policies

Results 1 - 25 of 395Sort Results By: Published Date | Title | Company Name

A Modern Approach to Branch Security

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isn’t efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
    
Cisco Umbrella EMEA

The Rise of Direct Internet Access (DIA): Securing Remote Users and Branch Offices

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
    
Cisco Umbrella EMEA

11 Techniques to Transform Your Expense Policy

Published By: SAP Concur     Published Date: Aug 07, 2019
"Creating an expense policy can be a time-consuming process, but when you consider that almost 20% of T&E expenses fall outside of policy it makes sense to invest the time and effort. This template walks you through how to build a best-practice expense policy and also explains what each section should cover. In the template you will find: Explanations for each expense category in plain language Lists of common questions about expense policies, pitfalls 11 tips for creating a straight-forward policy that increases compliance Get started on your expense policy today."
Tags : 
    
SAP Concur

The Tools CFOs Need for Smart Growth

Published By: SAP Concur     Published Date: Aug 07, 2019
"No organization wants to maintain the status quo, but many lack a plan for managing expansion. Planning for growth is essential to keeping everyone focused on the ultimate goal — be it expanding into new markets, introducing new products or broadening the customer base. The role of the CFO is to ensure that the company manages cash flow and expenses to position the company for intelligent expansion. To effectively plan for the future, the finance team needs modern tools and strategies to control costs and efficiently manage AP processes and T&E policies as they add headcount and crosses borders in search of opportunities."
Tags : 
    
SAP Concur

Taking the Pain out of Travel Expense Management

Published By: SAP Concur     Published Date: Aug 07, 2019
"Companies need to provide a seamless experience for their road warriors who are traversing the globe in search of new clients, attending conferences, exploring new business opportunities and checking on projects. The goal of automating the T&E function isn’t just to save the company time and money, although that is a significant consideration. With policies in place, companies can ensure that business travelers are adhering to allowances for meals, hotels and other travel-related expenses. Companies that establish clear policies for how employees can book and pay for travel — and which vendors to use — can negotiate discounts and rewards with hotels, rental car agencies and airlines. In addition to the financial benefits of an expense management policy, employee satisfaction is also at stake. Creating a realistic travel policy that is clear, simple and easily accessible makes employees happy. A quick and hassle-free travel expense management process reduces traveler stress, enabling
Tags : 
    
SAP Concur

Modernizing Applications to Improve Government Services

Published By: Group M_IBM Q3'19     Published Date: Aug 05, 2019
Expectations for government agencies are rising at a rapid and sometimes overwhelming pace. New laws, mandates and policies combined with rising citizen demands for usability and technology driven services put pressure on the public sector to deliver with current or even shrinking resources.
Tags : 
    
Group M_IBM Q3'19

State-by-state breakdown of opioid regulations

Published By: athenahealth     Published Date: Jul 22, 2019
Each U.S. state uses a number of different tactics to manage the opioid epidemic. Where is your state focusing its efforts, and how does it compare to other states? See the state-by-state breakdown for laws, policies, and prescribing patterns.
Tags : 
    
athenahealth

How Intuit uses AppZen to create processes around employee expense report misconduct

Published By: AppZen     Published Date: Jul 17, 2019
Learn how Intuit’s CFO Melanie Gallagher used the findings from AppZen to save hundreds of thousands of dollars in T&E leakage. She went step further to join force with managers and Human Resources across the organization to create standardized policies relating to expense report conduct.
Tags : 
    
AppZen

Using Analytics With Open Data to Build a Stronger Government

Published By: SAS     Published Date: Jun 26, 2019
To support open government initiatives and uphold the values of transparency, participation and collaboration in the US, federal agencies today make their data open, or publicly accessible. Citizens can use this open data to assess college affordability, the economy, educational issues, environmental damage, health care, taxes, agriculture, the climate and more. Governments can use APIs to pull this open data into SAS Visual Analytics as a way to identify trends and patterns and obtain all sorts of new insights. With public health surveillance, for example, governments can monitor and evaluate indicators that point to high-risk areas so they’ll know where and how to focus efforts. Such public health surveillance can serve as an early warning system for impending emergencies, document the impact of an intervention, track progress toward public health goals, and clarify health problems to inform public health policies and strategies.
Tags : 
    
SAS

Maximizing the value of your data privacy investments

Published By: Cisco EMEA     Published Date: Jun 19, 2019
The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
    
Cisco EMEA

How to Create a Healthy Expense Report Culture

Published By: AppZen     Published Date: Jun 17, 2019
Setting clear expectations and guidelines around travel and entertainment expenses (T&E) is crucial to establishing a healthy company culture. Employees want to feel at ease laying out money for the company, feeling confident they will get reimbursed quickly. Crafting a comprehensive T&E policy and making sure it’s available to all employees is an important first step, but a policy alone isn’t enough — a culture of anxiety and mistrust can emerge from even the most carefully constructed policies.
Tags : 
    
AppZen

Report: Data ethics in a digital economy

Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG

The Radicati Group DLP – Market Quadrant 2018

Published By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more. Read the report to learn more.
Tags : 
    
Forcepoint

A Guide to Achieving SaaS Security and Compliance

Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint

The Radicati Group DLP – Market Quadrant 2018

Published By: Forcepoint     Published Date: Jun 06, 2019
The Radicati Group recognizes Forcepoint as a Top Player in its Data Loss Prevention –Market Quadrant. The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepont CASB to extend DLP policies into cloud applications and more.
Tags : 
    
Forcepoint

Briefing: The Future of IT – Preparing for modern delivery of IT

Published By: KPMG     Published Date: Jun 06, 2019
Organisations increasingly need a delivery model for technology that can keep pace with the market. This is about more than doing the basics faster. Find out what ‘modern delivery’ looks like. Read this briefing to discover: • why modern deliver is a key enabler for the customer-centric, connected enterprise • how organisations can make better decisions before development begins • how future development teams will be organised • how to adjust policies and controls to create space for innovation • critical steps for achieving frictionless agility at scale.
Tags : 
    
KPMG

Customer Centricity and the CHRO

Published By: KPMG     Published Date: Jun 06, 2019
Leading companies are focused on increasing customer satisfaction and retention by taking an organisation-wide, customer-centric approach. Find out about the critical role HR has to play in elevating the customer experience. Read this report to discover: • how HR can influence the customer agenda • how to take advantage of AI and D&A to recruit the right people • what skills customer service employees will need as a result of automation • how to win senior buy-in for new HR policies and approaches • seven action steps for building a customer-centric culture.
Tags : 
    
KPMG

Privileged Access Threat Report 2019

Published By: BeyondTrust     Published Date: Jun 05, 2019
The world is an uncertain place. Particularly for cyber security professionals, many of whom have learned the hard way that they can’t rest on their laurels. New technologies and fresh threats are constantly emerging, and these threats come from both outside and within organizations. In our 2019 privileged access threat research, we discovered that almost two thirds of respondents (64%) think it is likely they’ve suffered a breach due to employee access, while 58% say the same about vendors. Meanwhile, the devices intended to make life easier can expose businesses further. Although hostile, external attacks are considered a significant or moderate concern by 61% of businesses, the threat of misused or abused insider access follows very closely behind at 58%. At the same time, 57% of security decision makers perceive at least a moderate risk from Bring Your Own Device (BYOD) policies and the Internet of Things (IoT) at 57%. In this fourth edition of BeyondTrust’s annual Privileged Acces
Tags : 
    
BeyondTrust

Key considerations for delivering secure unparalleled remote access

Published By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems

WHITE PAPER | Seven Steps to Get Started with Microsoft Azure

Published By: Rackspace     Published Date: May 28, 2019
Getting started with Microsoft Azure can be easier than you imagine – Rackspace is a seasoned cloud management partner of myriad customers around the world. Pooling its depth of cloud experience with its expertise across all the major cloud platforms, Rackspace sieves out the proven steps to help IT teams adopt Azure cloud in lowering costs, more strategic use of IT resources and a competitive edge. To get started with Microsoft Azure, check out this white paper for coverage of the essentials, from planning and budgeting to choosing the best strategy to secure your cloud environment, in seven critical steps: 1. Don’t start with a production workload 2. Consider any corporate policies and compliance issues 3. Define your goals for the cloud 4. Calculate your financial return on Azure 5. Determine your cloud identity strategy 6. Consider how to secure your cloud environment 7. Realize it’s not as easy as it looks
Tags : 
azure workloads, security, compliance, infrastructure, iaas, paas, saas
    
Rackspace

WHITE PAPER | Seven Steps to Get Started with Microsoft Azure

Published By: Rackspace     Published Date: May 28, 2019
Getting started with Microsoft Azure can be easier than you imagine – Rackspace is a seasoned cloud management partner of myriad customers around the world. Pooling its depth of cloud experience with its expertise across all the major cloud platforms, Rackspace sieves out the proven steps to help IT teams adopt Azure cloud in lowering costs, more strategic use of IT resources and a competitive edge. To get started with Microsoft Azure, check out this white paper for coverage of the essentials, from planning and budgeting to choosing the best strategy to secure your cloud environment, in seven critical steps: 1. Don’t start with a production workload 2. Consider any corporate policies and compliance issues 3. Define your goals for the cloud 4. Calculate your financial return on Azure 5. Determine your cloud identity strategy 6. Consider how to secure your cloud environment 7. Realize it’s not as easy as it looks
Tags : 
    
Rackspace

Get an Introduction to the Next-Generation of DLP

Published By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint

It's Time to Rethink Data Security

Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint

The Radicati Group Recognizes Forcepoint DLP as a Top Player

Published By: Forcepoint     Published Date: May 14, 2019
The constant presence of internal and external threats, along with increased worldwide regulations such as the General Data Protection Regulation (GDPR), have continued to drive the adoption of data loss prevention (DLP) solutions. In the “Data Loss Prevention – Market Quadrant 2018” report, The Radicati Group estimates the DLP market will double from $1.1 billion in 2018 to $2.2 billion by 2022. Once again, Forcepoint has been named a Top Player in this year’s report, citing strengths such as integration with Forcepoint CASB to extend DLP policies into cloud applications and more.
Tags : 
    
Forcepoint

HELPING MANAGERS TAKE ACTION ON SURVEY RESULTS

Published By: Engage2Excel     Published Date: Apr 29, 2019
Organizations generally conduct surveys for four, sometimes overlapping, reasons. These reasons exist along a continuum from "defensive" to "offensive" reasons. Starting with the most defensive reason, the four reasons are as follows: 1. To identify warning signs of trouble within the organization 2. To evaluate the effectiveness of specific programs, policies and initiatives 3. To gauge the organization's status or strength as an employer of choice among its workforce 4. To predict and drive organizational outcomes, including customer satisfaction and business performance
Tags : 
    
Engage2Excel
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.