regulator

Results 226 - 250 of 515Sort Results By: Published Date | Title | Company Name

ERP for Green Supply Chain Management In Manufacturing

Published By: IFS     Published Date: Jan 04, 2012
How can ERP with Green SCM tools help manufacturers satisfy green supply chain requirements in order to satisfy customers and regulators? Find out now
Tags : 
superior solutions, clarity, compliance, control, investment, advisor, regulators, technology, application integration, customer interaction service, customer relationship management, customer satisfaction, customer service, performance testing, product lifecycle management, project management, return on investment, manufacturing execution systems
    
IFS

Case Story: Growth, Regulatory/Customer Demands Drive A&D Optics Company to IFS Applications

Published By: IFS     Published Date: Dec 27, 2012
Steady business growth and the demanding nature of the defense industry led exotic electro-optics, Inc. (eeo) to implement IFS Applications.
Tags : 
erp, enterprise resource planning, enterprise, integration, process management, project management, application performance management, best practices, enterprise software
    
IFS

The Value of Enterprise SSO to HIPAA Compliance

Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa, hipaa compliance, regulatory compliance, authentication, imprivata, network security, access control, application security
    
Imprivata

A Quick Guide to EPCS

Published By: Imprivata     Published Date: Nov 17, 2014
This whitepaper will tell you what you need to know when it comes to implementing electronic prescriptions for controlled substances.
Tags : 
imprivata, epcs, electronic prescriptions, controlled substances, solution vendors, practitioners, regulatory compliance, transmitted electronically, dea regulations, migration, monitoring, business integration, business intelligence
    
Imprivata

Understanding the Impact of Comprehensive Data Security

Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA

UMFASSENDE DATENSICHERHEIT Oder All-Flash-Arrays

Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
    
Infinidat EMEA

Verständnis der Auswirkungen umfassender Datensicherheit

Published By: Infinidat EMEA     Published Date: Oct 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken.
Tags : 
    
Infinidat EMEA

BALANCING EFFICIENCY AND ACCURACY

Published By: Infor     Published Date: Mar 07, 2017
Financial reporting teams, often led by Controllers, face mounting pressure to provide accurate, useful, and timely data, while also decreasing turnaround time and costs. Regulatory agencies don’t care if an organization is short of staff or if its financial management system amounts to a collection of spreadsheets.
Tags : 
    
Infor

Eight Elements of Effective Information Security Policies

Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, knowledge management, identity management, hipaa compliance, information management
    
Information Shield

The Business Need for Updated Information Security Policies

Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, it management, security management, hipaa compliance, sarbanes oxley compliance
    
Information Shield

Just-In-Time Recruiting Is Here

Published By: Infosys     Published Date: May 21, 2018
Imagine being able to find the perfect bartender to staff a five-star resort or hire an Italian chef for a week in Switzerland - all in real time, all with zero human touch, with digital contracts and signatures, all revenue passing through the platform, all payments made within 48 hours - tax, legal and regulatory compliance included. We made it happen for our client.
Tags : 
recruiting, company, employee, automated
    
Infosys

Escape Plan: How Integrated IT Portfolio Management Helps Healthcare Organizations Clear the Chaos

Published By: Innotas     Published Date: Jan 09, 2014
Learn to escape the chaos of regulatory compliance with Integrated IT Portfolio Management. This eBook for healthcare IT executive shares how to gain greater visibility into the delivery and execution of complex projects such as implementing EHR implementation, ICD-10 compliance efforts and the Affordable Care Act.
Tags : 
innotas, meaningful use, icd-10 compliance, project management system, portfolio management, project management office, it governance, governance model, resource management software, ppm software, it project portfolio management, apm saas, pmo services, ppm tools, application integration, business analytics, business management, project management
    
Innotas

Preparing Audit Ready Financials – Best Practices to Avoid Common Pitfalls

Published By: Intacct Corporation     Published Date: Mar 31, 2014
Independent external audits of GAAP financial statements are an inescapable reality for finance professionals. External audits are required by statute for public companies and are also becoming the norm among private companies experiencing growing demands for transparency from regulators, investors, and other stakeholders.
Tags : 
cloud accounting software, finance, streamline, revenue recognition, accounts receivable, financial audits, audit preparation
    
Intacct Corporation

Reduce Money Laundering Risk with Big Data Analytics

Published By: Intel Corp.     Published Date: Nov 21, 2017
This whitepaper will power your anti-money laundering compliance programs with technology that keeps up with evolving threats and regulatory mandates.
Tags : 
    
Intel Corp.

Gartner Critical Capabilities for Security Information and Event Management (SIEM)

Published By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : 
siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
    
Intel Security

How to Leverage Quality Management for Regulatory Compliance

Published By: Interactive Intelligence     Published Date: Feb 26, 2013
In today's regulations and risk management, business has become increasingly complex, and penalties are growing. Managing risk must therefore include monitoring the actions of your entire organization and more. Read on to learn more about compliance.
Tags : 
quality management, regulatory compliance, risk management, complex risk, monitoring actions, data management, business technology
    
Interactive Intelligence

Securing Cloud Computing for Enterprise Collaboration

Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications, data management, business technology
    
Intralinks

How to Manage Regulatory Compliance & Data Privacy While Keeping Your Data Safe

Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, knowledge management, enterprise applications, data management, data center
    
Intralinks

Content is the New Perimeter: The Security and Regulatory for Information Rights Management

Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security, business technology
    
Intralinks

Content is the New Perimeter: The Security and Regulatory Drivers for Information Rights Management

Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks

Intralinks VIA™ for Managing Regulatory Examinations

Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis regulatory exams have become increasingly demanding for governance, risk, and compliance professionals. New rules brought about by the Dodd-Frank Act will continue to shape future examinations including safety and soundness, compliance, market conduct, and risk-based targeted exams. We can expect these changes will require examiners to spend more time onsite, request more documents, and extend the scope and/or depth of their examinations. This means it is more important than ever to avoid the classic mistake of sharing examination documents through ad-hoc, manual processes and delivering highly sensitive data through unsecured channels like mail, e-mail, thumb drives, and FTP. In response to these increasing burdens financial institutions are looking to take control with a more structured, collaborative process for collecting, refining, and submitting regulatory information. Download this white paper to learn more about Intralinks VIA.
Tags : 
    
Intralinks

Intralinks VIA for Financial Services

Published By: Intralinks     Published Date: Apr 13, 2015
In the wake of the 2008 financial crisis, financial institutions are faced with increasing scrutiny from government regulators. The Dodd-Frank act was passed in response to the disaster, creating the Consumer Financial Protection Bureau and mandating 398 new rulemakings, many of which remain to be finalized. In light of these events financial services organizations are increasingly relying on Intralinks® as the most secure way to control sensitive information when collaborating within and outside their organizations. Intralinks meets the strictest security, auditability, and compliance requirements of regulated entities around the world – regardless of business complexities. Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection
    
Intralinks

Content is the New Perimeter: The Security and Regulatory Drivers for Information Rights Management

Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory, information, management, it management
    
Intralinks

Content is the New Perimeter: The Security and Regulatory Drivers for Information Rights Management

Published By: Intralinks     Published Date: Aug 28, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes.
Tags : 
security, it management, knowledge management, data management, business technology
    
Intralinks

Intralinks VIA for Financial Services

Published By: Intralinks     Published Date: Nov 23, 2015
Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection, business technology
    
Intralinks
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.