compliance

Results 151 - 175 of 1923Sort Results By: Published Date | Title | Company Name
Published By: Intacct Corporation     Published Date: Jan 26, 2016
Get the white paper "Mastering the Complexity of Revenue Management" to learn: • 5 specific steps you can take to ensure better compliance, improved visibility, and lower costs. • 9 key revenue management technology requirements that decision makers can't afford to miss. • Why Vendor Specific Objective Evidence (VSOE) is worrying more and more revenue managers and what you need to do about it. • 7 benefits that optimized revenue management brings to your organization, including accelerated closing, reduced revenue leakage, and forecasting visibility.
Tags : 
    
Intacct Corporation
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: VMware     Published Date: Aug 18, 2011
This executive level paper highlights trends and findings from CIO's 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter.
Tags : 
vmware, cloud security, trends, virtualized datacenter, compliance, cloud environments, cso, strategies, secure cloud initiative, virtualization
    
VMware
Published By: Voltage Security     Published Date: Sep 28, 2012
Meeting Data Residency and Compliance Challenges in Global Enterprises
Tags : 
data residency, information privacy, patriot ii act, voltage security, business technology
    
Voltage Security
Published By: Datto Inc.     Published Date: Jan 31, 2013
Business continuity, data insurance, local storage flexibility, cost benefits, standards compliance and infrastructure control. This is just some of what Datto and hybrid cloud backup can do for you, and your clients.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Published By: sumtotal     Published Date: Jul 08, 2014
A SumTotal paper on the benefits of being audit ready.
Tags : 
compliance software, integrated compliance, compliance ready hr solutions, talent expansion, sumtotal
    
sumtotal
Published By: VMware, Inc.     Published Date: Apr 05, 2016
Business teams striving to move quickly into new markets and launch new products and services are demanding more from IT organizations that have traditionally been focused on avoiding downtime, ensuring security and compliance, and holding down costs. Cloud computing offers compelling benefits for IT and the business to gain on-demand access to IT resources for new application development, as well as for running existing applications.
Tags : 
cloud, public cloud, data center, vcloud, vcloud air, it organizations, it management
    
VMware, Inc.
Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron
Published By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
data security, regulation, legal system, data protection
    
MobileIron
Published By: Fisher Investments     Published Date: Apr 22, 2015
This is whitepaper about best practices for the specific responsibilities and obligations in managing and administering a 401K plan.
Tags : 
best practices, 401k, small business, compliance, liability, violations, responsibilities, financial, fiduciary
    
Fisher Investments
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data, it management, knowledge management, enterprise applications
    
Aternity
Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
Download this whitepaper to learn more about cloud compliance.
Tags : 
    
Concerto Cloud Services
Published By: SAP     Published Date: May 04, 2016
Part of a series on the Future of Procurement, by Oxford Economics
Tags : 
sap, ariba, collaboration, procurement, oxford economics, supply risk, compliance, cost saving, additional revenue, enterprise applications, business technology
    
SAP
Published By: SAP Ariba     Published Date: May 05, 2016
Part of a series on the Future of Procurement, by Oxford Economics
Tags : 
sap, ariba, collaboration, procurement, oxford economics, supply risk, compliance, cost saving, additional revenue, enterprise applications, business technology
    
SAP Ariba
Published By: CA Technologies     Published Date: Nov 02, 2016
In the past 20 years, Elekta has achieved measured growth through nearly a dozen acquisitions, pulling new radiotherapy, brachytherapy and magnetoencephalography technologies into the fold. To deliver the full benefit of these sophisticated devices to providers and patients, Elekta must tie them together into integrated solutions— an immense and complex undertaking that can be further complicated by regulatory compliance.
Tags : 
    
CA Technologies
Published By: Citrix ShareFile     Published Date: Feb 06, 2017
Do you know why data encryption is important for your business? Find out how using advanced encryption lets you: - Protect your data and reputation while meeting clients’ expectations. - Support your compliance with industry regulations and ethical obligations. - Eliminate paperwork and other overhead associated with data storage and sharing.
Tags : 
networking, security, enterprise applications, business technology
    
Citrix ShareFile
Published By: Juniper Networks     Published Date: Aug 10, 2017
The digital, connected world is fundamentally changing the dynamics of the financial services industry. Consumers expect anytime and anywhere access with a customer experience commensurate with the Internet world, while fintech start-ups disrupt established value chains, driving a need to deliver faster innovation. This is creating tremendous pressure on the network, with escalating demands for performance and agility, while cost control and compliance imperatives remain as dominant as ever. This paper looks at optimal strategies for CIOs and CTOs, exploring how the future network needs to evolve to both drive operational effectiveness and enable business change, while assessing key investment and strategic considerations for equipping the network for the digital financial institution.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure, privilege management, system authentication
    
Juniper Networks
Published By: Google     Published Date: Jan 08, 2018
Google has helped millions of businesses address their content management challenges and transform the way they work by offering G Suite, which provides a set of user-friendly collaboration tools with the security, controls, and compliance every enterprise needs. Google is named a Leader in the Gartner 2017 Magic Quadrant for Content Collaboration Platforms (CCP). We are honored by Gartner's recognition in this report, which evaluates vendors based on their vision and ability to execute. Download the Gartner report and find out more now.
Tags : 
content collaboration, collaboration tools, content management, gartner
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
With the application economy in full swing, more organizations are turning to Continuous Testing and DevOps development practices in order to quickly roll out applications that reflect the ever-changing needs of tech-savvy, experience-driven consumers. Rigorous data they need, in the right formats. This forces teams to postpone their testing until the next sprint. As a result, organizations like yours are increasingly looking for ways to overcome the challenges of poor quality data and slow, manual data provisioning. They are also concerned about compliance and data privacy when using sensitive information for testing. CA Test Data Manager can help you mitigate all these concerns, so you’re positioned to achieve real cost savings.
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At the most fundamental level an organization only does two things: operations and changes to operations. Regardless of the industry an organization is part of, or whether it is private or public sector, large or small, there is a constant drive to protect and improve operational aspects. Whether it is launching a new product or service, decreasing costs, protecting infrastructure from failure or preventing regulatory noncompliance, there are numerous areas where an organization wants to change something about how it operates. That’s where projects come in. In this whitepaper we look at what causes projects to fail so regularly and offer a sustainable approach for improving performance consistently.
Tags : 
    
CA Technologies EMEA
Published By: TIBCO Software APAC     Published Date: May 31, 2018
With data the new competitive battleground, businesses that take advantage of their data will be the leaders; those that do not will fall behind. But gaining an advantage is a more difficult technical challenge than ever because your business requirements are ever-changing, your analytic workloads are exploding, and your data is now widely-distributed across on-premises, big data, the Internet of Things, and the Cloud. TIBCO® Data Virtualization is data virtualization software that lets you integrate data at big data scale with breakthrough speed and cost effectiveness. With TIBCO Data Virtualization, you can build and manage virtualized views / data services that access, transform, and deliver the data your business requires to accelerate revenue, reduce costs, lessen risk, improve compliance, and more.
Tags : 
    
TIBCO Software APAC
Published By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : 
cognizant, finance, digital
    
Cognizant
Published By: Cognizant     Published Date: Oct 23, 2018
A group of emerging technologies is rapidly creating numerous opportunities for life sciences companies to improve productivity, enhance patient care and ensure regulatory compliance. These technologies include robotic process automation (RPA), artificial intelligence (AI), machine learning (ML), blockchain, the Internet of Things (IoT), 3-D printing and augmented reality/ virtual reality (AR/ VR). This whitepaper presents a preview of five pivotal technology trends remaking the life sciences industry: AI and automation, human augmentation, edge analytics/ processing, data ownership and protection, and the intermingling of products and services.
Tags : 
cognizant, life sciences, patient care
    
Cognizant
Published By: Intapp     Published Date: Jan 08, 2019
Five global legal trends are testing the limits of even the best new business acceptance models. In this ebook, you’ll explore their effects, learn best practices on how to adapt to them, and evaluate your current processes with an assessment checklist.
Tags : 
law firm business acceptance, law firm business acceptance trends, law firm improving business acceptance, law firm better business acceptance, law firm business acceptance problems, law firm business acceptance issues, law firm client onboarding, law firm better client onboarding, law firm improving client onboarding, law firm conflicts, law firm conflicts clearance, law firm better conflicts clearance, law firm improving conflict clearance, law firm client terms, law firm managing client terms, law firm managing client terms better, law firm compliance, law firm better compliance, law firm improving compliance
    
Intapp
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com