compliance management

Results 101 - 125 of 469Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 10, 2016
Today’s Digital Business needs a strategy for business content – one that spans the creation, capture, activation and analysis of it – which assures security, compliance with regulations, and minimizes risk. This session will confront content chaos and its impact on business agility. We will share stories from IBM customers who are using business content solutions to deliver on the promise of the Digital Business today. Many are using ECM Centers of Competency to bring together all stakeholders in the business to create a unified vision for information management across all departments and all forms of data and content, whether on-premises, mobile, or in the cloud.
Tags : 
ibm, analytics, ecm, digital business
    
IBM
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Public clouds have fundamentally changed the way organizations build, operate, and manage applications. Security for applications in the cloud is composed of hundreds of configuration parameters and is vastly different from security in traditional data centers. According to Gartner, “Through 2020, at least 95% of cloud breaches will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”1. The uniqueness of cloud requires that security teams rethink classic security concepts and adopt approaches that address serverless, dynamic, and distributed cloud infrastructure. This includes rethinking security practices across asset management, compliance, change management, issue investigation, and incident response, as well as training and education. We interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. In this e-book, we will share the top
Tags : 
    
CloudHealth by VMware
Published By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: OracleSMB     Published Date: Jan 04, 2018
Compliance and risk management issues affect small and medium-sized businesses. They are not just a concern for larger, public companies, but smaller companies have fewer resources to deal with the regulatory demands that affect them. Instead of hiring expensive external resources to ensure compliance, invest in financial compliance cloud technology to continuously monitor and provide feedback on your compliance efforts. It will lower long-term costs, improve collaboration, and increase confidence in data security and financial reports.
Tags : 
    
OracleSMB
Published By: TIBCO Software     Published Date: Aug 13, 2018
The combination of legislation, market dynamics, and increasingly sophisticated risk management strategies requires you to be proactive in detecting risks like fraud quicker and more effectively. Dynamic detection systems need to adapt to evolving compliance regulations, scale to deal with growing transaction volumes, detect sophisticated risk specific patterns, and reduce false-positives. TIBCO's Risk Management Accelerator uses a combination of predictive analytics, streaming analytics, and business process management to deliver a powerful and cost-effective system for detecting anomalies. Download this solution brief to learn more.
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
The growing need for data governance, risk and compliance, data analysis and data value still drives strategic requirements in metadata management and the growth of its solutions. Data and analytics leaders can use this vendor evaluation to find the most appropriate solution for their organization.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: NAVEX Global     Published Date: May 13, 2014
A four step third party risk assessment provides understanding on where to focus energy and develop a plan.
Tags : 
third party risk, compliance, risk management
    
NAVEX Global
Published By: Flexential     Published Date: Oct 11, 2019
Enterprises that put all of their workloads into a single infrastructure solution such as public clouds are realizing there are limitations. As requirements around security, compliance and cost management grow, businesses are “boomeranging” back to hybrid IT models.
Tags : 
    
Flexential
Published By: Mimecast ABM Q4     Published Date: Nov 22, 2017
Mimecast Cloud Archive has long set the industry standard for enterprise information archiving, helping to keep corporate knowledge available, protecting and preserving it while simplifying management and administration. By aggregating data across multiple platforms, organizations gain long-term business insights and create a secure, digital corporate memory while at the same time reducing costs and risks for legal and compliance teams. IT teams can reduce administrative overhead with streamlined management and simplified data recovery. Anytime, anywhere access to archive data improves employee productivity and efficient workflow efficiency. Customers can rest assured that their data is always-available, always-replicated and always-safe.
Tags : 
datenarchivierung, verantwortlich, eigentlich, organisation, it-mitarbeitern, wissensarbeiter, fuhrungsebene
    
Mimecast ABM Q4
Published By: Epicor     Published Date: Apr 01, 2009
This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.
Tags : 
epicor, grc, governance risk and compliance, supply chain visibility, erp solutions, expense management, data auditing
    
Epicor
Published By: Blue Lane     Published Date: Apr 03, 2007
Find out how Blue Lane's unique approach can help health care IT pros quickly secure hard to patch servers.
Tags : 
ips, intrusion, patching, vulnerability, regulations, fda, security, hipaa
    
Blue Lane
Published By: NetIQ     Published Date: Oct 25, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
security, compliance, it security, sustainable compliance, security management
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper for an in-depth look at how enterprises view compliance over
Tags : 
security compliance, user access management
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper and learn about the risks of cloud computing, how you can control those risks and a few things to keep in mind when selecting a vendor for your cloud solutions.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture.
Tags : 
security intelligence, compliance, log management, user activity monitoring
    
NetIQ
Published By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : 
endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless
    
Promisec
Published By: Infoblox     Published Date: Nov 07, 2013
Failure to meet compliance can result in fines, dangerous network exposure and damage to a company’s reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Tags : 
infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri
    
Infoblox
Published By: Workday     Published Date: Oct 11, 2018
Before Workday, Panera Bread’s payroll processes were manual, inefficient, and error-prone, and payroll nightmares and compliance risks were a regular occurrence. Complex systems and costly integrations made it impossible for the company to keep up with its rapid growth or gain valuable insights into global labor expenses. See the infographic to learn why unifying HR, payroll, time tracking, and absence management in a single system allows Panera to use one consistent, flexible, and scalable system across the U.S. and Canada.
Tags : 
    
Workday
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Customers now expect the same level of service on social media from financial firms, insurance providers, and other regulated enterprises as they receive from technology and retail companies. But without the right compliance controls in place, your organization could violate customer privacy rules and other regulatory guidelines. Are you taking the right steps to ensure compliance?
Tags : 
compliance, social media, social media management, enterprise, hootsuite
    
uberVU via HootSuite
Published By: Oracle     Published Date: Nov 06, 2012
An Evolutionary Approach to Risk Management Transformation Strategies
Tags : 
oracle, compliance, risk management, banking, enterprise-wide framework
    
Oracle
Published By: Oracle     Published Date: Nov 06, 2012
An Evolutionary Approach to Risk Management Transformation Strategies
Tags : 
oracle, compliance, risk management, banking, enterprise-wide framework
    
Oracle
Published By: Brainshark     Published Date: Nov 05, 2013
Employees today are challenged to keep up with rapidly changing technologies and information. Discover the benefits of just-in-time learning and learning on-the-go in this video, and find out how your organization can help employees learn anywhere, anytime and on any device.
Tags : 
on-demand training, training, training costs, onboarding, new hires, compliance training, sales training, channel partner
    
Brainshark
Published By: ZirMed     Published Date: Feb 05, 2013
This white paper examines the issues and risks surrounding compliance and reimbursement, and how a management tool can help you avoid them.
Tags : 
compliance, medicare, medicare, reimbursement, claims management, claims, coding
    
ZirMed
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.