regulator

Results 326 - 350 of 495Sort Results By: Published Date | Title | Company Name

Unified Planning and Consolidation: A Wise Investment for Mid-sized Companies

Published By: SAP     Published Date: Apr 13, 2011
In today's heightened competitive and regulatory environment, an organization's fortunes can rise or fall based on the effectiveness of its financial systems, particularly those that drive its performance management. Organizations today are looking to optimize these systems, at the core of which are financial consolidation and planning.
Tags : 
unified planning, bpm partners, performance management application, procurement, deployment, data quality, risk and compliance, lob, financial application, business process automation, business process management, financial management
    
SAP

Close the Window on Three Window Server Threat Scenarios

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation

How is regulatory stress-testing shaping the future for banks?

Published By: IBM     Published Date: Aug 22, 2014
Learn how an integrated modeling approach to regulatory stress-testing can help banks improve their overall risk management.
Tags : 
stress-testing, risk analytics, risk management, intergrated modeling approach
    
IBM

Successful healthcare analytics begin with the right data blueprint

Published By: IBM     Published Date: Mar 30, 2016
This white paper discusses how enterprise analytics systems can assist provider organizations in building sustainable healthcare systems and achieving their vision for accountable care—from near-term demands for regulatory and quality reporting to transforming care delivery.
Tags : 
ibm, healthcare analytics, healthcare, big data, enterprise analytics systems
    
IBM

LinuxONE: A Secure, Scalable Data-Serving Infrastructure Accelerates Digital Transformation

Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
Group M_IBM Q418

TDWI Best Practices: Accelerating the Path to Value with Business Intelligence and Analytics (custom

Published By: SAS     Published Date: Mar 06, 2018
With decisions riding on the timeliness and quality of analytics, business stakeholders are less patient with delays in the development of new applications that provide reports, analysis, and access to diverse data itself. Executives, managers, and frontline personnel fear that decisions based on old and incomplete data or formulated using slow, outmoded, and limited reporting functionality will be bad decisions. A deficient information supply chain hinders quick responses to shifting situations and increases exposure to financial and regulatory risk—putting a business at a competitive disadvantage. Stakeholders are demanding better access to data, faster development of business intelligence (BI) and analytics applications, and agile solutions in sync with requirements.
Tags : 
    
SAS

Data management in action: solving real world challenges

Published By: SAS     Published Date: Mar 06, 2018
As your organization struggles with growing volumes and sources of data, increasingly complex regulatory requirements, and pressure to do more with fewer resources, SAS Data Management can help. How? Our solution helps you make sense of your data so you can make better decisions. Then you can take the right actions to improve customer experience, boost revenue, become more efficient and remain compliant
Tags : 
    
SAS

Developing Scenario Segmentation and Anomaly Detection Models

Published By: SAS     Published Date: Mar 06, 2018
Enhanced regulatory pressure requires continuous evaluation of your bank’s risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to: • Improve monitoring programs. • Reduce false-positive alerts. • Increase monitoring coverage. • Reduce the rapidly escalating financial cost of maintaining AML programs.
Tags : 
    
SAS

Save Your IT Budget with an Efficient Exchange Recovery Plan

Published By: Quest Software, Inc.     Published Date: Nov 18, 2010
This white paper describes how real organizations have handled these challenges and how a strong and reliable messaging solution like Quest Recovery Manager for Exchange could have mitigated risk, reduced cost, and improved regulatory compliance.
Tags : 
quest software, messaging, microsoft exchange server, quest recovery manager, business communication, migration, consolidation, backup and recovery, disaster recovery, microsoft exchange, windows server
    
Quest Software, Inc.

The Big Shift to Cloud-based Security

Published By: Qualys     Published Date: Jan 08, 2015
Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs. This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.
Tags : 
cloud solutions, security, secure data centers, it risks, compliance
    
Qualys

Considerations for Owning vs. Outsourcing Data Center Physical Infrastructure

Published By: Schneider Electric     Published Date: Jun 04, 2014
When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash cross-over point, deployment timeframe, data center life expectancy, regulatory requirements, and other strategic factors. This paper discusses how to assess these key factors to help make a sound decision.
Tags : 
schneider, electric, data, infrastructure, upgrade, retail, outsource, own, data management, business technology, data center
    
Schneider Electric

Effective Content Analysis for Email Inspection & Control

Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, nemx, data management, microsoft exchange, contact management
    
Nemx Software Corporation

Reducing the Burden of Administration for Email Content Control, Compliance & Policy Enforcement

Published By: Nemx Software Corporation     Published Date: Oct 23, 2007
Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.
Tags : 
email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance, nemx, policy based management, security policies, microsoft exchange
    
Nemx Software Corporation

A Guide to Understanding Messaging Archiving

Published By: Sunbelt Software     Published Date: Mar 13, 2008
Messaging archiving can help organizations solve all of these problems and can satisfy a wide range of legal compliance, regulatory, storage management, knowledge management and other problems. This Osterman Research white paper discusses the several reasons to implement a messaging archiving system and provide an overview of Sunbelt Software’s offering focused squarely on the archiving space.
Tags : 
email archiving, pst, archive, archiving, compliance, records storage, sunbelt, knowledge management, storage management, records management, sarbanes oxley compliance
    
Sunbelt Software

Minimizing the Burden of PCI Compliance: A New Approach to Credit Card Encryption

Published By: Paymetric     Published Date: Dec 13, 2007
This paper describes a new approach to managing encrypted data that significantly strengthens an organization's security posture, while minimizing the cost and effort of PCI compliance. Read this white paper and find out more about how to comply with PCI compliance requirements.
Tags : 
erp, pci, pci compliance, erp, pci, ompliance, sap, sap, encryption, credit cards, tokens, tokenization, token, credit card, payment card, payment cards, regulation, regulatory, paymetric, paymetrics
    
Paymetric

Eight Elements of Effective Information Security Policies

Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, knowledge management, identity management, hipaa compliance, information management
    
Information Shield

The Business Need for Updated Information Security Policies

Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, it management, security management, hipaa compliance, sarbanes oxley compliance
    
Information Shield

Banking on Analytics: How High-Performance Analytics Tackle Big Data Challenges in Banking

Published By: SAS     Published Date: Mar 20, 2012
The banking sector routinely manages massive amounts of data, ranging from financial transactions to customer, operational and regulatory data. All this data means big challenges - but also big opportunities - for the industry. Find out more now!
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS

Making Progress In Risk Management

Published By: IBM     Published Date: Jun 25, 2013
The global credit crunch that began in 2007 threw the financial industry into turmoil and highlighted the need for financial firms to improve their risk management practices. Today, the credit crisis is far from over. Markets remain volatile, and financial firms face waves of regulatory requirements intended to safeguard the solvency of individual firms and the stability of economies worldwide. These reforms will dramatically affect firms — burdening the profitability and growth of some, and the very survival of others.
Tags : 
risk management, financial industry, profitability, smarter risk management practices, database development, project management, desktop management
    
IBM

Cognos Disclosure Management for the 'Last Mile of Finance'

Published By: IBM     Published Date: Oct 24, 2013
Learn how automating 'Last Mile of Finance' processes can help CFOs and their finance teams meet expanded reporting requirements--including XBRL tagging.
Tags : 
ibm, cognos disclosure management, business intelligence, data collection, last mile of finance, account reconciliation, internal management, financial reporting, financial controls, financial workflow, regulatory reporting, applications, extensible business reporting language, application integration, risk management
    
IBM

Analyst Insight - Disclosure Management and Analytics by Aberdeen Group

Published By: IBM     Published Date: Oct 24, 2013
This analyst research paper contains findings from Aberdeen Group on the financial reporting pressures, challenges faced by organizations particularly with regulatory mandates
Tags : 
ibm, aberdeen group, financial reporting pressures, financial challenges, analyst insight, disclosure management, organizational transparency, organizational collaboration, deman for data, utilize the data, business intelligence, real-time data initiatives, real-time financial reporting, knowledge management
    
IBM

Close, Consolidate and Report For Dummies

Published By: IBM     Published Date: Feb 12, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, closing, consolidation, reporting, ccr, close management, financial results, disclosure management, integration, ccr solution, business analytics, data integrity, return on investment, risk management
    
IBM

Building Efficiency into IT Compliance Programs

Published By: Micro Focus     Published Date: Aug 28, 2014
Enabling technologies to streamline regulatory and legislative changes.
Tags : 
it compliance programs, risk management, it management, data management, compliance
    
Micro Focus

Gartner Critical Capabilities for Security Information and Event Management (SIEM)

Published By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : 
siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
    
Intel Security
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.