audit

Results 1 - 25 of 445Sort Results By: Published Date | Title | Company Name
Published By: Workday France     Published Date: Sep 27, 2018
La procédure d'audit ne devrait pas être un frein à la planification stratégique et au développement de la rentabilité. Avec un système de gestion financière unique basé dans le Cloud, toutes vos capacités de conformité, de contrôle et d'audit sont regroupées en une seule solution. Vous pouvez ainsi rationnaliser les processus d'audit et assurer la sécurité. Concentrez-vous sur l'entreprise et laissez Workday s'occuper du reste.
Tags : 
    
Workday France
Published By: Workday UK     Published Date: Sep 18, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
    
Workday UK
Published By: Workday     Published Date: Sep 18, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
    
Workday
Published By: AuditBoard     Published Date: Nov 26, 2018
AuditBoard’s OpsAudit platform is the only-purpose built audit technology, built for auditors, by auditors. Whereas other solutions in the GRC market are a “mile wide and an inch deep,” AuditBoard’s OpsAudit encompasses and streamlines all of the nuances associated with carrying out a world-class internal audit department. AuditBoard’s ease of use allows for auditors to spend all of their time with their audit customers and on their audit work, without suffering through administrative tasks or technology problems.
Tags : 
    
AuditBoard
Published By: AuditBoard     Published Date: Nov 26, 2018
When the IASB and FASB issued a joint press release on May 28, 2014 1 announcing new revenue recognition standards for revenue from contracts with customers, the adoption deadline seemed a long way off. After pushback from companies across various industries, the implementation date was extended by one year, granting companies more time to update their policies and systems to adhere to the new standards.
Tags : 
    
AuditBoard
Published By: AuditBoard     Published Date: Nov 26, 2018
Affecting over 200,000 machines in more than 150 countries, the ransomware known as Wanna Decryptor, or “WannaCry,” became the largest cybersecurity attack in history in May 2017. The malicious software locked out users from critical data, and demanded a ransom payment to unlock the contents. Governments, hospitals, and corporations scrambled to address the attack and prevent the infection from spreading. Ironically, the virus’ execution method was simple: it exploited a vulnerable Windows SMB protocol to spread – an exploit Microsoft had addressed two months prior to the attack with the release of a patch.
Tags : 
    
AuditBoard
Published By: AuditBoard     Published Date: Nov 26, 2018
You are the CAE of a mature company sitting with your external auditor, ready to kick off planning for the upcoming year. You’ve always been on top of your controls environment, and expect this upcoming year to go smoothly. However, mid-way through discussing your new areas of focus, the conversation goes astray as your auditor starts throwing out terms like “IPE” or “Electronic Audit Evidence” and says a whole new set of evaluation points will have to occur for every control test in your environment.
Tags : 
    
AuditBoard
Published By: AuditBoard     Published Date: Nov 26, 2018
Aggregating and analyzing internal organizational data, external subject matter expertise, and internal control-related data should provide the internal audit team a solid understanding of how the process works, the key risks managed by the process, and how the internal audit team should spend their time and resources to carry out the process.
Tags : 
    
AuditBoard
Published By: Epicor     Published Date: Sep 20, 2017
Selecting the right enterprise resource planning (ERP) software often poses a challenge for many businesses in the manufacturing industry. With so many options out there, it’s difficult to break down each potential application and choose the one that’s the best fit for your business. This Gartner report explains how ERP selection teams can come to a consensus and establish an understanding of all options by jointly populating and prioritizing a hierarchical, weighted ERP evaluation model. A structured evaluation model helps put all the cards on the table by explaining and justifying to internal stakeholders, external auditors, and vendors how and why an ERP software decision was made. Read the Gartner report and establish your own ERP evaluation model to see if the Epicor ERP solution is the right fit for your manufacturing business.
Tags : 
    
Epicor
Published By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : 
content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: Dell EMC     Published Date: Oct 08, 2015
In order to protect big data today, organizations must have solutions that address four key areas: authentication, authorization, audit and lineage, and compliant data protection.
Tags : 
    
Dell EMC
Published By: Netapp     Published Date: Dec 12, 2014
This ESG Lab Report documents the real world performance, reliability, availability, and serviceability of NetApp EF- Series flash arrays in Oracle database environments. A combination of hands on testing by ESG Lab and audited in- house performance testing executed by NetApp were used to create this report.
Tags : 
netapp ef- series flash, oracle database, challenges of managing data
    
Netapp
Published By: Key Private Bank     Published Date: May 22, 2018
There are obviously a variety of choices open to you: a spreadsheet plug-in may be appropriate if you are only focused on general ledger reporting and do not have concerns over security or compliance. You might also suppose that this is a low-cost option, though we would argue that the remediation required, the additional audit fees and the lack of repeatability means that this is a false economy and that this approach will end up costing you more in the long term. A second use case would be where you already have a financial reporting solution installed, when the add-on facilities for purposes such as business intelligence are likely to be your major focus. In this case an Oracle based solution is likely to be as good as anything else.
Tags : 
finance, business, planning, integration, strategy, company
    
Key Private Bank
Published By: FICO     Published Date: Aug 27, 2012
This white paper provides a step-by-step guide to ensuring success with your business rules management project. You'll learn the components of a successful business rules management project.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding, knowledge management, business technology
    
FICO
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking, software development
    
Venafi
Published By: ServiceNow     Published Date: Jul 12, 2013
"Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges."
Tags : 
software, asset management, software asset management, webinar, software development, it management, data management, business technology
    
ServiceNow
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : 
digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
Venafi
Published By: Zendesk     Published Date: Aug 26, 2016
This white paper provides insight into how to perform a customer service audit to determine what needs to change in an organization.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Aug 26, 2016
This white paper provides insight into how to perform a customer service audit to determine what needs to change in an organization.
Tags : 
    
Zendesk
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
    
SafetyCulture
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity
    
Absolute Software
Published By: Prophix     Published Date: Jun 03, 2016
The paradigm for budgeting has changed. Watch this demo of budgeting with Prophix to learn how to improve organizational agility, gain efficiencies within your department and realize the business value that comes with a budget that is accurate, auditable and collaborative.
Tags : 
best practices, budgeting, prophix, organizational agility
    
Prophix
Published By: Schneider Electric     Published Date: Oct 31, 2017
Most successful data center migration projects share similar practices, such as expertise, preparation, management, execution, communication and business alignment. The purpose of this research is not to provide an extensive examination of each one of these practices. Rather, it is to provide a pragmatic list of best practices. This list was derived from observations of numerous Gartner clients involved in data center migration projects over the last six years.
Tags : 
planning, contingency plan, testing, migration, preparation, project team, audit, closure
    
Schneider Electric
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com