compliance risks

Results 1 - 25 of 60Sort Results By: Published Date | Title | Company Name
Published By: ADP     Published Date: May 02, 2018
Software, outsourcing, service bureau, ASO, PEO… it’s little wonder the market for payroll solutions has a reputation for being confusing and hard to navigate. Where does one solution end and the other begin? And how do you know which one you need? This complexity is the reason we’ve created a comparison guide. Businesses have a wide spectrum of payroll options to choose from, and there are big differences between them, so like-for-like comparisons aren’t possible across categories. Before you start comparing vendors head-to-head, you need to decide which payroll style is best for you. And before you make that decision, you need to know what you want in return. Are you looking to save money? Save time? Eliminate errors? Do you want help minimizing tax compliance risks? There are plenty of options available, and they all come with different pros and cons.
Tags : 
    
ADP
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance
    
Brainloop
Published By: Kroll Advisory Solutions     Published Date: Aug 02, 2013
First launched in 2011, the Anti-Corruption Benchmarking Report aims to give compliance officers a comprehensive view of the "ABC" (anti-bribery and corruption) risks they have, the resources they have to fight them, and how those resources are implemented into compliance programs. The results give compliance officers a view into the anti-bribery and corruption threats they face and share resources for creating a risk-based compliance program. Download the report to learn more.
Tags : 
compliance, corruption, anti-bribery, risk assessment, compliance programs, compliance risk
    
Kroll Advisory Solutions
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: NAVEX Global     Published Date: Apr 20, 2018
Discover how organisations similar to your own are developing an effective ethics and compliance programme to improve workplace culture and reduce compliance risk. Our new research will help you identify the most appropriate activities to consider for your own programme, provide the data to help benchmark your results, and the guidance to improve buy-in and programme resources. What you'll learn: How are new regulations changing potential ethics and compliance risks? What challenges do compliance professionals face when trying to improve company culture? How are organisations investing in compliance activities? What results are compliance programmes achieving?
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Apr 20, 2018
Our new market report takes an in depth look at recent developments and offers insight into running a compliant and ethical global business. With primary research and articles written by industry experts, you’ll get answers to some of today’s most important questions like: How are businesses navigating the risks posed by global supply chains? Have compliance risks changed since the rise of anti-corruption purges? How do you set the right tone for disclosing misconduct in the workplace? How can I evaluate the integrity of third parties within the era of fake news?
Tags : 
    
NAVEX Global
Published By: Onbase     Published Date: Feb 18, 2016
Today’s increasingly competitive global economy requires businesses to make decisions faster than ever. Businesses need instant insight into the status of their people and processes. But manual, paper-based processes undermine decision-making. Paper makes it difficult for businesses to make smart decisions about their operations and their working capital. Manual processes also are costly and inefficient, create headaches for front-line staff, introduce compliance and security risks, and stymie collaboration with trading partners.
Tags : 
finance, decision-making, accounts payable, business practices, finance management
    
Onbase
Published By: CIC Plus     Published Date: Sep 23, 2014
Learn more about HR compliance under Section 6056 of the ACA, including: • New reporting requirements for 2015 • What those requirements mean for your business • What you can do to ensure compliance • Risks of noncompliance
Tags : 
aca, affordable healthcare act, aca compliance, obamacare, irs section 6056, hr compliance, online hr forms, onboarding
    
CIC Plus
Published By: Brainshark     Published Date: Oct 16, 2013
Banking, insurance, securities and investment firms are challenged to keep employees, broker dealers, investors and others current in a world of constant change. Enabling video and mobile communications is the most efficient way to clearly communicate and stay ahead of competitors and changing regulations. Discover how 8 out of the top 10 US financial institutions use Brainshark communications to increase compliance, decrease risks, and lower the costs of communications.
Tags : 
finance, financial services, banking, investment, insurance, broker, credit union, banks
    
Brainshark
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: Mimecast     Published Date: Oct 02, 2019
If you are an moving to or already using Office 365 then it’s essential for you to formulate a plan toward a risk-free cyber resilience experience. Cyber resilience requires you to prepare for the before, during and after an attack/outage/incident. Doing so will protect your organization from security threats, compliance concerns, unplanned outages and more. To mitigate concerns and form a resilient strategy you have to first KNOW the risks. The right third-party solution can ensure email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Microsoft Office 365™. But, what are the key areas of concern around Office 365 email you should be aware of? Read what Microsoft Office Apps and Services MVP J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
    
Mimecast
Published By: NAVEX Global     Published Date: Mar 21, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation.
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation. What you'll learn: How internal and external parties define programme effectiveness The eight essential components of an effective ethics and compliance programme How to share your assessment in a meaningful way
Tags : 
    
NAVEX Global
Published By: DocuSign     Published Date: Apr 24, 2018
Life science companies are experiencing a significant transformation in how they bring new products to market. Organizations must adapt to changes in the marketplace, such as global product commercialization, specialized medicine, new regulations, new payment models, and new technology that are driving more product variety, smaller drug volumes, and shorter product life cycles. To meet the needs of this new commercial model, life science companies must re-envision the global supply chain and evolve the tools they use to run their business. The supply chain that was designed for launching blockbuster products will not work in the future. Today, the global supply chain relies on a manual, paper-based process centered on printing documents and sending them via overnight mail, fax, or e-mail with scanned attachments. This time-consuming and costly process is errorprone, tedious for customers and team members, and vulnerable to security and compliance risks.
Tags : 
    
DocuSign
Published By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : 
gdpr, risk mitigation, email resiliency, personal data protection
    
Mimecast
Published By: ServiceNow     Published Date: Nov 05, 2012
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
itam, servicenow, it asset management, software asset management, sam, security, drive standardization
    
ServiceNow
Published By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
asset management, technology, software asset management, compliance, mitigation of security risks, automation
    
ServiceNow
Published By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper and learn about the risks of cloud computing, how you can control those risks and a few things to keep in mind when selecting a vendor for your cloud solutions.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NetIQ
Published By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: MarkLogic     Published Date: Jun 19, 2017
Integrate your data silos to finally navigate the data maze. This comprehensive white paper addresses a key element in any GRC program: regulatory compliance. Download this paper to learn about the costs, current practices, and associated risks. We’ll also recommend a technologically-enabled approach and highlight its main business benefits for financial services, insurance, and energy companies. Overview Executive Summary Compliance Requirements A Recommended Approach Business Benefits Regulatory Compliance Solution Architecture Related Materials
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation
    
MarkLogic
Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems
    
IBM
Published By: DigiCert     Published Date: Jun 19, 2018
Regulatory compliance is more than a series of rules to adhere to, and getting it right could save you time and money. Historically, compliance has been regarded as a checklist of fixed requirements. But this reactive outlook risks being too short-sighted. It can lead to higher compliance costs, audit deficiencies, greater business downtime and an increased risk of data loss. Furthermore, it can lead to missed opportunities to achieve greater levels of operational effectiveness for your business. The only way to achieve a greater level of operational efficiency is to adopt a proactive strategy and stay ahead of the compliance curve.
Tags : 
    
DigiCert
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.