audit

Results 1 - 25 of 401Sort Results By: Published Date | Title | Company Name
By: Dell and Intel®     Published Date: Aug 24, 2015
Many enterprises are embracing Hadoop because of the unique business benefits it provides. But, until now, this rapidly evolving big data technology hadn’t always met enterprise security needs. In order to protect big data today, organizations must have solutions that address four key areas: authentication, authorization, audit and lineage, and compliant data protection.
Tags : 
     Dell and Intel®
By: Concur ENT     Published Date: May 11, 2018
VAT has been a valuable source of revenue for the UK Government since 1973. Yet, despite more than 40 years of getting used to calculating, paying and reclaiming VAT, businesses still struggle to adhere to HMRC guidelines. With support from SAP Concur, it doesn’t have to be this way. First, we offer an expense audit solution to check for fraud and non-compliance. Secondly, we work with tax specialists to help you comply with VAT regulations. Thirdly, we give you visibility and control over all aspects of your travel, expense and invoice spending. Crucially, we see VAT reclaim as an opportunity to reduce business costs and put money back in your budget.
Tags : 
     Concur ENT
By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : cloud, best, practices, endpoint, security, data
     MobileIron
By: Epicor     Published Date: Apr 17, 2018
Running a successful firearms and shooting sports retail business offers unique challenges. To achieve growth, you need a software solution that streamlines nearly every aspect of your firearms business—letting you focus on running a more compliant, efficient, and profitable operation. Created in collaboration with Orchid Advisors, Epicor FFL Compliance Manager is a robust, cloud-based system for firearms retailers that seamlessly manages ATF compliance for higher profits and faster growth. This fast, easy-to-use bound book solution can: • Quickly package compliance reports on demand and review bound book activity with dashboards to support ATF inspections • Save time by scanning serial numbers instead of entering them manually • Relieve audit stress thanks to easy access to bound book data and on-demand, ATF-friendly reporting Read on to hear from businesses currently powered by Epicor FFL Compliance solutions.
Tags : firearms collection software, firearms inventory software, firearms management system, firearms tracking software
     Epicor
By: Workday UK     Published Date: Mar 07, 2018
Learn why a new approach is needed. Read this whitepaper, “A New Approach to Audit and Control in Enterprise Software”, and discover more about the changing landscape of control and governance. Learn how rethinking technology can be the touchstone to separation of duties, transparent business processes and comprehensive auditing. Understand: •How the changing world of control and governance places new requirements on today’s finance systems •Why legacy systems with bolt-on finance controls fail to deliver complete compliance •How technology innovations help transform the finance function and reinforce control
Tags : 
     Workday UK
By: Epicor     Published Date: Sep 20, 2017
Selecting the right enterprise resource planning (ERP) software often poses a challenge for many businesses in the manufacturing industry. With so many options out there, it’s difficult to break down each potential application and choose the one that’s the best fit for your business. This Gartner report explains how ERP selection teams can come to a consensus and establish an understanding of all options by jointly populating and prioritizing a hierarchical, weighted ERP evaluation model. A structured evaluation model helps put all the cards on the table by explaining and justifying to internal stakeholders, external auditors, and vendors how and why an ERP software decision was made. Read the Gartner report and establish your own ERP evaluation model to see if the Epicor ERP solution is the right fit for your manufacturing business.
Tags : 
     Epicor
By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
     Limelight Networks
By: Aviatrix     Published Date: May 17, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
     Aviatrix
By: Dell EMC     Published Date: Oct 08, 2015
In order to protect big data today, organizations must have solutions that address four key areas: authentication, authorization, audit and lineage, and compliant data protection.
Tags : 
     Dell EMC
By: FICO     Published Date: Aug 27, 2012
This white paper provides a step-by-step guide to ensuring success with your business rules management project. You'll learn the components of a successful business rules management project.
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding
     FICO
By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : security controls, security, security applications, ssl/tls certificates, secure connection, security network
     Venafi
By: ServiceNow     Published Date: Jul 12, 2013
"Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges."
Tags : software, asset management, software asset management, webinar
     ServiceNow
By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
     Cisco
By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
     Venafi
By: Zendesk     Published Date: Aug 26, 2016
This white paper provides insight into how to perform a customer service audit to determine what needs to change in an organization.
Tags : 
     Zendesk
By: Zendesk     Published Date: Aug 26, 2016
This white paper provides insight into how to perform a customer service audit to determine what needs to change in an organization.
Tags : 
     Zendesk
By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
     CA Technologies
By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : best practices, business analytics, productivity
     Absolute Software
By: Prophix     Published Date: Jun 03, 2016
The paradigm for budgeting has changed. Watch this demo of budgeting with Prophix to learn how to improve organizational agility, gain efficiencies within your department and realize the business value that comes with a budget that is accurate, auditable and collaborative.
Tags : best practices, budgeting, prophix, organizational agility
     Prophix
By: Schneider Electric     Published Date: Oct 31, 2017
Most successful data center migration projects share similar practices, such as expertise, preparation, management, execution, communication and business alignment. The purpose of this research is not to provide an extensive examination of each one of these practices. Rather, it is to provide a pragmatic list of best practices. This list was derived from observations of numerous Gartner clients involved in data center migration projects over the last six years.
Tags : planning, contingency plan, testing, migration, preparation, project team, audit, closure
     Schneider Electric
By: ThingWorx     Published Date: Dec 02, 2015
Security is a primary concern of ThingWorx customers — especially device manufacturers and end-customers that deliver and use connected products. These customers demand a proven solution that protects them and their customers against hackers, malware and unsafe operations.
Tags : thingworx, security, operations, audit, customer, network
     ThingWorx
By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
     Workday Nordics
By: Workday DACH     Published Date: Mar 16, 2018
Erfahren Sie, warum ein neuer Ansatz nötig ist. Lesen Sie das Whitepaper “Ein neuer Ansatz für Audits und Kontrollen in Enterprise-Software” und erfahren Sie mehr über die sich verändernde Kontroll- und Governance-Landschaft. Lesen Sie, wie ein neu definierter Umgang mit Technologie zum Prüfstein für Aufgabentrennung, transparente Geschäftsprozesse und umfassende Audits werden kann. Das Whitepaper liefert Ihnen Antworten auf folgende Fragen: Inwiefern ändern sich die Anforderungen an moderne Finanzlösungen durch neue Kontroll- und Governance-Prozesse? Warum lässt sich mit traditionellen Lösungen und nachträglich hinzugefügten Funktionen zur Finanzkontrolle keine vollständige Compliance erreichen? Wie können technologische Innovationen dazu beitragen, das Finanzmanagement zu transformieren und die Kontrolle zu stärken?
Tags : 
     Workday DACH
By: sumtotal     Published Date: Jul 08, 2014
A SumTotal paper on the benefits of being audit ready.
Tags : compliance software, integrated compliance, compliance ready hr solutions, talent expansion, sumtotal
     sumtotal
By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com