Skip to main content
 

control

Results 126 - 150 of 2322Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Aug 14, 2019
Current and former finance practitioners share stories of how they met their daily challenges—from managing internal controls and the financial close to onboarding and reporting—with a single cloud-based system for finance. Watch the video.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday     Published Date: Mar 20, 2019
Current and former finance practitioners share stories of how they met their daily challenges—from managing internal controls and the financial close to onboarding and reporting—with a single cloud-based system for finance. Watch the video.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday APAC     Published Date: Dec 18, 2018
Current and former finance practitioners share stories of how they met their daily challenges—from managing internal controls and the financial close to onboarding and reporting—with a single cloud-based system for finance. Watch the video.
Tags : 
    
Workday APAC
Published By: Gridstore     Published Date: Jan 02, 2013
Companies of all sizes, including enterprise and midsize, are seeing an increased dependency on technology that is significantly increasing the amount of data generated.
Tags : 
gridstore, idc report, vcontroller, scale out storage, raid
    
Gridstore
Published By: Beqom     Published Date: Mar 09, 2015
An increasing number of compliance initiatives are changing how HR departments are managing their compensation processes. The SEC is requiring that companies prove executive pay is directly tied to company performance. Similar requirements have already been enforced across Europe by CRD IV and Solvency II directives. Companies are also facing internal pressure to establish that compensation policies are managed and executed in compliance with corporate policies. In order to meet these new challenges, HR managers must guarantee compensation processes are transparent, compliant with external regulations, compliant with internal policies and tightly controlled. So, what does this exactly mean for HR managers?
Tags : 
    
Beqom
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Published By: Ahead     Published Date: Jun 05, 2019
Digital Requires a New Level of Insight and Control Digital strategies have caused business executives to intensify their scrutiny of how technology affects bottom line performance. With a growing emphasis on differentiating the customer experience in highly competitive markets, these executives want to understand how their IT systems affect everything from brand perception to customer acquisition and loyalty. 3 | A Guide to Intelligent Operations Meanwhile, those same demanding business leaders lack appreciation and patience for the complexity of today’s digital technology environment. While applications and user experiences are simpler and more intuitive, the backend processing, application interdependencies, and underlying infrastructure are more complex than ever, even in light of the benefits of abstraction, virtualization, and cloud computing (see Figure 1.) While CIOs have long been expected to improve stability and uptime - and done a pretty good job of it - the stakes are much
Tags : 
    
Ahead
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, security, guide, privacy, architectures, organizations, compliance, protection
    
McAfee EMEA
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to learn how SMEs are able to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN optimization technologies.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: LogMeIn     Published Date: Jul 18, 2014
A Nucleus Research guidebook to LogMeIn Rescue
Tags : 
logmein rescue, rescue guidebook, saas, management tools, remote control
    
LogMeIn
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When he joined SDBC in May of 2004, SunnyD's Chief Information Officer and Global Controller was faced with a classic build-or-buy decision, although the circumstances were less than typical. Despite the company just being carved out from Procter & Gamble with an experienced management team and a well-known brand name, it was missing a crucial operational element — an entire information technology infrastructure.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, microsoft dynamics ax, fusion, outsourcing
    
OneNeck IT Services
Published By: CA WA     Published Date: May 12, 2008
The recent economic downturn and corporate scandals compounded concerns of corporate accountability and confidence in U.S businesses. To improve shareholder confidence in management’s ability to self-govern, the Federal Government implemented strict regulatory protocols to help restore accountability and improve public as well as shareholder confidence. The primary example of course is the Sarbanes-Oxley (SOX) Act of 2002 which sought lasting eradication of corporate corruption by implementing specific controls across key financial business processes.
Tags : 
ca wa, workload automation, business process automation, compliance, sox, sarbox, sarbanes oxley
    
CA WA
Published By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics
Published By: SAS     Published Date: Mar 06, 2018
Known for its industry-leading analytics, data management and business intelligence solutions, SAS is focused on helping organizations use data and analytics to make better decisions, faster. The combination of self-service BI and analytics positions you for improved productivity and smarter business decisions. So you can become more competitive as you use all your data to take better actions. Instead of depending on hunch-based choices, you can make decisions that are truly rooted in discovery and analytics. And you can do it through an interface that anyone can use. At last, your business users can get close enough to the data to manipulate it and draw their own reliable, fact-based conclusions. And they can do it in seconds or minutes, not hours or days. Equally important, IT remains in control of data access and security by providing trusted data sets and defined processes that promote the valuable, user-generated content for reuse and consistency. But, they are no longer forced
Tags : 
    
SAS
Published By: Fugue     Published Date: Mar 27, 2017
Directed at cloud architecting concerns, this paper covers streamlining complexity at scale, knowing infrastructure state, and using easily repeatable patterns that bolster security, compliance, and disaster recovery. Get this white paper now.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration
    
Fugue
Published By: Intralinks     Published Date: Jun 18, 2013
Intralinks a New York based company, has announced the general availability of its new Intralinks VIA service, and unveiled new brand containers for existing core services in extra-corporate document-based collaboration. Intralinks VIA, in development for nearly two years, is initially positioned to serve "the rest" of the employee population inside customers, which already use Intralinks. Download this white paper to learn more about the role of Intralinks in the broader business collaboration market, with more robust security, controls, and other necessary features for enterprise use.
Tags : 
enterprise, file sharing, collaboration, technology, market, security, new news
    
Intralinks
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors
    
Websense
Published By: Websense     Published Date: Aug 23, 2012
All DLP controls have two things in common.First, they provide the ability to identify: data-in-motion, data-in-use, data-at-rest. Read this whitepaper to find out more about DLP.
Tags : 
websense, data loss, prevention, dlp
    
Websense
Published By: IBM     Published Date: Jul 14, 2016
If your company is engaged in international activities, it's critical that you assess and understand the risks of non-compliance with the Foreign Corrupt Practices Act (FCPA). To avoid becoming a costly statistic, you need to design your controls accordingly. Download this white paper from experts Joseph Howell, Cofounder and Executive Vice President at Workiva, and Brent Macey, Director of Internal Audit for Schnitzer Steel Industries, Inc. They'll discuss the major components of the FCPA, and how companies can perform the risk assessment process in an efficient manner. They'll also provide a practical guide to implement internal controls for FCPA at an international level.
Tags : 
best practices, risk management, foreign corrupt practice act, technology, business management
    
IBM
Published By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Imprivata     Published Date: Nov 17, 2014
This whitepaper will tell you what you need to know when it comes to implementing electronic prescriptions for controlled substances.
Tags : 
imprivata, epcs, electronic prescriptions, controlled substances, solution vendors, practitioners, regulatory compliance, transmitted electronically
    
Imprivata
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection
    
Webroot Inc
Published By: rPath     Published Date: Dec 10, 2010
Strong Version Control as a Foundation to System Management
Tags : 
rpath, strong version control, system management, software development, collaboration, automation, audit
    
rPath
Published By: GoToWebinar     Published Date: Aug 02, 2011
This Webinar Success white paper provides guidelines on how to produce and manage successful Webinars - from the first (and most important) step of defining purpose and expectations to quantifying results after the event.
Tags : 
gotowebinar, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources
    
GoToWebinar
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.