standard

Results 326 - 350 of 845Sort Results By: Published Date | Title | Company Name
By: FICO - APAC     Published Date: Sep 19, 2017
The world is swiftly moving towards global tax transparency, new pillars to set the standards dominate reporting and compliance procedures. However, in this transition, businesses might be struggling with complying with new and changing reporting standards, and the efficiencies achieved as a result of the change. But thankfully there is this one simple solution available that nails the complexities of two reporting standards – FATCA and CRS.
Tags : identification process, standard, unified verification, case management, reports, fico, tonebeller, fatca, crs
     FICO - APAC
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Much has been written about Payment Services Directive 2 (PSD2) and its potential to herald a new era of open banking where banks no longer have a monopoly on payment services. Instead they will be forced to provide full access to customer accounts to third parties looking to provide financial services of their own, on top of banks’ existing data and infrastructure. All of this could prove to be true, just not on January 13th 2018, the deadline for national governments to transpose PSD2 into law. This is because there is still so much to be decided and clarified. The European Banking Authority’s longawaited regulatory technical standards (RTS) on strong customer authentication (SCA) were issued in March 2017 but missing some of the finer details, such as the methods to remotely access customer data and account information and the measures around the use of application programming interfaces (APIs) and screen-scraping.
Tags : 
     CA Technologies EMEA
By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelCentral™ NetAuditor plays an important role in ensuring compliance with the PCI security standards. This document explains the part played by each of the SteelCentral NetAuditor solutions.
Tags : pci compliance, auditing, data security, cardholder data, security standards, security measures, security, data management, data center
     Riverbed
By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy
     Cherwell Software
By: ClickExpress     Published Date: May 01, 2013
Mobile Workforce Management solutions enable companies to deliver superior field service and customer satisfaction (see Part I, Setting The Stage For Best Practices Service Performance). However, a successful Mobile Workforce Management transformation is dependent upon many factors beyond simply deploying new technology. It requires a full understanding of the overall business objectives, a keen understanding of historical processes, a standard system of key performance metrics along with the organization’s current performance in those metrics, and effective communication to ensure organizational readiness and project execution.
Tags : mobile, management, workforce, technology, solutions, field service, customer satisfaction, management, organization
     ClickExpress
By: Raritan Inc.     Published Date: Mar 19, 2009
Learn what instrumentation helps calculate your data center power efficiency and how to set standards to align with the Green Grid.
Tags : raritan, power, processing, instrumentation, green, green computing, efficiency, power load, it equipment, pts, datacenter, cooling
     Raritan Inc.
By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
     VeriSign Incorp.
By: Entrust Datacard     Published Date: May 15, 2014
Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards
Tags : entrust, homeland security, frac, identification standards, first responder, security, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
Complying with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection Standards
Tags : entrust, nerc, cyber attacks, non compliance, security, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
Learn which solutions help agencies comply with U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) standards.
Tags : identity, authentication, first responders, u.s. homeland security, frac
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates.
Tags : foundation, extended validation, ssl, trust, ecommerce, cas, security, legitimate
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, business technology
     Entrust Datacard
By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : trigeo network security, payment card industry (pci), data security standard (dss), networking, security
     TriGeo Network Security
By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss, data security standard, data encryption, access controls, activity monitoring, logging, retail, merchants, cardholder data, security
     ArcSight
By: F5 Networks Inc     Published Date: Jul 08, 2009
By providing a unified Application Delivery Networking platform, F5 BIG-IP offers the ability for organizations to adopt a single platform for all its application delivery needs. Adopting an organizational standard for application delivery can reduce management and administrative costs and improve the ability of the organization to migrate smoothly from traditional to emerging application architectures, and address the unforeseen issues that always arise in the wake of the introduction of new initiatives.
Tags : network, application, delivery, big-ip, organization, platform, management, administrative, solution, adopt, find, search, wireless
     F5 Networks Inc
By: PC Mall     Published Date: Jan 24, 2012
For commercial real estate, paper is still a critical part of the sales process. At Mark Bottles Real Estate, their HP Officejet Pro 8600 Plus e-All-in-One delivers all the standard MPF services, as well as Wifi support and ePrint capabilities. Find our more in this case study!
Tags : real estate, office jet pro, 8600, hewlett-packard, plus e-all-in-one, mpf, eprint, print
     PC Mall
By: PC Mall     Published Date: Jan 31, 2012
"In a small business like ours, the IT director wears many hats and budgets are always tight. Standardizing on HP solutions streamlines management, enhances productivity and reduces environmental impact."
Tags : enterprise applications, data management
     PC Mall
By: PC Mall     Published Date: Mar 03, 2012
With impressive performance scalability, the HP ProLiant DL385 G7 and ProLiant BL465c G7 attained outstanding results for two-processor platforms on the two-tier SAP® Sales and Distribution (SD) standard application benchmark.
Tags : servers, server, hp servers, hp server, scalability, servers, giant, proliant
     PC Mall
By: PC Mall     Published Date: Mar 03, 2012
Two HP ProLiant four-processor servers have achieved outstanding performance results on the two-tier SAP® Sales and Distribution (SD) standard application benchmark with SAP enhancement package 4 for the SAP ERP application 6.0.
Tags : servers, server, hp servers, hp server, processors, amd
     PC Mall
By: CollabNet     Published Date: Jan 11, 2013
For most enterprises, effective management of Git is a challenge. Discover technical innovations and emerging best practices now provide additional options to manage Git in the enterprise.
Tags : git, enterprise, productivity, security, scalable, compliance
     CollabNet
By: Citrix Systems     Published Date: Nov 23, 2015
A practical path to automating application networks. SDN moves into the realm of the practical, as standards and interoperability ease efforts to automate networks.
Tags : citrix, networks, automation, applications, networking, storage, data management, business technology, data center
     Citrix Systems
By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
Download this white paper to understand how these changes create a need for new processes and systems to achieve compliance and drive the need for new and broader skills within financial and real estate personnel.
Tags : ibm, smarter buildings, lease accounting, finance, financial accounting, business
     IBM US Smarter Buildings
By: IBM - Tririga     Published Date: Dec 21, 2011
The Financial Accounting Standards Board (FASB) and the International Accounting Standards Board (IASB) are jointly working on a replacement for the current lease accounting standards. The paper discusses how to create an action plan to prepare for this replacement.
Tags : ibm, new lease, accounting, finance, fasb, iasb, business finance
     IBM - Tririga
By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats, security
     Skillsoft
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com