financial control

Results 51 - 75 of 75Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 24, 2013
Learn how automating 'Last Mile of Finance' processes can help CFOs and their finance teams meet expanded reporting requirements--including XBRL tagging.
Tags : 
ibm, cognos disclosure management, business intelligence, data collection, last mile of finance, account reconciliation, internal management, financial reporting, financial controls, financial workflow, regulatory reporting, applications, extensible business reporting language
    
IBM
Published By: Tripwire     Published Date: Jul 05, 2007
Find out about the requirements and issues addressed in corporate governance Bill 198, Canada's version of Sarbanes-Oxley, for internal controls for technology and how IT configuration auditing brings compliance.
Tags : 
sox, sarbanes-oxley, bill 198, canada, canadian financial, canadian sox, financial controls, compliance, compliant, tripwire
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.
Tags : 
tripwire, glba, compliance, managers, officers, directors, financial, institutions, safeguard, gramm leach bliley act, organization, solution, control, data automated, configuration, system, regulation, banking, administration, ncua
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Understand the compliance requirements of the European Union's Markets in Financial Instruments Directive (MiFiD), and how controlling IT change addresses many of those requirements.
Tags : 
tripwire, mifid, compliance, requirements, europe, markets, european union, financial, instruments, institution, administration, control, address, directive, security, data, control, information, organization, change
    
Tripwire
Published By: IBM     Published Date: Nov 04, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud-prevention, cyber threat, security, emerging marketing, crm solutions/software, marketing research, trust and security
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud prevention, mitb, malware
    
IBM
Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network
    
Cisco
Published By: Business Software     Published Date: May 28, 2013
What is Financial Management Software? Financial management software solutions allow organizations to more effectively and accurately control and manage financial operations throughout the entire business – including across multiple companies, subsidiaries, divisions, countries, and sites. With powerful features and functionality, financial management systems dramatically streamline and enhance the way vital financial data is collected, processed, stored, accessed, and presented to users within, and beyond, the enterprise.
Tags : 
business software, divisions, financial management
    
Business Software
Published By: Oracle     Published Date: Feb 27, 2014
Finance is often first to adopt software solutions to automate business transactions and processes. Oracle Financials Cloud is a complete and integrated financial management solution. Businesses deploy Oracle Financials Cloud to help resolve pain points around control, compliance, and more.
Tags : 
oracle, erp, cloud, finance
    
Oracle
Published By: Preventsys     Published Date: Aug 21, 2009
Much has been written and discussed about Enterprise Risk Management (ERM) as it relates to compliance, corporate governance, financial controls and the Sarbanes-Oxley Act of 2002 (SOX). Until now, there was very little available to the risk manager on how to apply ERM to day-to-day operations.
Tags : 
sarbox, sox, sarbanes oxley, sarbanes-oxley, risk management, finance, compliance, regulatory compliance, security management, preventsys
    
Preventsys
Published By: Sigaba     Published Date: Aug 21, 2009
This paper presents the business case for secure messaging, which extends far beyond compliance issues. In fact, choices about when to implement secure messaging affect every aspect of banking.
Tags : 
financial, bank, access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
    
Sigaba
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic
    
Cenzic
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
The nature of corporate accounting and financial controls has forever been changed by Sarbanes-Oxley legislation. This white paper discusses the ripple effect of the Act on the IT outsourcing community and the new responsibilities and ethics that rest on companies, both public and private, that entrust all or part of their IT environment to an external third party.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan, infor, axapta, microsoft dynamics ax, fusion, outsourcing, governance, outsource, sarbox, sarbanes oxley, sarbanes-oxley, sox, sox compliance
    
OneNeck IT Services
Published By: Clickatell     Published Date: May 20, 2008
To attract and retain customers, financial institutions today must be able to provide customers with real-time, reliable information about their bank accounts and transactions, no matter where they are located. Anywhere access to actionable account information helps customers control their finances, fight fraud, and conduct their lives more efficiently.
Tags : 
clickatell, location based services, mobile marketing
    
Clickatell
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : 
aprimo, marketing process, financial control, digital asset management, data management
    
Aprimo, Inc.
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
Since the National Association of Insurance Commissioners (NAIC) made revisions to the Financial Reporting Model Regulation (Model Audit Rule) in June 2006, the insurance industry’s attention to the risks associated with financial reporting has been on the rise. Structured similarly to Section 404 of the Sarbanes‐Oxley Act, the Model Audit rule places a significant burden on C‐level executives to ensure their oversight in the internal controls for financial reporting (ICFR) process. Executives within these insurance organizations, both public and private, will be required to evaluate their internal controls in preparation for the first reports due in 2010 for the 2009 reporting period.
Tags : 
prodiance, sarbanes‐oxley act, security and integrity of data, analytics, risk assessment, optimization
    
Prodiance Corp.
Published By: Auditrax     Published Date: Jun 28, 2011
Benefits of Procurement Audits for Private Equity Firms & Portfolio Companies
Tags : 
accounts payable audit, cash flow, recovery audit, procurement audit, financial audit, audit, accounts payable, business solutions, private equity, controller, cfo
    
Auditrax
Published By: Intralinks     Published Date: Nov 23, 2015
Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection
    
Intralinks
Published By: IBM     Published Date: Jul 14, 2016
How are some companies decreasing audit fees in the face of pressure to increase them? In this follow-up report to the 2015 Audit Fee Survey, Financial Executives Research Foundation interviewed several senior-level financial executives and audit partners. These interviews revealed best practices in mitigating increases in audit fees and how to work more efficiently and effectively with auditors. Access this report to learn the reasons for increased audit fees and the impact of PCAOB inspections. You'll also discover how to review current audit focus areas, improve internal controls, automate processes, and review audit hours and fees.
Tags : 
best practices, audit, finance, efficiency, productivity
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : 
cloud reporting, business management, economic impact, forrester, consulting
    
IBM
Published By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : 
account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
    
DigiCert
Published By: Group M_IBM Q119     Published Date: Jan 17, 2019
Today, financial service companies are embracing hybrid cloud and its advantages, such as the ease of shifting production workloads and secure applications to public cloud environments. But, what is challenging is the complex regulatory landscape. 20,000 new regulatory requirements were created in 2016 alone. How can security pros ensure that controls for identity management, authentication and encryption work in both private and public clouds? Download this report for a closer look at the complexity of hybrid cloud security and 10 essential elements for compliant business operation.
Tags : 
    
Group M_IBM Q119
Published By: Unit4     Published Date: Feb 18, 2019
Are you under pressure from donors to improve transparency and accountability? Your non-profit can't maintain full financial control over your operations if you don't have access to the right insight. Discover the best methods for building trust with your donors, and key strategies for empowering greater financial control, transparency, and accountability.
Tags : 
    
Unit4
Start   Previous    1 2 3     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.