compliance management

Results 326 - 350 of 463Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Feb 04, 2014
A strong customer orientation is an essential element to remain competitive in this environment, and Smarter Commerce, an approach developed by IBM to put the customer at the heart of business models, can help banks be more competitive.
Tags : ibm, frost and sullivan, smarter customers, smarter commerce, innovations, banking industry, tips on banking, banking environment, banking industry, compliance burdens, risk management, integration, operational efficiency, regulatory compliance, optimize financial returns
     IBM
By: Lenovo and Intel®     Published Date: Nov 03, 2017
Internet of Things. Cloud. Augmented reality. Virtual reality. Technologies like these are changing the face of all industries, across manufacturing, financial services, healthcare, education, agriculture, logistics, and more. These transformative technologies define new paradigms of business productivity, customer centricity, and quality & compliance management. This infographic features the opportunities these technologies can o er as they begin incorporating them into their business models. Download the infographic now.
Tags : 
     Lenovo and Intel®
By: IBM     Published Date: Nov 19, 2014
According to a recent survey by the Compliance, Governance and Oversight Council, almost 70% of the electronic content and information organizations retain has no business or legal value. It’s simply digital detritus, retained because 1) we think we might need it sometime, 2) we forget about it, or 3) we don’t have policies and software in place to get rid of it. Ultimately, though, this unnecessary accumulation of content can create real problems in terms of e-discovery, regulation, management and cost. Watch this video white paper to learn more about: - How to get started on an information management strategy - The right combination of software and policy for successful information governance - The business case for proactive management of an organization’s digital footprint
Tags : compliance, governance, oversight, digital debris, data cleanup, legacy data cleanup, information management, information management strategy, information governance
     IBM
By: IBM     Published Date: Jun 22, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : ibm, compliance requirements, quality management tools, quality management, best practices, software development, it management, knowledge management, data management
     IBM
By: Sophos     Published Date: Jul 15, 2013
This MDM buyers guide will walk you through the process of selecting the right mobile device management solution that fits your company’s BYOD objectives. It explains how an effective MDM system can support an organization's workforce mobility strategy, ensure compliance, and provide central management of devices and apps while supporting easy administration.
Tags : sophos, byod, buyers guide, mobile device management, mobile device, android, windows 8, mobile, security, data protection
     Sophos
By: Cisco     Published Date: Jan 05, 2016
As software continues to ‘eat the world’ in today’s app economy, companies need to adapt to changing business models, globalization, and increasing regulatory compliance. Under pressure to support strategic business objectives, IT is rapidly embracing cloud technologies. Cloud adoption has steadily gained acceptance because it promises to help you achieve your business goals faster, more efficiently, and more cost effectively. Cisco Metapod™ is an excellent solution to some of your organization’s biggest business and technology challenges. This infrastructure-as-a-service (IaaS) offer delivers a reliable and programmable infrastructure for your application development and operation teams while providing a public cloud experience behind your firewall, on your premises, and with full remote management.
Tags : 
     Cisco
By: Cisco     Published Date: Apr 15, 2016
As software continues to ‘eat the world’ in today’s app economy, companies need to adapt to changing business models, globalization, and increasing regulatory compliance. Under pressure to support strategic business objectives, IT is rapidly embracing cloud technologies. Cloud adoption has steadily gained acceptance because it promises to help you achieve your business goals faster, more efficiently, and more cost effectively. Cisco Metapod™ is an excellent solution to some of your organization’s biggest business and technology challenges. This infrastructure-as-a-service (IaaS) offer delivers a reliable and programmable infrastructure for your application development and operation teams while providing a public cloud experience behind your firewall, on your premises, and with full remote management.
Tags : cloud management, cloud services, cloud management, it infrastructure, cloud application
     Cisco
By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution
     Q1 Labs
By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
     Q1 Labs
By: Brainshark     Published Date: Oct 16, 2013
Companies are using both formal and informal learning to educate new and existing employees. However, decreasing the cost of training and increasing employee knowledge retention are challenges for many organizations without the proper resources. In this E-book, discover how businesses have used Brainshark to successfully produce content up to five times faster, boost employee retention and participation rates, and increase compliance.
Tags : on-demand training, training, training costs, onboarding, new hires, compliance training, sales training, channel partner, reseller, product training, product demos, licensing, certification, powerpoint, presentation, training video, partner training, learning management system, lms, corporate learning
     Brainshark
By: Brainshark     Published Date: Oct 16, 2013
"Getting employees to understand and take advantage of benefits during open enrollment periods is big challenge for many HR managers. This paper looks for new ideas on communicating benefit plans from professional marketers, knowledge management experts, and social media gurus."
Tags : human resources, training, compliance, onboarding, new hire, orientation, open enrollment, employee benefits, certification, corporate learning, lms, learning management system, tracking, communications, employee satisfaction
     Brainshark
By: Cisco     Published Date: Aug 18, 2014
IT can be one of the biggest concerns for businesses today. Security, compliance, enablement, cost control and scalability must all be considered. Additionally, with insurgent trends such as mobility changing the face of business, choosing a partner who is able to consultatively deliver multiple services and solutions is increasingly important. We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Fill in your details to the right to download your free white paper and learn how we have become the key supplier of converged technology and services in this space.
Tags : ucs, scope, cisco, security, compliance, servers, data, innovative, data center, architecture, performance, processors, blade, equipment
     Cisco
By: Riverbed     Published Date: Apr 03, 2014
This book introduces you to application performance management (APM) solutions and how these tools can help you monitor and troubleshoot your mission-critical applications — from the perspective of your users, as well as your systems.
Tags : riverbed, application performance management, apm, service management, compliance, performance management
     Riverbed
By: Riverbed     Published Date: Apr 03, 2014
The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them.
Tags : riverbed, npm, network performance management, performance management, network management, networking, performance tools, security, compliance, service management
     Riverbed
By: HP     Published Date: Apr 13, 2014
Read the Lufthansa customer case study and learn how a Quality Center SaaS model enabled the airline to cut IT cost while providing 24 hour a day service.
Tags : compliance, cost-efficiency, hp quality center, it-governance, software as a service (saas), software development, software quality assurance, test management, alm, application lifecycle management, it management, enterprise applications
     HP
By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: AlienVault     Published Date: Nov 10, 2015
Implement and maintain PCI DSS compliance at your organization
Tags : operations, structure, compliance, security, management, data
     AlienVault
By: AlienVault     Published Date: Nov 10, 2015
Simplifying PCI DSS Compliance.
Tags : compliance, data, security, structure, management
     AlienVault
By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing, email opt out management, email acquisition, affiliate email marketing, b2b scrubbing, can spam compliance
     UnsubCentral
By: DocuSign     Published Date: Mar 23, 2016
This whitepaper examines these pain points and suggests how a proven DTM solution such as DocuSign’s can work with an enterprise-grade productivity platform like Microsoft Office 365 to address your pain points, mitigate risk, and strengthen your competitive advantage.
Tags : 
     DocuSign
By: DocuSign     Published Date: Mar 23, 2016
A recent survey of IT professionals by IDG Research shows that companies are struggling to keep their processes and documents in compliance with frequently changing — and often conflicting — regulatory standards.
Tags : 
     DocuSign
By: IBM     Published Date: Feb 11, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : quality management approaches, compliance requirements, health sector, regulatory requirements, risk management, knowledge management, enterprise applications
     IBM
By: NAVEX Global     Published Date: Dec 22, 2017
An effective third-party risk management programme is in your best interest. Not only can you more confidently engage with a growing network of vendors, suppliers, resellers and distributors; but when done effectively, you can have a positive impact on the effectiveness and efficiency of your broad ethics and compliance programme. NAVEX Global research has shown that organisations pursue strong ethics and compliance programmes for myriad reasons, but at the top is a desire to cultivate and maintain a culture of ethics and respect. A strong third-party risk management solution helps organisations realise that objective through engaging with third parties that abide by codes of conduct, that are transparent and communicative and that you can be proud to do business with.
Tags : third party risk management, third party risk, managing third parties, risk management, anti-bribery programme, compliance programme
     NAVEX Global
By: NAVEX Global     Published Date: Dec 22, 2017
Ethics and compliance officers have many opportunities to leverage the data in their hotline and incident management systems to improve their compliance programmes— and their organisational culture of ethics and respect. This year’s benchmarks point to several opportunities to increase programme effectiveness. Hotline data that is carefully tracked, reviewed, benchmarked and presented with sufficient context often provides the early warning signs needed to detect, prevent and resolve problems. We at NAVEX Global hope that this report is helpful to your organisation and we welcome any feedback on these findings.
Tags : whistleblowing, hotline, whistleblowing hotline, hotline best practices, hotline benchmark data, whistleblower protection, whistleblowing programe
     NAVEX Global
By: AlienVault     Published Date: Mar 30, 2016
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
     AlienVault
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com