compliance

Results 226 - 250 of 2004Sort Results By: Published Date | Title | Company Name
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
    
Brainloop
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection
    
Brainloop
Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management
    
Brainloop
Published By: Brainloop     Published Date: Nov 09, 2011
This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.
Tags : 
brainloop, security, compliance risks, sharing information, security management, data protection
    
Brainloop
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : 
brainloop, technology, security, it security, end users
    
Brainloop
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance
    
Brainloop
Published By: Brainloop     Published Date: Jan 04, 2012
IT can do everything in its power to secure the company's confidential documents, yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, compliance, user compliance, security
    
Brainloop
Published By: Brainshark     Published Date: May 07, 2013
Do your field reps use iPads or iPhones? If so, enable them to present with PowerPoint the way it was meant to be seen -- with fonts, colors and animations intact. Plus, empower you content team to instantly edit and update all versions of a particular presentation, all with the click of a mouse. Ideal for reducing risk and maintaining compliance! Users in more than 140 countries use SlideShark to deliver consistent, secure PowerPoint presentations on iPads and iPhones. Find out how SlideShark can empower you to distribute, control and track field PowerPoints. Click here to watch a quick 2-minute video and see SlideShark in action.
Tags : 
powerpoint, sales, mobile, ipad, iphone, slideshark, compliance, presentation
    
Brainshark
Published By: Brainshark     Published Date: Jun 03, 2013
View this 2 minute video to learn why millions use SlideShark to show flawless PowerPoints on the iPad...instantly track what reps presented which PowerPoints and to whom. Update every copy of a field sales presentation with a single of a mouse...Control, manage and track individual rep usage of master presentations.
Tags : 
powerpoint, sales, mobile, ipad, iphone, slideshark, compliance, presentation
    
Brainshark
Published By: Brainshark     Published Date: Oct 16, 2013
Banking, insurance, securities and investment firms are challenged to keep employees, broker dealers, investors and others current in a world of constant change. Enabling video and mobile communications is the most efficient way to clearly communicate and stay ahead of competitors and changing regulations. Discover how 8 out of the top 10 US financial institutions use Brainshark communications to increase compliance, decrease risks, and lower the costs of communications.
Tags : 
finance, financial services, banking, investment, insurance, broker, credit union, banks
    
Brainshark
Published By: Brainshark     Published Date: Oct 16, 2013
Companies are using both formal and informal learning to educate new and existing employees. However, decreasing the cost of training and increasing employee knowledge retention are challenges for many organizations without the proper resources. In this E-book, discover how businesses have used Brainshark to successfully produce content up to five times faster, boost employee retention and participation rates, and increase compliance.
Tags : 
on-demand training, training, training costs, onboarding, new hires, compliance training, sales training, channel partner
    
Brainshark
Published By: Brainshark     Published Date: Oct 16, 2013
"Getting employees to understand and take advantage of benefits during open enrollment periods is big challenge for many HR managers. This paper looks for new ideas on communicating benefit plans from professional marketers, knowledge management experts, and social media gurus."
Tags : 
human resources, training, compliance, onboarding, new hire, orientation, open enrollment, employee benefits
    
Brainshark
Published By: Brainshark     Published Date: Nov 05, 2013
Employees today are challenged to keep up with rapidly changing technologies and information. Discover the benefits of just-in-time learning and learning on-the-go in this video, and find out how your organization can help employees learn anywhere, anytime and on any device.
Tags : 
on-demand training, training, training costs, onboarding, new hires, compliance training, sales training, channel partner
    
Brainshark
Published By: Brocade     Published Date: Jun 07, 2016
Gilt Groupe needed to move to a cloud environment to boost scalability and cope with peaks in demand. This case study explores how Brocade technology simplified this process, enabling a multitiered, service-oriented architecture that would satisfy PCI DSS compliance.
Tags : 
brocade, gilt groupe, cloud environment, scalability, demand, multi-tiered architecture, service-oriented architecture, pci dss compliance
    
Brocade
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
With competition growing for your prospects’ attention, it’s never been more important to create powerful messaging that builds a bridge between an issue that’s on their minds and your company’s solution or service. This white paper outlines three steps for creating relevant messages and effective calls to action.
Tags : 
calls to action, bds, bulldog solutions, messaging, planning, promotion planning, lead gen, topics
    
Bulldog Solutions
Published By: Business Software     Published Date: Apr 04, 2013
As todayís global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed
    
Business Software
Published By: C2C Systems     Published Date: Apr 24, 2013
Download this white paper to see how PST Enterprise enables corporate IT to regain control of distributed corporate email found in PST files to manage compliance, support discovery and minimize risk associated with this data. It enables full discovery of all PST files, regardless of their location or status, and it provides the information needed to take intelligent action on the data within. Such actions include owner determination, in-place retention, data migration, and file copy, move, disconnect and deletion.
Tags : 
pst enterprise, files, emails, data migration, file copy, distribution
    
C2C Systems
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
This paper considers the use of email archives for compliance. It will also review how archives are trusted and look at what has to be done to ensure that integrity is maintained throughout the chain of events that take place within an email archive environment.
Tags : 
compliance, email archiving, data quality, records management, personal email, enterprise email, email security, c2c
    
C2C Systems, Inc.
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
Tags : 
email archiving, email security, storage, security policies, policy based management, compliance, exchange server, c2c
    
C2C Systems, Inc.
Published By: CA ITAM     Published Date: Sep 09, 2008
Learn more on how improving the efficiency of software inventory and license management processes can provide you with a host of benefits, including improved IT governance through stronger software compliance standards and processes, automated correlation of relevant software products within an organization’s infrastructure to their respective licenses, and reduced costs in the areas of license procurement, use rights and software purchases.
Tags : 
    
CA ITAM
Published By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : 
ca mainframe, mainframe, compliance
    
CA Mainframe
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organizationís infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 26, 2016
Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.
Tags : 
    
CA Technologies
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com