manage compliance

Results 426 - 450 of 636Sort Results By: Published Date | Title | Company Name

How to simplify your company’s travel expenses

Published By: Lola Travel Company     Published Date: Jan 24, 2019
As a finance manager, there are a lot of hurdles you encounter that make managing business travel more difficult than it needs to be: chasing receipts, keeping track of multiple employees traveling, making sure everyone’s on the same page with spend, etc. Thankfully, Lola.com has an answer. Check out our latest guide,”How to Simplify Your Company’s Travel Expenses” and learn: -The vital importance of eliminating paper receipts -How simple guidelines improve employee compliance -Why a digital platform helps you easily monitor and control budget
Tags : 
    
Lola Travel Company

Enforcing IT Change Management Policy

Published By: Tripwire     Published Date: Jul 05, 2007
Discover how high-performing IT organizations are able to create a culture that supports and uses change management to their advantage, facilitating enterprise business goals.
Tags : 
cmdb, configuration management, auditing, risk management, audit, risk audit, risk control, configuration control
    
Tripwire

Keeping Up Your SOX Compliance and Turning IT into a High Performer by Improving Change Control

Published By: Tripwire     Published Date: Aug 21, 2009
This paper covers the implementation, disclosure and ongoing evaluation of internal controls for SOX compliance with a focus on the role of IT, as well as the penalties for non-compliance.
Tags : 
sarbane oxly act, sarbanes oxley, sox, sarbox, sarbanes-oxley, financial, it management, audit
    
Tripwire

FISMA Prescriptive Guide

Published By: Tripwire     Published Date: Mar 31, 2008
Discover how to achieve and maintain FISMA compliance to ensure security of systems and data.
Tags : 
fisma, government, federal regulations, federal regulation, fisma compliant, citizen, constituent, constituency
    
Tripwire

Configuration Audit and Control: 10 Critical Factors for CCM Success

Published By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : 
change management models, auditing, configuration management, security, change management, network security, efficiency, productivity
    
Tripwire

Configuration and Change Management for IT Compliance and Risk Management

Published By: Tripwire     Published Date: Jan 30, 2008
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.
Tags : 
cmdb, change management, configuration management, risk management, compliance, idg, tripwire, lifecycle management
    
Tripwire

The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
    
Tripwire

Information Security & Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy

Published By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : 
tripwire, information security, audit fatigue, compliance, security risk, auditing, risk management, information management
    
Tripwire

Pulling the Plug on Legacy Log Management

Published By: Tripwire     Published Date: Apr 21, 2010
This paper includes key research findings, from a recent IDG survey, and strategies to overcome this legacy challenge.
Tags : 
tripwire, legacy log management, data security, compliance automation solutions, it security, cso, compliance, internet security
    
Tripwire

Improve healthcare and life sciences with a Smarter Process approach

Published By: IBM     Published Date: Nov 12, 2013
A Smarter Process vision for healthcare. We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have set a high bar - in the way they engage customers throughout the entire sales process -not just during the commercial transaction, but before, during and after the transaction. Can healthcare and life sciences meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan
    
IBM

Improve healthcare and life sciences with a Smarter Process approach

Published By: IBM     Published Date: Mar 04, 2014
A Smarter Process vision for healthcare. We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have set a high bar - in the way they engage customers throughout the entire sales process -not just during the commercial transaction, but before, during and after the transaction. Can healthcare and life sciences meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan
    
IBM

Selecting the right cybercrime-prevention solution

Published By: IBM     Published Date: Nov 04, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
threat prevention, cybercrime, it security, malware protection
    
IBM

Size Doesn't Matter, Prices Do

Published By: IBM     Published Date: Oct 10, 2016
Read this IBM white paper to learn why all retailers, no matter their size, need the ability to efficiently manage and execute accurate prices, improve their responsiveness to competitor pricing, and ensure compliance with their strategic pricing policies and goals.
Tags : 
ibm, commerce, omni-channel, merchandising, retail, retailers, knowledge management, enterprise applications
    
IBM

Size Doesn't Matter, Prices Do

Published By: IBM     Published Date: Nov 17, 2016
Read this IBM white paper to learn why all retailers, no matter their size, need the ability to efficiently manage and execute accurate prices, improve their responsiveness to competitor pricing, and ensure compliance with their strategic pricing policies and goals.
Tags : 
ibm, commerce, analytics, retail, merchandising, pricing, intelligent pricing, enterprise applications
    
IBM

E-Learning Best Practices

Published By: SyberWorks     Published Date: Oct 21, 2008
The e-Learning industry has grown tremendously since the early days of computers and the Internet. Today there are lots of products and services out in the market place from which to choose. This white paper will provide some basic information to help you as you begin your research into e-Learning and learning management systems. The document is not meant to be the complete source of information on e-Learning nor will these guidelines be suitable for every single situation. This white paper has been created as a learning aid help you get started. These findings represent the research, experience, and techniques gleaned from working in e-Learning since its infancy in the late 80’s to today. At the end of the paper, Bob Goldschneider, Director of Business Development at SyberWorks, Inc., will provide a summary and closing remarks.
Tags : 
syberworks, e-learning, internet, aicc, scorm, learning management systems, learning management system, e-learning
    
SyberWorks

E-Learning Benefits and ROI Comparison of E-Learning vs. Traditional Training

Published By: SyberWorks     Published Date: Oct 21, 2008
In most cases, the biggest quandary an organization must solve is to put together a rational, i.e., a cost justified, business case why they should spend capital to invest in a learning management system. The focus of this white paper will outline the benefits of web-based training along with a practical framework for developing ROI when looking at the cost of traditional training methods verses e-Learning.
Tags : 
syberworks, e-learning, roi, global workforce, just-in-time learning, learning management systems, learning management system, e-learning
    
SyberWorks

Online Training Case Study

Published By: SyberWorks     Published Date: Oct 21, 2008
This blind case study focuses on the operations division of a Fortune 500 company had significant challenges training its franchisees. They struggled with an 8 to 12 month backlog in providing training for their new franchisees coming on board. Anecdotally, when they did get around to training new people, the requirements and curriculum were outdated and in the process of being revised. Their franchisees and employees were never current on updated company policies and procedures. These franchises were spread all over the country, so it was costly to train their franchisees using traditional onsite training methods.
Tags : 
syberworks, learning management system, roi, learning management systems, learning management system, e-learning, elearning, web based training
    
SyberWorks

Beaumont Hospitals, Inc. Case Study

Published By: SyberWorks     Published Date: Oct 21, 2008
Jean Ann Larson, Chief Learning Officer (CLO), and Tawanna Foggs, Educational Systems Coordinator, of William Beaumont Hospitals, talk about their use of the SyberWorks Learning Management System to train and certify hospital employees.
Tags : 
syberworks, learning management system, learning management systems, learning management system, e-learning, elearning, web based training, training management systems
    
SyberWorks

Fairchild Semiconductor, Inc. Case Study

Published By: SyberWorks     Published Date: Oct 21, 2008
Claudia Innes, Corporate Marketing Director for Fairchild Semiconductor, Inc. discusses their use of the SyberWorks Hosted e-Learning Solution to create a marketing-information portal to provide marketing and performance support for their sales staff, sales engineers, partners, and distributors in the power-supply segment.
Tags : 
syberworks, e-learning, elearning, performance support, learning management systems, learning management system, e-learning, web based training
    
SyberWorks

Service Master Clean, Inc. Case Study

Published By: SyberWorks     Published Date: Oct 21, 2008
Kevin Lange, Director of Field Training at Service Master Clean, Inc., talks about his company's training program and the organizational drivers that led them to consider an e-learning program and to choose the SyberWorks Training Center Learning Management System to manage their training.
Tags : 
syberworks, e-learning, elearning, training program, drivers, learning management systems, learning management system, e-learning
    
SyberWorks

Email Compliance & Best Practices for Healthcare

Published By: Net Atlantic     Published Date: Dec 08, 2009
How to Keep Compliant, Avoid Mistakes, and Manage a Healthy Member List. Net Atlantic's whitepaper, "Email Compliance & Best Practices for Healthcare" helps healthcare providers and healthcare product and service vendors understand email communications compliance issues. It illustrates how CAN-SPAM forms the foundation of compliance, and also explains why healthcare organizations have to go beyond CAN-SPAM to sustain a truly effective email communications strategy. Healthcare users of email for communications should know how to use these best practices before building their email campaigns.
Tags : 
net atlantic, email compliance, spam, can-spam, healthcare, members, hmtl messages, email marketing
    
Net Atlantic

Mobile Device Management for Financial Services

Published By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
IBM MaaS360

Mobile Device Management for Financial Services

Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
ibm, mobile, financial services, device management, android, iphone, regulatory compliance, networking
    
IBM MaaS360

The Benefits of an Integrated Approach to Security in the Cloud

Published By: IBM     Published Date: Feb 11, 2015
As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data analytics and mobility. In this paper, we will look at how the growing adoption of cloud computing is changing the way organizations are implementing security.
Tags : 
security strategies, ibm, deployment model, cloud security, data analytics, security, business analytics, data protection
    
IBM

IAM Buyers Guide: Select the Right Solution for Identity and Access Assurance

Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance, networking, security, it management, knowledge management
    
IBM
Start   Previous    16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.