policies

Results 101 - 125 of 412Sort Results By: Published Date | Title | Company Name

Cultivating a Culture of Compliance

Published By: SAP Concur     Published Date: Sep 25, 2019
"Regardless of your organization’s industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. However, by establishing checks and balances to put you in control of employee spend, and making it easy for employees to comply with policies, you can mitigate, detect, and prevent losses due to accidental errors or fraudulent activities. Download this tipsheet to find out how you can cultivate compliance to better protect your business today."
Tags : 
    
SAP Concur

Customer Centricity and the CHRO

Published By: KPMG     Published Date: Jun 06, 2019
Leading companies are focused on increasing customer satisfaction and retention by taking an organisation-wide, customer-centric approach. Find out about the critical role HR has to play in elevating the customer experience. Read this report to discover: • how HR can influence the customer agenda • how to take advantage of AI and D&A to recruit the right people • what skills customer service employees will need as a result of automation • how to win senior buy-in for new HR policies and approaches • seven action steps for building a customer-centric culture.
Tags : 
    
KPMG

Data Analytics to Combat the Opioid Epidemic

Published By: SAS     Published Date: Jan 17, 2018
We have conditioned patients not only to expect opioids for pain relief, but to utilize more and more of them, and the addiction is both psychological and physical. To remedy the situation, a lot of policies and practices and behaviors must change around how the health care system approaches pain. But we do not yet have the data and analytics we need to determine what specifically to do at the patient level or the policy level. Download this whitepaper to learn more about the resources available and how we can fix this issue.
Tags : 
    
SAS

Data protection for endpoints eBook

Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite

Deep Dive into Security and Privacy

Published By: Cloud Sherpas     Published Date: Nov 06, 2015
Watch this webinar replay to explore the principles that guide Google’s security and privacy policies in order to understand how going Google can transform your organisation without compromising security.
Tags : 
security, cloud, cloud computing, security cloud computing, security and privacy, google, google apps, application security, application integration, virtualization, infrastructure, infrastructure management
    
Cloud Sherpas

Defining Your Corporate Mobile Policies

Published By: BlackBerry     Published Date: Aug 26, 2008
It's important that corporate mobile policies cover everything from what types of devices will be available to users, how and when they can use them, what corporate resources they are able to access and what security measures will be instituted. Furthermore, Mobile managers must not ignore the impact of government regulations and compliance when laying out their corporate mobile policies.
Tags : 
blackberry, mobile policies, vpn, mobile devices, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging
    
BlackBerry

Definitive Guide to Policy Management

Published By: NAVEX Global     Published Date: Jul 17, 2017
Download your Definitive Guide to Policy Management for real-world examples of companies avoiding litigation and penalties by having a well thought out compliance programme. Organisations that approach policy management strategically and exercise ruthless discipline with respect to their policies yield massive returns in organisational alignment, corporate culture, and ultimately their bottom-line results. And when incidents occur or regulators come knocking, you'll be prepared.
Tags : 
policies, enforcement, perception, culture, templates, meta-policy, properties, links
    
NAVEX Global

Defrag Your Enterprise & Liberate Your Data

Published By: Mimecast     Published Date: Oct 17, 2013
"Storage Anywhere & Everywhere" is a new study by Free Form Dynamics sponsored by Mimecast. It includes lessons from expert or 'elite' organizations on how to get control of your data and make it work to your advantage.
Tags : 
mimecast, free form dynamics, inforgraphic, defragmentation, liberating data, controlling data, elite organizations, measure roi, understanding data, establish policies, protect your data, streamline routine, cloud services, hosted services, control corporate data, data management, security management, wireless security, productivity, data loss prevention
    
Mimecast

Demonstrate PCI Compliance through Better Change Management

Published By: ITinvolve     Published Date: Jun 01, 2012
Demonstrating PCI compliance with policies and regulations is an IT necessity, especially when periodic audits are conducted. ITinvolve has a better approach to change management with the capability to identify official PCI systems and their associated policies and documentation thus eliminating manual processes and reducing the risk of errors and delays.
Tags : 
it operations, information technology, audit, compliance, pci, governance, productivity, software compliance, business technology
    
ITinvolve

Deploying Advanced Authentication for CJIS Compliance

Published By: Entrust Datacard     Published Date: May 15, 2014
A proven, cost-effective strong authentication approach for law enforcement compliance in the United States
Tags : 
entrust, security, cjis, compliance, fbi, security policies, it management
    
Entrust Datacard

DLP: COORDINATED SECURITY

Published By: CDW     Published Date: Jul 08, 2015
An effective data loss prevention program requires the right technologies and policies in place and working together.
Tags : 
dlp, leakage, security, strategy, policy based management, security management, security policies, vulnerability management, data loss prevention
    
CDW

Don't Let Your Business Get Buried Under Digital Debris

Published By: IBM     Published Date: Nov 19, 2014
According to a recent survey by the Compliance, Governance and Oversight Council, almost 70% of the electronic content and information organizations retain has no business or legal value. It’s simply digital detritus, retained because 1) we think we might need it sometime, 2) we forget about it, or 3) we don’t have policies and software in place to get rid of it. Ultimately, though, this unnecessary accumulation of content can create real problems in terms of e-discovery, regulation, management and cost. Watch this video white paper to learn more about: - How to get started on an information management strategy - The right combination of software and policy for successful information governance - The business case for proactive management of an organization’s digital footprint
Tags : 
compliance, governance, oversight, digital debris, data cleanup, legacy data cleanup, information management, information management strategy, information governance
    
IBM

Don’t Settle for BlackBerry: Choose the Path to Complete Mobile Security and Productivity

Published By: MobileIron     Published Date: Mar 21, 2017
In 2017, BlackBerry customers will face a major IT challenge — rebuilding their entire mobile security infrastructure when BlackBerry officially end-of-lifes its Good for Enterprise email app. Migrating to BlackBerry’s offering involves more than just rolling out a new app; it will require IT to spend significant time and resources to redefine policies, retrain IT and help desk staff, and re-enroll hundreds or even thousands of users in the new software.
Tags : 
    
MobileIron

E-book: Great People Drive Great Patient Experience

Published By: Cielo     Published Date: Nov 05, 2018
Drastic changes in the healthcare industry as a whole, including issues like new technologies and shifting reimbursement policies, require employees who can think critically and adapt quickly. These issues create a significant challenge — and opportunity — for industry leaders.
Tags : 
    
Cielo

E-Policy Best Practices

Published By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave, human resources, p2p, social media, blogging, blog, instant message, instant messaging, peer-to-peer, peer-2-peer, policies, filtering, security
    
EdgeWave

E-Policy Best Practices Guide

Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this information-packed white paper by Nancy Flynn, Executive Director of the ePolicy Institute, for a no-nonsense look at the business risks and legal liabilities associated with employee misuse of the Internet, email, instant messaging (IM), and peer-to-peer (P2P) file-sharing technology.
Tags : 
spyware, security policy, security policies, policy based management, email security, secure im, st. bernard, st bernard, epolicy, anti spyware, secure instant messaging
    
St Bernard Software

eBook: How to Accelerate Your AWS Cloud Journey to Reach Cloud Maturity

Published By: CloudHealth by VMware     Published Date: Apr 08, 2019
Organizations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimize your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
    
CloudHealth by VMware

Edge To Endpoint

Published By: Oracle     Published Date: Nov 30, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle

Edge To Endpoint

Published By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle Dyn

Effective Content Analysis for Email Inspection & Control

Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, nemx, data management, microsoft exchange, contact management
    
Nemx Software Corporation

Eight Elements of Effective Information Security Policies

Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, knowledge management, identity management, hipaa compliance, information management
    
Information Shield

Eliminating Your SSL Blind Spot: The Solution to Managing and Securing HTTPS Traffic

Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing

Employee Handbooks Dos and Don’ts

Published By: XpertHR     Published Date: Nov 13, 2018
One of the most common workplace documents is an employee handbook. If you choose to have one, it is critical to follow through in implementing and enforcing it. The National Labor Relations Board (NLRB) has increasingly taken more of an activist role in the scrutiny of employee handbook. It’s important that employers take note of the NLRB’s position on certain work rules that may affect an employee’s right to engage in protected activity, as well as an employer’s role in managing its workforce. When updating your handbook it's important to keep in mind that what is not included is almost as important as what is included. Use this whitepaper to refresh yourself on seven essential dos and don'ts of employee handbooks such as: • Topics to include in your handbook • Common risks to avoid • Provisions to consider • Best practice around updating and amending policies Plus, get tips on how to approach your handbook as a multistate employer. {Download now}
Tags : 
handbooks, employee handbooks, compliance, policies, work rules
    
XpertHR

Employee-owned Smartphones: Seize the Opportunity

Published By: BlackBerry     Published Date: Jul 22, 2010
As more employees desire to use their personal smartphones for work, IT managers must leverage the opportunity, or risk their organizations missing out on an emerging business trend. It's no longer feasible for an IT department, regardless of company size, to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. This free whitepaper discusses innovative mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources.
Tags : 
blackberry, mobility, smartphones, rim, cell phones, mobile workforce, e-commerce, handset, touchpoint, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wireless service providers, collaboration
    
BlackBerry

Endpoint Security Must Get Better

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless, knowledge management
    
CDW-Trend Micro
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.