third party

Results 101 - 125 of 288Sort Results By: Published Date | Title | Company Name

Secure the SaaS Tsunami

Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin

TIBCO Cloud Mashery

Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software

Gartner Magic Quadrant for Mobile Marketing Platforms, July 2018

Published By: Group M_IBM Q119     Published Date: Feb 21, 2019
Mobile marketing platforms facilitate direct marketing on mobile devices by enabling mobile campaign management and activation. These platforms can operate as stand-alone solutions; however, they typically integrate with, or operate alongside, CRM, location/data management, and multichannel marketing hub (MMH) or email marketing platforms. Regardless of how a mobile marketing platform gets deployed, the native or third-party analytics supporting its audience targeting, campaign sequencing, personalization and performance measurement capabilities form the foundation of this technology.
Tags : 
    
Group M_IBM Q119

Getting Started with Vulnerability Mitigation

Published By: Kaseya     Published Date: Mar 01, 2019
Three common types of software make you more vulnerable than you realize. While complete and thorough vulnerability management is next to impossible, a few simple steps go a long way toward reducing risk. Download this ebook to discover what steps to take to begin evolving away from patch management toward software and vulnerability management. The hidden threat in securing your infrastructure from vulnerabilities lies with IT’s difficulty in managing third-party software. 2017 was billed as the worst on record for cybersecurity. No doubt, the continued rise of modern threat vectors has IT on high alert. In essence, IT professionals view their role as responsible for keeping the door shut. However, even with IT administrators keenly aware that most exploits can be averted simply by keeping the environment current, the task is no small feat and often isn’t done as well as it needs to be.
Tags : 
    
Kaseya

Rising OSHA Penalties and How You Can Ensure Safety at The Workplace

Published By: Avetta     Published Date: Sep 17, 2019
On January 23, 2019, OSHA put into effect its 2019 Annual Adjustment that raised the penalties of violation by approximately 2.5% over the 2015 revised amounts. The consequences of non-compliance with OSHA regulations extend beyond the financial penalties imposed by the regulatory authority, with the biggest risk that an organization runs is that of reputational damage. In this whitepaper you’ll learn: • The most cited occupational hazards over the last year • How to be proactive in preventing occupational hazards in your workplace • The importance of pre-qualifying third party contractors in order to mitigate risk in your organization
Tags : 
    
Avetta

The Ultimate Supplier Prequalification Guide

Published By: Avetta     Published Date: Sep 17, 2019
11 ways to identify the best supplier verification partner for your organization. Third-party supplier qualification vendors typically offer a combination of technology and service – but they are not all created equal. This guide will help you compare the features to look for in a technology platform, the kinds of services provided, and how to evaluate a third-party supplier qualification partner to meet your needs. It is most suited to safety, procurement, compliance, risk management, operations, and other professionals evaluating a third-party vendor to help manage their supplier qualification program.
Tags : 
    
Avetta

10 Tips for Evaluating SharePoint 2013 Workflow Solutions

Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow, it management
    
K2

A Prescriptive Guide to Third Party Risk Management

Published By: NAVEX Global     Published Date: May 13, 2014
A four step third party risk assessment provides understanding on where to focus energy and develop a plan.
Tags : 
third party risk, compliance, risk management
    
NAVEX Global

5 Key Questions for Assessing Integrated Third Party Due Diligence Systems

Published By: NAVEX Global     Published Date: Mar 18, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
compliance, software compliance
    
NAVEX Global

Osterman Research Report – Microsoft Office 365 for the Enterprise – How to strengthen security

Published By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, data management, business continuity, security management, software compliance
    
Mimecast

Lost in the Cloud? Top Challenges Facing CIOs in a Cloud-Native World

Published By: Dynatrace     Published Date: Apr 16, 2018
Based on a global survey of 800 CIOs, this report examines the challenges organizations face when working within complex, cloud-centric ecosystems. Technology is at the heart of every organization today. Now more than ever, society expects the services we use to be innovative and faultless, prompting the creation of hyper-complex IT ecosystems. Relying on physical databases and third-party cloud service providers, businesses are finding it increasingly difficult to monitor application performance, ensure positive experiences, and succeed in this new environment.
Tags : 
    
Dynatrace

The Butterfly Effect (old)

Published By: KPMG     Published Date: Jul 25, 2016
Chaos theory suggests that seemingly unrelated events occurring thousands of miles apart may, in fact, be linked. Read “The Butterfly Effect” to learn how global organizations can address the threat of third party disruption in today’s economy.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends, enterprise applications
    
KPMG

Oracle Discoverer: Should I Stay or Should I Go?

Published By: Insight Software     Published Date: May 22, 2018
If you own Oracle Discoverer, the time to make a decision about your reporting roadmap is now. If after you read through this ebook, you are interested in pursuing a third party product, check Hubble out. Hubble was built to integrate with your ERP seamlessly. So this means you are up and running on the product very quickly, you can pull reports in real-time, and native security is brought over seamlessly. If you feel the need... the need for speed, Hubble has you covered. As an end user tool, you no longer have to worry about your reporting tool being difficult to use or inflexible. We have over 900 customers, many of which migrated off Discoverer, and were amazed at how quickly they were able to switch over all their old reports and get users up and running.
Tags : 
oracle, hubble, erp, reporting
    
Insight Software

Securing Your AWS Global Transit Network: Are You Asking the Right Questions?

Published By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? This is not the right question to ask first. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services – or add additional ones – that are appropriate for your business. After examining each use case, we’ll show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control

Published By: Mimecast     Published Date: May 15, 2014
This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, access control, business continuity, security management
    
Mimecast

Forrester Study: Closing the Cloud Email Security Gap

Published By: Mimecast     Published Date: Apr 18, 2017
"Secure Your Move To Cloud-Based Email With A Trusted Third-Party Security Service Provider Email is an essential component of business activity and workforce enablement. As cost, scale, flexibility, and usability become more important, organizations are seeking cloud-based email systems to support their workforces. Although cloud-based email investments provide financial and operating benefits, they do raise several security challenges. This report suggests that few firms understand or prepare upfront for the security challenges prior to their migration to a cloud environment. Download the study to learn more."
Tags : 
forrester, cloud security, email security, cloud-based email, cloud environment
    
Mimecast

Office 365 Risk Mitigation – A Conversational Geek Book

Published By: Mimecast     Published Date: Aug 22, 2017
The right third party solution can ensure that email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Office 365. But, what are the three key areas of concern around Office 365 email that you should be aware of? Read what Microsoft Office Servers and Services MVP, J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
office 365, risk mitigation, geek book, sla, cyberattacks
    
Mimecast

Remedying the Email Security Gaps in Microsoft Office 365

Published By: Mimecast     Published Date: Aug 22, 2017
Although many organizations are switching email accounts to Microsoft Office 365, they may well be exposing themselves to a wide range of security risks, data loss, and business continuity issues. This white paper explores how to use Microsoft Office 365 while protecting organizations from various security risks. Discover: • What to look for in third-party solutions • How to protect archived data • How to ensure business continuity
Tags : 
office 365, security, email security, archived data
    
Mimecast

Definitive Guide to Third – Party Risk Management: How to Successfully Mitigate Your Organisation’s

Published By: NAVEX Global     Published Date: Dec 07, 2017
The Definitive Guide to Third-Party Risk Management is a comprehensive resource full of insight, advice and examples to help organisations identify and address their third-party risk. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with third party business partners. It will also protect your organisation from the risks that third parties can present. This guide is divided into three main sections: PLAN, IMPLEMENT and MEASURE. In these sections you’ll find the information and tools you need to develop a risk-based strategy, define third-party risk and a standard due diligence process, implement continuous monitoring of third parties and identify areas in which you need to improve your programme’s effectiveness.
Tags : 
risk management, third – party risk, navex, safeguard, risk – based strategy
    
NAVEX Global

Anti – Bribery and Corruption Risk Assessment Checklist

Published By: NAVEX Global     Published Date: Dec 07, 2017
With the introduction of the Foreign Corrupt Practices Act (FCPA) and UK Bribery Act, organisations must take corruption in business seriously. Given the complexity of the activities addressed in an anti-bribery and corruption programme, however, the task can seem overwhelming. Our Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance programme using a protect, detect and correct methodology to manage core programme components such as: • Policies • Risk Assessment • Corrective Action • Training / Communication • Culture • Controls / Oversight • Business Partners Our checklist will enable you to design and implement an effective, global and consistent anti-bribery compliance programme.
Tags : 
foreign corrupt practices act (fcpa), uk bribery act, risk management, third – party risk
    
NAVEX Global

Definitive Guide to Third-Party Risk Management

Published By: NAVEX Global     Published Date: Apr 20, 2018
Learn everything you need to know about effectively managing your third party risk-from defining a due diligence process to creating risk-based strategy-in our comprehensive guide. What you'll learn: -How to define your goals and create a strategy -How to manage your third-party risk management programme -How to track and improve your programme's effectiveness
Tags : 
    
NAVEX Global

2017 Ethics & Compliance Third Party Risk Management Benchmark Report

Published By: NAVEX Global     Published Date: Apr 20, 2018
An effective third-party risk management programme is in the interest of all organisations—regardless of size, industry, and number of third party providers. This report will help you benchmark your third-party risk management programme and its performance against trends in the market and best practices. What you'll learn: The top issues and challenges organisations are facing with their third-party risk management programmes How organisations are using outside providers to help with third party due diligence The inconsistency of top concerns year over year and what this might indicate How to leverage the findings in this benchmark report to increase programme effectiveness in your own organisation
Tags : 
    
NAVEX Global

How to Respond to Bribery and Corruption Red Flags

Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global

Five Ways to Increase Efficiencies with SuccessFactors Emloyee Central for SMBs

Published By: Success Factors     Published Date: Jul 02, 2013
Start by managing all of your core HR data in the cloud, then open up a full 360-degree view of your employees with integration from talent management and third party-solutions. Follow these FIVE recommendations to streamline processes and increase efficiencies with SuccessFactors Employee Central.
Tags : 
increase efficiencies, successfactors, employee central, small businesses, medium business, cloud
    
Success Factors

SuccessFactors Employee Central Core HR (HRIS) Quick Guide

Published By: Success Factors     Published Date: Jul 02, 2013
SuccessFactors Employee Central provides a single employee global system of record that is deployed in the cloud and brings greater workforce visibility to small and medium-size businesses. HR can quickly integrate workforce data from the SuccessFactors BizX Suite of talent management solutions – including Performance and Goals, Compensation, Learning and more, as well as from third-party systems, such as payroll, benefits, and time and attendance. Employees can use the Employee Central self-service features to update their personal information, while managers can easily change employee information such as promotions, salary changes, terminations and more with customized approval workflows. The result: An integrated 360-degree view of the workforce that HR can access through standard and ad-hoc reports to make fast, informed decisions based on consistent, up-to-date data. To learn more, download the SuccessFactors Employee Central business brief for small to medium-size businesses
Tags : 
successfactors, employee, central core, hris, hr quick guide
    
Success Factors
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.