compliance management

Results 101 - 125 of 462Sort Results By: Published Date | Title | Company Name
By: OracleSMB     Published Date: Jan 04, 2018
Compliance and risk management issues affect small and medium-sized businesses. They are not just a concern for larger, public companies, but smaller companies have fewer resources to deal with the regulatory demands that affect them. Instead of hiring expensive external resources to ensure compliance, invest in financial compliance cloud technology to continuously monitor and provide feedback on your compliance efforts. It will lower long-term costs, improve collaboration, and increase confidence in data security and financial reports.
Tags : 
     OracleSMB
By: TIBCO Software     Published Date: Aug 13, 2018
The combination of legislation, market dynamics, and increasingly sophisticated risk management strategies requires you to be proactive in detecting risks like fraud quicker and more effectively. Dynamic detection systems need to adapt to evolving compliance regulations, scale to deal with growing transaction volumes, detect sophisticated risk specific patterns, and reduce false-positives. TIBCO's Risk Management Accelerator uses a combination of predictive analytics, streaming analytics, and business process management to deliver a powerful and cost-effective system for detecting anomalies. Download this solution brief to learn more.
Tags : 
     TIBCO Software
By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
The growing need for data governance, risk and compliance, data analysis and data value still drives strategic requirements in metadata management and the growth of its solutions. Data and analytics leaders can use this vendor evaluation to find the most appropriate solution for their organization.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
     Group M_IBM Q2'19
By: NAVEX Global     Published Date: May 13, 2014
A four step third party risk assessment provides understanding on where to focus energy and develop a plan.
Tags : third party risk, compliance, risk management
     NAVEX Global
By: Mimecast ABM Q4     Published Date: Nov 22, 2017
Mimecast Cloud Archive has long set the industry standard for enterprise information archiving, helping to keep corporate knowledge available, protecting and preserving it while simplifying management and administration. By aggregating data across multiple platforms, organizations gain long-term business insights and create a secure, digital corporate memory while at the same time reducing costs and risks for legal and compliance teams. IT teams can reduce administrative overhead with streamlined management and simplified data recovery. Anytime, anywhere access to archive data improves employee productivity and efficient workflow efficiency. Customers can rest assured that their data is always-available, always-replicated and always-safe.
Tags : datenarchivierung, verantwortlich, eigentlich, organisation, it-mitarbeitern, wissensarbeiter, fuhrungsebene
     Mimecast ABM Q4
By: Epicor     Published Date: Apr 01, 2009
This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.
Tags : epicor, grc, governance risk and compliance, supply chain visibility, erp solutions, expense management, data auditing, it management, enterprise applications
     Epicor
By: Blue Lane     Published Date: Apr 03, 2007
Find out how Blue Lane's unique approach can help health care IT pros quickly secure hard to patch servers.
Tags : ips, intrusion, patching, vulnerability, regulations, fda, security, hipaa, healthcare, blue lane, patchpoint, compliance, intrusion prevention, hipaa compliance, vulnerability management, patch management
     Blue Lane
By: NetIQ     Published Date: Oct 25, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : security, compliance, it security, sustainable compliance, security management, it management, business technology
     NetIQ
By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper for an in-depth look at how enterprises view compliance over
Tags : security compliance, user access management, it management, business technology
     NetIQ
By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper and learn about the risks of cloud computing, how you can control those risks and a few things to keep in mind when selecting a vendor for your cloud solutions.
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks, business technology
     NetIQ
By: NetIQ     Published Date: Nov 01, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture.
Tags : security intelligence, compliance, log management, user activity monitoring, security, business technology
     NetIQ
By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless, microsoft, windows, registry keys, windows registry, windows processes, windows services, agent, desktop management, windows registry, asset discovery, asset management, asset inventory
     Promisec
By: Infoblox     Published Date: Nov 07, 2013
Failure to meet compliance can result in fines, dangerous network exposure and damage to a companyís reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Tags : infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri, spm, acm, switch_port_manager, automation_change_manager, change_and_configuration, compliance_manager, network_compliance, network_complexity, multi-vendor_network, network_change_configuration, network_discovery, it management
     Infoblox
By: Workday     Published Date: Oct 11, 2018
Before Workday, Panera Breadís payroll processes were manual, inefficient, and error-prone, and payroll nightmares and compliance risks were a regular occurrence. Complex systems and costly integrations made it impossible for the company to keep up with its rapid growth or gain valuable insights into global labor expenses. See the infographic to learn why unifying HR, payroll, time tracking, and absence management in a single system allows Panera to use one consistent, flexible, and scalable system across the U.S. and Canada.
Tags : 
     Workday
By: uberVU via HootSuite     Published Date: Jan 17, 2014
Customers now expect the same level of service on social media from financial firms, insurance providers, and other regulated enterprises as they receive from technology and retail companies. But without the right compliance controls in place, your organization could violate customer privacy rules and other regulatory guidelines. Are you taking the right steps to ensure compliance?
Tags : compliance, social media, social media management, enterprise, hootsuite
     uberVU via HootSuite
By: Oracle     Published Date: Nov 06, 2012
An Evolutionary Approach to Risk Management Transformation Strategies
Tags : oracle, compliance, risk management, banking, enterprise-wide framework, business technology
     Oracle
By: Oracle     Published Date: Nov 06, 2012
An Evolutionary Approach to Risk Management Transformation Strategies
Tags : oracle, compliance, risk management, banking, enterprise-wide framework
     Oracle
By: Brainshark     Published Date: Nov 05, 2013
Employees today are challenged to keep up with rapidly changing technologies and information. Discover the benefits of just-in-time learning and learning on-the-go in this video, and find out how your organization can help employees learn anywhere, anytime and on any device.
Tags : on-demand training, training, training costs, onboarding, new hires, compliance training, sales training, channel partner, reseller, product training, product demos, licensing, certification, powerpoint, presentation, training video, partner training, learning management system, lms, corporate learning
     Brainshark
By: ZirMed     Published Date: Feb 05, 2013
This white paper examines the issues and risks surrounding compliance and reimbursement, and how a management tool can help you avoid them.
Tags : compliance, medicare, medicare, reimbursement, claims management, claims, coding
     ZirMed
By: Optis     Published Date: Nov 06, 2014
What you donít know could hurt you. From short-term family leave that only Vermont offers to leave that 25 states offer for victims of crime and violence, the land of unusual leaves is full of potential pitfalls and hazards for HR.
Tags : leave, leave management, employee leave, paid leave, unpaid leave, state leave, fmla, state fmla, time off, leave compliance, federal leave laws, leave management solution, leave management system, cloud-based leave management system, leavexpertģ
     Optis
By: Optis     Published Date: Nov 06, 2014
If you donít know the diverse landscape of personal and family leaves that states allow, you run the risk ó and could face the potential consequences ó of noncompliance, reduced productivity, and employee disengagement.
Tags : leave, leave management, employee leave, paid leave, unpaid leave, state leave, fmla, state fmla, time off, leave compliance, federal leave laws, leave management solution, leave management system, cloud-based leave management, cloud-based leave management system, leavexpertģ
     Optis
By: NAVEX Global     Published Date: Sep 05, 2013
The data from your ethics and compliance helpline should be benchmarked against comparable organizations to assess program health and make improvements such as implementing policies, training employees, and conducting investigations. Learn everything you need to know about benchmarking your helpline data in our toolkit.
Tags : incident, hotline, helpline, ethics, compliance, whistleblower, data, analysis, benchmark, report, risk, assessment, board, investigation, training, policy, case, management
     NAVEX Global
By: Imprivata     Published Date: Sep 23, 2014
The Imprivata 2014 Desktop Virtualization Trends in Healthcare report is the companyís fourth-annual study to identify desktop virtualization adoption trends in healthcare.
Tags : imprivata, desktop virtualization, healthcare, trends, us healthcare industry, hipaa, phi, sso, single sign on, mobile workforce, compliance regulations, access management solutions
     Imprivata
By: OpenText GXS     Published Date: Apr 21, 2014
This white paper explains the role local tax compliance plays in successful supply chain management and e-business initiatives more broadly and how leading global brands and governments are addressing this need.
Tags : gxs, opentext, e-invoicing, invoicing, electronic invoicing, e-signatures, accounts payable, paper invoices
     OpenText GXS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com