avoid 10 Pitfalls

Published By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet

Learn About Key HR Areas That All Entrepreneurs Will Eventually Face

Published By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneurs will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance
    
TriNet

Top 5 HR Compliance Concerns for Small Business

Published By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : 
trinet, compliance, smb, small business, human resources, infrastructure, retirement, health
    
TriNet
Start   Previous    68 69 70 71 72 73 74 75 76 77 78 79 80 81 82    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.