fp

Results 26 - 50 of 192Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: Vena Solutions     Published Date: Oct 29, 2018
As digitization drives business at ever-faster speeds, CFOs recognize the need to keep pace. They understand the importance of financial planning and analysis (FP&A) solutions that allow their finance teams to develop budgets and forecasts quickly and accurately. They need confidence in their numbers and the decisions they drive. But selecting the right FP&A software is only half the battle.
Tags : fp&a software, fp&a, financial planning and analysis, fp&a solutions, financial planning, financial analysis, fp&a process, fp&a implementation, finance software implementation, financial software implementation, enterprise financial software, financial systems, vena solutions
     Vena Solutions
By: Vena Solutions     Published Date: Oct 29, 2018
Even after more than 30 years, it's easy to see why Excel remains so popular. It's flexible, powerful and irreplaceable - especially in finance and accounting. But how well does it work in FP&A today? That's the question that Vena and the Association of Finance Professionals set out to answer in this objective research-based guide, Making Excel Work for FP&A. From taking advantage of Excel's full feature set, to adopting FP&A software built around Excel, there's no shortage of ways to get the most out of Excel for your FP&A needs.
Tags : making excel work for fp&a, excel evolution, excel for finance, spreadsheet software, microsoft excel, power bi, financial planning and analysis, cpm, cpm systems, corporate performance management, data analytics, power pivot, microsoft office 365
     Vena Solutions
By: Vena Solutions     Published Date: Oct 29, 2018
Discover how Vena’s partnership with Sage Intacct brings together the leader in FP&A software satisfaction and ease-of-use with the innovation and customer satisfaction leader in cloud financial management solutions.
Tags : microsoft dynamics, erp, erp systems, erp integration, reduced budget cycle, annual budget cycle, excel templates, gl templates, erp templates, excel templates, dynamics
     Vena Solutions
By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
     Proofpoint
By: Proofpoint     Published Date: Aug 21, 2017
Après des années de négociations, le règlement général sur la protection des données (RGPD) de l'Union européenne prendra effet le 25 mai 2018. Il abrogera la directive européenne relative à la protection des personnes physiques à l'égard du traitement des données à caractère personnel, vieille de 22 ans.
Tags : personne concernée, données à caractère personnel, responsable du traitement, sous-traitant, violation de données
     Proofpoint
By: Proofpoint     Published Date: Aug 21, 2017
Nach langjährigen Verhandlungen wird die Datenschutz Grundverordnung der Europäischen Union am 25. Mai 2018 in Kraft treten und die 22 Jahre alte EU-Datenschutzrichtlinie ersetzen. Hauptziel der neuen Verordnung ist es, den EU-Bürgern die Kontrolle über ihre personenbezogenen Daten zu geben. Sie reguliert, wie ihre Daten erfasst, verarbeitet, gespeichert, gelöscht und verwendet werden dürfen. Alle (lokalen und internationalen) Unternehmen, die in Europa geschäftlich tätig sind und personenbezogene Daten von EU-Bürgern verarbeiten, müssen diese neuen Regelungen einhalten.
Tags : datensubjekt, personenbezogene daten, datenverantwortlicher, datenverarbeiter, datenschutzverletzung
     Proofpoint
By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirés, utilisent des outils automatisés pour puiser des informations sur leurs cibles dans les profils — souvent publics — disponibles sur les médias sociaux. Ils savent donc où vous travaillez. De même, le poste que vous occupez, vos centres d'intérêt, vos loisirs, votre situation matrimoniale ou encore vos précédents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour élaborer des messages convaincants qui vous incitent à cliquer sur une pièce jointe ou une URL malveillante. Si vous tombez dans le piège, une charge active malveillante est injectée dans votre système.
Tags : phishing, malware, des individus pris pour cible
     Proofpoint
By: Proofpoint     Published Date: Aug 21, 2017
Angreifer gehen heute kreativ vor und nutzen automatisierte Tools, um in Profilen bei sozialen Netzwerken (die häufig öffentlich zugänglich sind) nach Informationen über ihre Opfer zu suchen. Die Angreifer wissen daher, wo Sie arbeiten (und in welcher Position), ob Sie verheiratet sind und wo Sie in der Vergangenheit gearbeitet haben. Sie kennen Ihre Interessen, Hobbys und viele weitere Details. All diese Informationen werden zum Verfassen äußerst überzeugender E-Mail-Nachrichten verwendet, die Sie zum Klicken auf eine schädliche URL oder angehängte Datei verleiten sollen. Und sobald Sie geklickt haben, werden die Schaddaten auf Ihrem System abgelegt.
Tags : phishing, malware, bec, angriffe zielen auf menschen ab, für sicherheitsteams
     Proofpoint
By: Proofpoint     Published Date: Aug 21, 2017
Tomber dans le piège tendu par un imposteur est plus facile qu'il n'y paraît. Imaginez le scénario suivant : vous travaillez pour une importante société qui a récemment procédé à plusieurs acquisitions. Votre travail consiste à régler les factures. Un matin, vous recevez un message de votre PDG actuellement en déplacement. Il vous demande de virer des fonds afin de pouvoir entamer les négociations de rachat d'une nouvelle entreprise et vous exhorte de garder l'information pour vous jusqu'à la conclusion de l'accord.
Tags : directeur opérationnel, directeur financier, ressources humaines, service financier, gestion des salaires
     Proofpoint
By: Proofpoint     Published Date: Aug 21, 2017
Bei BEC-Attacken werden häufig CFOs oder Mitarbeiter der Personal- bzw. Finanzabteilung oder der Lohnbuchhaltung gezielt angegriffen. Mit einer als „Spoofing“ bezeichneten Methode werden die Opfer getäuscht und davon überzeugt, dass die erhaltene E-Mail von ihrem Vorgesetzten, einem Kollegen, einem Lieferanten oder einem Geschäftspartner stammt. Der Betrüger fordert den Empfänger zur Tätigung einer Überweisung oder zur Weitergabe von Steuerunterlagen oder anderer vertraulicher Daten auf.
Tags : geschäftsführer, chief financial officer, personalabteilung, finanzabteilung, lohnbuchhaltung
     Proofpoint
By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
     CAST
By: Anaplan     Published Date: Mar 05, 2015
FP&A is a crucial component of the CFO’s job, but it is often frustratingly ineffective. As a result, many organisations use the data produced by finance only for compliance; their strategic decision making remains uninfluenced by it. However, the emergence of sophisticated software solutions has created new opportunities for CFOs to turn FP&A into the strategic exercise it ought to be.
Tags : consolidation, planning, survey, performance, sales, audience, finance, strategic exercise, compliance, software soliutions, knowledge management, business technology
     Anaplan
By: Quick Base     Published Date: Dec 18, 2017
Spreadsheets are good for number crunching – but many professionals use them to do things they were never meant for. The result? Long office hours, chasing down status updates, and compiling data manually. Learn the 5 signs of spreadsheet misuse and how to overcome them in this webcast.
Tags : audit, insights, accounting, ap management, compliance, finance, spreadsheets, collaboration, reporting, forecasting, excel, customizable, ar management, fp&a, procurement
     Quick Base
By: Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
     Schneider Electric
By: Aerohive     Published Date: Jun 15, 2015
Dieses Dokument enthält Ratschläge für die Bewertung eines WiFi-Netzes im Unternehmen und analysiert die wichtigsten Anforderungen, architekturbezogene Erwägungen, 10 Sachen, die ein WiFi-Netz imstande zu tun sein muss, und benutzt das RFP Verfahren, um einen Zulieferer auszuwählen.
Tags : wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks
     Aerohive
By: Adaptive Planning     Published Date: Feb 07, 2011
With the 2011 budgeting cycle behind us, it's the perfect time to re-evaluate whether you're getting as much as you can out of your budgeting, forecasting, monthly reporting, and what-if analysis. Are your processes integrated, aligned, and collaborative? Do they help your company drive revenue and outperform your competition?
Tags : adaptive planning, adaptive, budgeting cycle, fp&a, forecasting, budgeting, finance, budget, reporting, analysis
     Adaptive Planning
By: Adaptive Planning     Published Date: Apr 18, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A in 2011.
Tags : fp&a, adaptive planning, insurance, loss and seating ratio, amortization of premiums, budgeting, forecasting, revenue stream
     Adaptive Planning
By: Adaptive Planning     Published Date: Apr 18, 2011
Register to view an informative webinar and learn how easy it can be to create exceptional value through FP&A in 2011.
Tags : adaptive planning, fp&a processes, higher education, nonprofits, strategic value, performance management, cross-fund reports, revenue reporting
     Adaptive Planning
By: Adaptive Planning     Published Date: Apr 18, 2011
This webinar features real-world case studies from software companies that have fundamentally transformed their planning and reporting.
Tags : adaptive planning, fp&a, software companies, planning, reporting, strategic value, performance evaluation, monthly variance report, company strategy, revenue growth
     Adaptive Planning
By: Adaptive Planning     Published Date: Apr 18, 2011
View this webinar to hear case studies describing how leading healthcare firms have been able to move beyond Excel and save time, enhance collaboration, and improve business decisions -- ultimately resulting in higher revenues and profits.
Tags : fp&a, adaptive planning, healthcare, collaboration, strategic value, staff planning, revenue reporting, metrics management
     Adaptive Planning
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com