compliance management

Results 151 - 175 of 462Sort Results By: Published Date | Title | Company Name
By: Workterra     Published Date: Nov 10, 2017
Mid-market HR today is being asked to be a business partner in areas that range from compliance to employee engagement. They need to be able to connect the dots among various sources of employee data to deliver better-informed business decisions to help achieve strategic goals. Connecting those dots and delivering those results demands more HR firepower and greater data visibility than the manual or homegrown processes and systems often used by mid-market organizations can deliver. On the other hand, most mid-market companies aren’t ready for the intricacies or expense of human capital management (HCM) systems designed for enterprise-level organizations. The answer for forward-thinking HR leaders who want to boost their team’s capabilities and play a greater role in their company’s future is having core HR functionality designed into an integrated benefits administration solution. Automated HR that delivers core HR features as part of its architecture — not as an afterthought or a separate, stand-alone module — gives HR leaders: • The tools they need to better handle their administrative work • The data and analytics necessary to better coordinate programs and more confidently make strategic decisions • A user experience that makes life easier for HR and employees
Tags : 
     Workterra
By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
     Kronos
By: VMware     Published Date: Sep 06, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : vmware, vmware horizon, mobile, cloud
     VMware
By: Riverbed     Published Date: Feb 26, 2015
In this report, we'll look at the challenges that businesses are facing when it comes to understanding network and application performance, and how the lack of network information can lead to bad performance, low user satisfaction, compliance issues and costly downtime.
Tags : automation, network performance, application performance, compliance issues, network management, automated configuration, modern enterprise
     Riverbed
By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : trigeo network security, payment card industry (pci), data security standard (dss), networking, security
     TriGeo Network Security
By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance, proactive network security, security, data management
     TriGeo Network Security
By: Aldon     Published Date: Jan 13, 2009
Learn what this regulation expects of IT and how to avoid the risk of expensive fines.
Tags : aldon, sox, sarbanes-oxley act compliance, sox responsibilities, automated change management, it management, enterprise applications
     Aldon
By: Aldon     Published Date: Jan 13, 2009
Automate compliance to reduce bureaucracy and boost efficiency.
Tags : aldon, application lifecycle management, alm, automate compliance, reduce bureaucracy, enterprise applications
     Aldon
By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security, it management
     EMC Corporation
By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats, security
     Skillsoft
By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
     Skillsoft
By: Attachmate     Published Date: Mar 20, 2013
Traditional fraud detection methods, such as application logging, can’t address the scale and sophistication of today’s threats. Find out how to get the visibility you need to better and manage enterprise risk with Luminet.
Tags : luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management, fraud management, fraud management tools, fraud detection software, enterprise risk management, attachmate luminet, compliance audit, failed compliance audit
     Attachmate
By: Attachmate     Published Date: Mar 20, 2013
Insider threats continue to challenge organizations, particularly as BYOD brings complexity to enterprise risk management. The latest Ponemon research highlights recent trends, risk factors and what organizations need to do now to reduce risk.
Tags : luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management, fraud management, fraud management tools, fraud detection software, enterprise risk management, attachmate luminet, compliance audit, failed compliance audit, security, storage, data management, business technology
     Attachmate
By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence, security, it management, data management, business technology, data center
     McAfee
By: McAfee     Published Date: Jan 23, 2013
Information security based on regulatory compliance stipulations cannot keep up with today’s sophisticated and rapidly changing threat landscape. CISOs need to implement a new discipline that ESG calls, “Real-time Risk Management."
Tags : enterprise strategy group, esg, jon oltsik, real-time risk management, threats and vulnerabilities, security, it management, data management, business technology
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor, mcafee enterprise security manager
     McAfee
By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
     McAfee
By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance, database activity monitoring, database vulnerability management, pci audit
     McAfee
By: McAfee     Published Date: Mar 08, 2013
With McAfee® Database Security, achieving protection and compliance is easier than you might think.
Tags : database security, database audit, database compliance, cert, database security policy, database vulnerability management, database virtual patching, database activity monitoring
     McAfee
By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
     McAfee
By: McAfee     Published Date: Mar 08, 2013
McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.
Tags : database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting
     McAfee
By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
     McAfee
By: McAfee     Published Date: Oct 28, 2014
Compliance and financial risk used to be the driving concerns for security and risk management. Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : security connected framework, big security data, big data, log management, siem, security
     McAfee
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance, security
     McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com