ompliance

Results 1 - 25 of 2014Sort Results By: Published Date | Title | Company Name
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : 
spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance, compliance, intrusion detection, 8e6, 8e6 technologies
    
8e6 Technologies
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Many companies claim to offer enterprise grade communications solutions. But how is “enterprise grade” measured and what should you look for? This fact-filled white paper outlines 8 ways to determine whether or not your provider is equipped to offer an enterprise-grade communications solution. Download this complimentary white paper: The 8 Criteria for Enterprise-Grade Communications as a Service 8x8 shares full technical details on what to expect from an enterprise-grade service platform that stands above the rest. You’ll learn the 8 criteria to look for including: What to expect when it comes to service level guarantees What geo-routing technology is and why it’s critical for optimizing global call clarity and reliability What you should look for in your communications provider’s network for global operations and superior service Which security and compliance certifications to expect from your provider Specific uptime and reliability metrics to ask your provider for How analytics
Tags : 
communications, enterprise grade, communications solution, 8x8, geo-routing
    
8x8 Inc.
Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10, a10 networks, sox compliance
    
A10 Networks
Published By: Abacus Labs     Published Date: Jun 14, 2018
The purpose of expense reporting software is to streamline your team’s workflow for submitting and reviewing business expenditures. By implementing an expense management solution, you can decrease the time and costs associated with processing expenses and increase your visibility into the implications of business spend, while helping improve general expense policy compliance and reduce expense fraud.
Tags : 
reporting, software, expense, finance, business, management
    
Abacus Labs
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
Aberdeen - youSENDit
Published By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : 
aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition, video-enabled, video-aided
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Sep 25, 2012
The report will show how Best-in-Class organizations are prioritizing their social spend to improve personalization and brand compliance.
Tags : 
retail, aberdeen, omni-channel, social, social marketing, marketing, social network, social media, customer experience/engagement, e-commerce solutions, social media marketing
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : 
aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition, video-enabled, video-aided
    
Aberdeen Group
Published By: Absolute Software     Published Date: Jan 02, 2013
The growing use of tablets, smartphones, and ultrabooks makes enpoint governance, risk management, and compliance (GRC) more challenging.
Tags : 
absolute software, grc strategy, adjust your endpoint, enpoint governance
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security
    
Absolute Software
Published By: Absorb     Published Date: May 09, 2018
eLearning has become the prevailing approach to employee onboarding, compliance training, and professional development. The efficiencies that eLearning affords stem from automation, customization and self-service. These attributes allow end users (employees and others) to access just the right training at just the right time. They also provide Learning and Development administrators the peace of mind that training will be delivered as needed, in a consistent manner and that tracking the progress of individuals will also be made simpler by automation.
Tags : 
lms, employee, training, efficiencies, elearning, automation
    
Absorb
Published By: Absorb     Published Date: May 10, 2018
In a business environment where being able to build and maintain a solid brand reputation and lasting relationships with your customers is essential for ongoing success, effective compliance training for team members is critical. Assembling quality course content, either through purchasing off-the-shelf compliance courseware or developing training material in-house or in partnership with an external developer, and delivering that material in a consistent manner, can help protect your organization and minimize the damage from compliance transgressions.
Tags : 
elearning, training, business, brand, reputation, relationship, building
    
Absorb
Published By: Accelrys     Published Date: Feb 08, 2012
In this 18-page Scientific Computing eBook, Bennett Lass Ph.D. PMP shares best practices based on his experiences planning and managing ELN deployments in large and small pharmaceutical and biotechnology research organizations.
Tags : 
accelrys, eln, symyx, scientific computing, electronic lab notebook, electronic, notebooks, lass, eln deployments, pharmaceutical, pharm, biotech, biotechnology, research, compliance
    
Accelrys
Published By: Acquia     Published Date: Feb 26, 2015
The Issue: The Content and Commerce Divide Commerce and digital marketing teams tell a familiar story. The commerce team launches an online store on a commerce platform. Commerce and IT focus on the platform and evolve it as the online business grows—focusing on basics such as PCI compliance and product information and expand-ing to more complex integrations. Now they want to add content, such as reviews and engaging media, that will inform and guide shoppers. Meanwhile, the digital marketing team regards the online store as a missed branding and engagement opportunity and tries to jump in and contribute only to find that the system can’t meet their needs. So marketing goes outside to a digital agency, pays for a separate microsite, and takes their creative production needs elsewhere. And thus a classic divide is formed. Download the Forrester Report to learn the impact of integrated and personalized commerce experiences.
Tags : 
commerce, content and commerce, personalization, increasing conversions, digital marketing, commerce platform, internet marketing, marketing research, e-commerce
    
Acquia
Published By: Acronis     Published Date: Dec 28, 2011
According to a 2010 ESG survey, 73% of midmarket companies face "significant revenue loss or other adverse business impact" within three hours of experience downtime. Read this article to find out why you need the automated disaster recovery plan that's built in to Acronis Backup & Recovery® 11!
Tags : 
automated disaster recovery, server backup, server disaster recovery, server data protection, windows server backup, vmware disaster recovery, hyper-v disaster recovery, server backup, backup vmware, backup hyper-v, acronis, acronis backup & recovery, image-based backup, backup virtual machine
    
Acronis
Published By: Acronis EMEA     Published Date: May 19, 2015
This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.
Tags : 
security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance, share corporate content, sync, enterprise security, acronis access advanced solution
    
Acronis EMEA
Published By: Actiance, Inc.     Published Date: Nov 04, 2014
Despite the range of functionality offered in Office 365, like any cloud-based offering, it cannot be all things to all customers. There are features missing in Office 365 that will prompt some customers to consider the use of third-party, cloud-based, or on-premise tools to enhance Office 365’s native capabilities. Specifically, these third-party enhancements are focused primarily on the security, archiving, and encryption capabilities built into Office 365. Read now!
Tags : 
actiance, microsoft office 365, security, compliance, control
    
Actiance, Inc.
Published By: Actiance, Inc.     Published Date: Nov 13, 2014
The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!
Tags : 
actiance, gartner, magic quadrant, enterprise information archiving, cagr, eia, compliance, e-discovery
    
Actiance, Inc.
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Healthcare providers are starting to realize that using electronic communication, collaboration, and social networks to keep in touch with each other and with patients can improve the quality of care they provide. However, it also exposes them to risk since the information they share on these networks has to be protected in order to meet specific regulatory guidelines, like those mandated by HIPAA. The prescription for success is to consider compliant use of these networks before and while they are being used and the technology that helps achieve that goal. Read this paper to gain an understanding of: What the regulatory landscape of the healthcare industry looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, hipaa requirements, social networks, compliance
    
Actiance, Inc.
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Government and public sector agencies are just beginning to realize how social networks can improve business results. With access to real-time communication, collaboration, and social networking platforms, agencies can improve internal process efficiencies that help them provide better services to their constituents. But first, these agencies have to consider regulatory requirements like the Freedom of Information Act (FOIA) which require compliant use of these networks and the content people create on them. Read this paper to gain an understanding of: What the regulatory landscape of the public sector looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, public sector, social networking platforms, compliance, real-time communication
    
Actiance, Inc.
Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
    
ActiveProspect, Inc.
Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
    
ActiveProspect, Inc.
Published By: Adobe     Published Date: Feb 20, 2014
Award-winning design practice advances architecture, interior design, and planning excellence by standardizing on Adobe Creative Cloud and Adobe Acrobat® Pro.
Tags : 
adobe, adobe creative cloud, software, software deployment, enterprise agreement, license management, document security, compliance, collaboration, productivity, file management, pdf files, it management, document management, standardization
    
Adobe
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.