governance

Results 376 - 386 of 386Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 25, 2013
Educating Everyone To Guard the Cloud
Tags : security, cloud, ibm, access management, identity management, governance, risk management, compliance
     IBM
By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : it governance, risk, compliance, servicenow, webinar
     ServiceNow
By: NETIQ     Published Date: Mar 12, 2013
Sally Hudson, IDC research and analysis, sums up thoughtful Q&A session that highlights evaluating access governance solutions, developing agile processes and policies that meet security and compliance needs.
Tags : idc research, governance solutions, netiq
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense.
Tags : iag, identity and access governance, identity management, compliance, security, it management
     NETIQ
By: NETIQ     Published Date: Mar 12, 2013
Is change and complexity causing you to rethink your approach to identity, security and governance? Examine some of the challenges organizations face when developing and adapting a compliance program.
Tags : iag, identity management, access governance, it security, compliance
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet IT’s demands and simple for non-IT professionals to manage.
Tags : iag, identity and access governance, identity management, compliance, security, it management
     NETIQ
By: Pega     Published Date: Sep 11, 2015
In this new report, Pegasystems is recognized as a leader in the growing market for flexible case management solutions. Pega leads the market in delivering applications that meet rising expectations for: -Built-in change governance procedures -Open APIs -Ability to federate case management -Flexible data structures -Focus on business outcomes
Tags : 
     Pega
By: IBM     Published Date: Oct 26, 2017
Threats to your digital assets are everywhere. They’re constant. So you build defenses to keep them out. But like a carpenter framing a new addition to a house, you want to regularly step back from working on the details for a full view of your work. Do the enterprise security measures you’ve built do a complete job of protecting against intrusions? Or have you left any gaps that allow bad actors an easy way in? When you check all the possibilities, you might be surprised.
Tags : data protection, sensitive data, data security, identity governance, digital assets
     IBM
By: IBM     Published Date: Oct 26, 2017
Not long ago, job roles were relatively easy to define and control. A person was an “accountant” or a “graphic designer” or a “business partner.” But as organizations grew and business software became more sophisticated, new roles were added. “Accountant, New York” might require different access to applications and data than “Accountant, Chicago.” The challenge comes from the recent explosion in the numbers and types of business roles.
Tags : identity governance, entitlements, authorized users, orphan accounts, business activities
     IBM
By: IBM     Published Date: Oct 26, 2017
When choosing among providers of identity and access management as a service (IDaaS), a great place to start is evaluating your own organization’s IAM needs. Create a personalized list of your identity and access management (IAM) needs and determine if IBM® Cloud Identity Service is right for you. With this checklist, you will be able to determine if your needs match up with the benefits of IBM Cloud Identity Service.
Tags : iam, idaas, web access management, cloud based security, governance administration, enterprise grade identity
     IBM
By: OnBase by Hyland     Published Date: Jun 26, 2017
Digital transformation is a concept on every IT and business leader’s mind, from improving back-office operations to creating better front-office experiences. Yet when it comes to adopting the latest information management technologies and digitally transforming operational processes, some organizations are further along than others. Download this report to find out how your organization stacks up.
Tags : strategy, digital, transformation, onbase, hyland, information, management, cloud
     OnBase by Hyland
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com