compliance software

Results 1 - 25 of 85Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Feb 24, 2015
Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.
Tags : 
software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization
    
CDW
Published By: Thomson Reuters     Published Date: Feb 09, 2016
Download this report for insights from industry experts on some of the biggest corporate tax shakeups in 2015, as well as key topics to keep in mind in 2016 and what that all means for tax technology.
Tags : 
global tax compliance, corporate tax software, tax technology, thomson reuters onesource, corporate income tax, direct tax, tax provision, transfer pricing
    
Thomson Reuters
Published By: NAVEX Global     Published Date: Dec 07, 2017
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme, including: Does our culture support employees who raise concerns? Are our communications with employees reaching the intended audiences and having the desired effect? Are our investigations thorough and effective? Do we need more training? Do we need to review or update our policies? Do employees know about our reporting channels? Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. This year’s analysis of our EMEA & APAC data from nearly 14,000 ethics and compliance hotline reports revealed key data points that compliance professionals can use to benchmark and assess their programme’s performance, and move toward predictive risk mitigation.
Tags : 
navex, ethics and compliance software, hotline data, risk mitigation, incident management systems
    
NAVEX Global
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware
    
Dell
Published By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software
Published By: Thomson Reuters     Published Date: May 05, 2016
Most tax departments spend 80 percent of their time collecting and manually inputting data and 20 percent reviewing it. Using tax technology, you can flip those proportions and transform how you gather, use, store and reuse data across your global tax processes. This step-by-step guide discusses how technology can convert each challenge in your tax lifecycle to an opportunity for your success. Download today!
Tags : 
global tax compliance, corporate tax software, tax technology, thomson reuters onesource, corporate income tax, direct tax, tax provision, beps
    
Thomson Reuters
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, security, guide, privacy, architectures, organizations, compliance, protection
    
McAfee EMEA
Published By: Sunbelt Software     Published Date: Mar 13, 2008
Messaging archiving can help organizations solve all of these problems and can satisfy a wide range of legal compliance, regulatory, storage management, knowledge management and other problems. This Osterman Research white paper discusses the several reasons to implement a messaging archiving system and provide an overview of Sunbelt Software’s offering focused squarely on the archiving space.
Tags : 
email archiving, pst, archive, archiving, compliance, records storage, sunbelt
    
Sunbelt Software
Published By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
When four of its hospitals needed to transition from manual to automated temperature monitoring, Allina Health sought a solution that would meet its core requirements: timely alerts to problems and automatic data capture for compliance reporting requirements. Ultimately, it was also looking for an enterprise solution that could form the standard for its entire health system. Read this case study to learn why Allina Health chose STANLEY Healthcare’s Wi-Fi-based AeroScout® Environmental Monitoring solution, including MobileView software, as its system-wide standard to build an enterprise foundation for asset tracking, environmental monitoring, and other RTLS capabilities.
Tags : 
healthcare, medicine, asset tracking, environmental monitoring, rtls, hospital
    
STANLEY Healthcare
Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas
    
Entrust Datacard
Published By: BMC ESM     Published Date: Aug 20, 2009
BMC Service Automation automates repetitive, manual tasks (such as provisioning, patching and compliance) to reduce the margin for error, allowing IT to get things done more quickly, and across organizational silos.  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Automation from BMC Software.
Tags : 
bmc, automation, service automation, silos, software, margin for error, error reduction, patching
    
BMC ESM
Published By: HP     Published Date: May 05, 2014
Leveraging HP breadth to increase security, lower risk, increase efficiency: Find out how CapitalOne has improved compliance, lowered risk, eliminated bottlenecks, reduced cost, and moved from silos to integration by leveraging the HP Software portfolio. Headquartered in McLean, Virginia, Capital One offers a broad array of financial products and services to consumers, small businesses and commercial clients in the U.S., Canada and the UK.
Tags : 
bsm, business service management, it operations group, it case study, capital one, automation
    
HP
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance
    
Cenzic
Published By: Entrust Datacard     Published Date: Jul 21, 2014
For law enforcement, courts and other public safety departments that access or exchange information with the Federal Bureau of Information (FBI) Criminal Justice Information Services (CJIS) division, a strict set of security controls must be followed.
Tags : 
cjis, compliance solutions, security control, law enforcement, courts, public safety departments, software authentication
    
Entrust Datacard
Published By: NETIQ     Published Date: Mar 12, 2013
Organizations struggle to meet PCI DSS compliance. By investing in the proper standardization tools and automation software, organizations can thrive while shifting resources freed up by a simpler.
Tags : 
pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
    
NETIQ
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: NACR     Published Date: Feb 09, 2015
Do you know what the compliance issues are for your organization and the technology solutions you might consider? Download this guide to learn what you need to know.
Tags : 
nacr, compliance, technology, technology solutions, regulations, software compliance – contact center, data security, customer security
    
NACR
Published By: Workforce Software     Published Date: Apr 03, 2012
Employers have seen employment laws change at a breakneck pace over the last few years - a trend sure to continue in 2012. We've asked our Director of Compliance and attorney-at-law Paul Kramer to help us navigate through a slew of recent (and coming) regulatory changes.
Tags : 
human resources, hr management, legal issues, labor laws, compliance laws, employee rights, workforce software
    
Workforce Software
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Published By: IBM     Published Date: Nov 19, 2014
According to a recent survey by the Compliance, Governance and Oversight Council, almost 70% of the electronic content and information organizations retain has no business or legal value. It’s simply digital detritus, retained because 1) we think we might need it sometime, 2) we forget about it, or 3) we don’t have policies and software in place to get rid of it. Ultimately, though, this unnecessary accumulation of content can create real problems in terms of e-discovery, regulation, management and cost. Watch this video white paper to learn more about: - How to get started on an information management strategy - The right combination of software and policy for successful information governance - The business case for proactive management of an organization’s digital footprint
Tags : 
compliance, governance, oversight, digital debris, data cleanup, legacy data cleanup, information management, information management strategy
    
IBM
Published By: Concur     Published Date: Mar 04, 2013
When the policy says one thing and people do something different, the disconnect causes problems. Build a Company Culture that is integrated with compliance.
Tags : 
company culture, expense policy, compliance, expense management, applications, software, employee expenses
    
Concur
Published By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : 
ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities
    
IBM
Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management
    
Nemx Software Corporation
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.