compliance

Results 126 - 150 of 1818Sort Results By: Published Date | Title | Company Name
By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security, compliance exposures, mobile security, security
     ForeScout
By: NAVEX Global     Published Date: Aug 18, 2016
In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.
Tags : compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas
     NAVEX Global
By: NAVEX Global     Published Date: Oct 18, 2016
This report is an excellent starting point for organisations committed to benchmarking and improving programme effectiveness. To leverage more advanced benchmarks, NAVEX Global offers custom benchmarking options as part of our Integrity DiagnosticsTM and Integrity MetricsTM report service. These services allow you to get apples-to-apples benchmarking for your organisation based on your industry, company size, or other defining factors.
Tags : 
     NAVEX Global
By: NAVEX Global     Published Date: Oct 18, 2016
In 2016 NAVEX Global partnered with an independent research firm to survey ethics and compliance (E&C) professionals from a wide range of industries about their approach to E&C training.
Tags : 
     NAVEX Global
By: NAVEX Global     Published Date: Oct 18, 2016
This report aims to help you identify the compliance program you have in place, how to document your program elements and finally, develop and implement a work plan for addressing gaps.
Tags : 
     NAVEX Global
By: NAVEX Global     Published Date: Oct 18, 2016
This paper summarises: What the new FCA whistleblower rules are and why they were introduced, how the rules will impact your company’s ethics and compliance efforts and what actions to take both before and after the rules are fully enforced
Tags : 
     NAVEX Global
By: Infomatica     Published Date: Jul 15, 2015
UPMC is a cutting edge leader in harnessing the power of technology and accelerating innovation. This case study explores how UPMC was able to integrate clinical, financial, administrative, genomic and other information and use this data to: • Improve research outcomes in search of cures and other diseases • Determine the true cost of providing care with longitudinal patient records • Examine clinical practice variations to benchmark and improve future procedures • Strengthen information security, privacy and compliance capabilities
Tags : 
     Infomatica
By: Workforce Software     Published Date: Jun 04, 2015
If you ask ten different people to define workforce management, you are likely to get ten different answers. Download to learn the answers.
Tags : workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
     Workforce Software
By: Workforce Software     Published Date: Jun 04, 2015
This paper provides a guide to large employers confronted by the time and attendance evaluations dilemma.
Tags : workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
     Workforce Software
By: Workforce Software     Published Date: Jun 04, 2015
In the case of a technology project seeking to hit its mark—from staying on budget to achieving the desired results—these failures can be traced back to shortcomings in how the human element of the project was managed. Download to learn more!
Tags : workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
     Workforce Software
By: Workforce Software     Published Date: Jun 04, 2015
If you ask ten different people to define workforce management, you are likely to get ten different answers. Download to get the answers!
Tags : workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
     Workforce Software
By: Puppet     Published Date: Mar 09, 2017
Configuration management can play an incredibly important role in IT security due to its basis in establishing and maintaining a known and consistent state of the physical and software elements at your organization’s disposal. This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including: • Creation of a Standard Operating Environment (SOE) • Reporting on and control of configuration drift • Enhanced change remediation • Insight into configuration knowledge • And more
Tags : 
     Puppet
By: Q2 eBanking     Published Date: Jul 30, 2017
Banks and credit unions face multiple challenges to operational efficiency: tightening budgets, limited headcount, a challenging regulatory climate, ongoing security concerns and others. Efficiency and process enhancements can limit the impact these challenges could have on your institution. The following five questions—and your responses—may help your financial institution (FI) as you look to drive operational efficiencies, improve compliance and security, keep account holders happy and attract new ones.
Tags : 
     Q2 eBanking
By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
     IBM APAC
By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
     Akamai
By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
     Akamai
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This solution brief introduces the Smart Archive strategy from IBM, which is a comprehensive approach that combines IBM software, systems and service capabilities to help you drive down costs down and help ensure critical content is properly retained and protected.
Tags : ibm uk, ibm smart archive, ibm smart archive strategy, hardware, software, services, optimize, unify content, ingest, infrastructure, integrate, integration, compliance, analytics, ediscovery, security
     Ogilvy - IBM UK
By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : salesforce, cloud, security, webinar, best practices
     Salesforce
By: Salesforce     Published Date: Jan 15, 2016
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : salesforce, cloud, security, webinar, best practices
     Salesforce
By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
     Workday Nordics
By: Workday Nordics     Published Date: Apr 09, 2018
As May 25th, 2018 approaches, many of the organisations that I speak to are choosing to modernise their HR systems to help with their compliance efforts. In particular, where organisations have a complicated mix of different HR systems and spreadsheets, with employee data spread across different databases managed by multiple security models, GDPR compliance will be more difficult. Contrast such a complicated mix of HR systems with Workday’s unified, single system approach to HR, with a single source of HR data and a single security model, and you can see why organisations are choosing to move to Workday as they work to both modernise their HR systems and move towards GDPR compliance. We hope you find this research an i
Tags : 
     Workday Nordics
By: Workday DACH     Published Date: Mar 16, 2018
Erfahren Sie, warum ein neuer Ansatz nötig ist. Lesen Sie das Whitepaper “Ein neuer Ansatz für Audits und Kontrollen in Enterprise-Software” und erfahren Sie mehr über die sich verändernde Kontroll- und Governance-Landschaft. Lesen Sie, wie ein neu definierter Umgang mit Technologie zum Prüfstein für Aufgabentrennung, transparente Geschäftsprozesse und umfassende Audits werden kann. Das Whitepaper liefert Ihnen Antworten auf folgende Fragen: Inwiefern ändern sich die Anforderungen an moderne Finanzlösungen durch neue Kontroll- und Governance-Prozesse? Warum lässt sich mit traditionellen Lösungen und nachträglich hinzugefügten Funktionen zur Finanzkontrolle keine vollständige Compliance erreichen? Wie können technologische Innovationen dazu beitragen, das Finanzmanagement zu transformieren und die Kontrolle zu stärken?
Tags : 
     Workday DACH
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com