it standard

Results 26 - 50 of 705Sort Results By: Published Date | Title | Company Name

5 WAYS YOUR VENDOR RISK MANAGEMENT PROGRAM LEAVES YOU IN THE DARK

Published By: BitSight Technologies     Published Date: Jul 23, 2015
Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.
Tags : 
vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards
    
BitSight Technologies

5S As An Integral Part of Six Sigma

Published By: Villanova     Published Date: Aug 21, 2009
Based on the Japanese words Seiri, Seiton, Seiso, Seiketsu and Shitsuke, the 5S philosophy focuses on effective workplace organization and standardized work procedures. 5S simplifies your work environment, reduces waste and non-value activity while improving quality efficiency and safety. Once fully implemented, the 5S process can increase morale, create positive impressions on customers, and increase efficiency and organization.
Tags : 
lean methods, productivity, efficiency, workforce management, customer service, six sigma, 6 sigma, project management
    
Villanova

5 conseils essentiels concernant OAuth pour le contrôle d’accès aux API

Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
OAuth permet à l’utilisateur de déléguer ses droits d’accès à une API, permettant ainsi à un service d’être intégré à un autre pour le compte de cet utilisateur. Ce sont les mêmes fournisseurs du Web social qui ont popularisé le schéma d’exposition d’une API afin de permettre à des développeurs tiers d’enrichir leurs plates-formes qui ont été les premiers à avoir appliqué ces mécanismes de délégation des autorisations. Créé en 2006, le protocole OAuth a permis de standardiser les mécanismes de ce type.
Tags : 
    
CA Technologies EMEA

6 Steps to Overcoming PCI DSS Compliance Challenges in Mult-Cloud and Hybrid Environments

Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic

7 Essential Benefits of Hybrid Cloud Backup

Published By: Datto Inc.     Published Date: Jan 31, 2013
Business continuity, data insurance, local storage flexibility, cost benefits, standards compliance and infrastructure control. This is just some of what Datto and hybrid cloud backup can do for you, and your clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
Datto Inc.

7 Helpful Tips to Get Your Business in Shape

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Ever feel like it takes too long to do something that should be simple? Or feel like your work processes just have way too many steps? Don’t worry – help is here. Discover how you can improve your efficiency at work when you: Develop standard operating procedures to ensure accuracy, timeliness and customer satisfaction. Make collaboration easy and empowering. Streamline customer communications with clear schedules and touch points.
Tags : 
business efficiency, collaboration, customer communication, customer satisfaction
    
Citrix ShareFile

9 Reasons to Retire Your "Homegrown" ERP Software Solution Before It's Too Late

Published By: Epicor     Published Date: Aug 02, 2012
Risk-averse distributors may feel that the safest and simplest IT strategy is to stay with their existing "homegrown" enterprise resource planning (ERP) solution. But just as sticking your money under the mattress offers no protection against inflation, maintaining an outdated system can rob you of a distinct competitive advantage. Modern ERP systems offer so much more in terms of data access, technology advances, and standard operating procedures. And obtaining a solution from a leading ERP provider ensures that industry best practices and the experiences of other distributors and end users have been built in. Check out this new paper and learn more about the advantages of an integrated ERP over your homegrown system.
Tags : 
white paper, homegrown, erp software, erp software solution, data management, data quality, data duplication, data knowledge
    
Epicor

A buyer's Guide to AP Invoice Automation Solutions

Published By: Medius     Published Date: Oct 01, 2019
AP automation is often described as low hanging fruit in the garden of digital transformation. And for a good reason – the barrier to entry is impressively low in terms of both cost and effort needed to get up and running, particularly in comparison to the implementation projects for other business applications. Despite that fact, the value provided from AP automation is comparably high. For such an easy implementation, the benefits reach throughout an organization, beyond the walls of the AP department, and are near-immediate from day one of using the solution. Standard benefits include: - Immediate value from day one with an expected ROI within the first year - Up to 95% truly touchless invoice processing with access to real-time cloud data for benchmarking and reporting - Easy access to financial data, such as cash flow & accrual reporting, with full visibility and control of the AP process This guide will help you kick-start your AP automation project by defining the 6 steps to build a solid business case and gain the internal approvals needed to get started.
Tags : 
ap automation, invoice processing, invoice automation, accounts payable automation, accounting software, accounting automation, microsoft dynamics automation
    
Medius

A CFO’s Guide to the New Revenue Recognition Standard

Published By: Workday     Published Date: Mar 02, 2018
The new revenue recognition standard is going to shake things up in your business beyond just accounting. This new eBook from CFO, an Argyle company and sponsored by Workday—an early adopter—offers insight into preparing and planning for the new standard, along with strategies for meeting the new demands.
Tags : 
revenue, accounting, cfo
    
Workday

A CISO's Guide to Securing Open Source Software

Published By: HP - Enterprise     Published Date: Nov 19, 2008
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise

A Guide to Achieving SaaS Security and Compliance

Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint

A Guide to Relentless Automation

Published By: Ahead     Published Date: Jun 05, 2019
Digital transformation will fail without a commitment to automation - what AHEAD refers to as Relentless Automation. With the advent of public cloud and all of its promise, along with the ripple effect from the DevOps mantra of “automate everywhere”, technology teams must spin up new infrastructure, maintain configurations, and set up and tear down environments much faster than ever before. Of course, no one should automate for the sake of automating, or to simply be ahead of the curve. But while not every activity warrants automation - whether due to the complexity and nuance of the task, or its infrequent occurrence - Relentless Automation means identifying those tasks and processes where the benefits of automation outweigh both its upfront and recurring costs. Thankfully, the business benefits of standardizing and automating IT work are easy to spot: > Freeing up staff for higher value work > Reduction in errors and process variability > More auditability and accountability, helping
Tags : 
    
Ahead

A Practical Guide to SOA for IT Architects

Published By: Systinet     Published Date: Aug 21, 2009
As a strategy for creating a flexible and agile IT, service-oriented architecture (SOA) has gained considerable momentum in recent years, largely due to the advent of standards-based Web services.
Tags : 
web services security, web services, web service security, information management, business analytics, business metrics, system management software, programming application
    
Systinet

A Primer on Cloud-Native App Development

Published By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : 
rackspace, cloud, application, software development, security
    
Rackspace

A Proper Foundation: Extended Validation SSL

Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard

A Proper Foundation: Extended Validation SSL

Published By: Entrust Datacard     Published Date: Jul 21, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates.
Tags : 
foundation, extended validation, ssl, trust, ecommerce, cas, security, legitimate
    
Entrust Datacard

A remedy for IT complexity and sprawl: Standardization

Published By: Red Hat     Published Date: Dec 23, 2014
What if you could rapidly grow your business while eliminating the complexity and multiple operating systems, administration and management tools, and security and compliance requirements? See how many good things happen when you standardize on open, flexible infrastructure solutions.
Tags : 
standardization, it complexity, multiple operating systems, management tools, compliance requirements, flexible infrastructure, it management
    
Red Hat

A Short Primer of GDPR Essentials

Published By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
    
Splunk

A Smarter Communications Network for the Smart Grid.

Published By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh
    
Ciena

A Smarter Process Approach to Accelerating Customer Engagements with Mobile and Social

Published By: IBM     Published Date: Oct 19, 2017
Customer engagement has emerged as the most critical competitive factor in the current environment. Fueled by widespread mobile access and constant social connectedness, customers are demanding that every interaction, across every channel, be simple, streamlined and seamless. High expectations mean high stakes. When options abound and patience is low, customers don’t stick around. Companies need to get it right the first time. This new customer-centric standard and the ability to connect directly with customers is fueling a depth and breadth of enterprise reinvention. Ensuring that every customer experience across every conceivable channel delights and adds value calls for a Smarter Process approach and a new perspective on business process management.
Tags : 
    
IBM

A to Z: Why Office 365

Published By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365

A Wage and Hour Primer for Small Business Owners

Published By: TriNet     Published Date: Nov 08, 2017
Classifying independent contractors vs. employees and exempt vs. non-exempt employees can be tricky. This white paper outlines what small business owners should know and examines general standards under state and federal law for correct classification.
Tags : 
    
TriNet

AA Ireland Transforms Itself and Insures Predictable Success

Published By: TIBCO Software     Published Date: Jul 22, 2019
AA Ireland specializes in home, motor, and travel insurance and provides emergency rescue for people in their homes and on the road, attending to over 140,000 car break downs every year, 80% of which are fixed on-the-spot. “In each of the last five years, the industry lost a quarter billion in motor insurance," says Colm Carey, chief analytics officer. "So, there's a huge push for new data, models, ways to segment and pick profitable customer types—and get a lot more sophisticated. Our goal is to optimize pricing, understand the types of customers we're bringing, and the types we're trying to attract. We would like to tie that across the business. Marketing will run a campaign, trying to attract a lot of customers, but maybe they're not the right type. "We wanted to step away from industry standard software and go with something that was powerful and future-proof. In 2016, we had an opportunity to analyze all software. We chose the TIBCO® System of Insight with TIBCO BusinessWorks™ i
Tags : 
    
TIBCO Software

Aberdeen Group: For Mid-Size Manufacturers the Issue is Visible

Published By: IBM     Published Date: Feb 08, 2008
As manufacturing goes global, initiatives to standardize processes and key performance measurements across the enterprise to unite the greater supply chain are emerging. The main catalyst? Driving down costs in response to customer and market pressures. However, mid-size companies in particular are driving performance improvements with a more proactive, strategic vision for improving performance than reactively responding to cost pressure.
Tags : 
scm, supply chain, manufacturing, manufacturer, bpm, business process, erp, enterprise resource planning
    
IBM

Ability to Build Hyper-Scale Data Centers at Hyper-Speed Helps Eliminate IT Expansion Risk

Published By: CyrusOne     Published Date: Jul 05, 2016
In June 2016, CyrusOne completed the Sterling II data center at its Northern Virginia campus. A custom facility featuring 220,000 square feet of space and 30 MW of power, Sterling II was built from the ground up and completed in only six months, shattering all previous data center construction records. The Sterling II facility represents a new standard in the building of enterpriselevel data centers, and confirms that CyrusOne can use the streamlined engineering elements and methods used to build Sterling II to build customized, quality data centers anywhere in the continental United States, with a similarly rapid time to completion.
Tags : 
cyrusone, data, technology, productivity, engineering, best practices, business analytics, business intelligence
    
CyrusOne
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.