Skip to main content
 

it compliance

Results 1201 - 1225 of 1505Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Office 365     Published Date: Jan 21, 2016
Learn how much money your business can save. In an objective study commissioned by Microsoft, Forrester Consulting investigated the Total Economic Impact™ for small to medium sized businesses, with 1 to 250 employees, using Office 365. The study revealed a sizeable return on investment. One business founder had this to say, “The productivity gain is the main thing for me with Office 365. It’s allowed everybody to be more productive, and if there is any element of downtime on hardware, it’s just a case of moving into another location, whether it’d be the next desk, office, or Starbucks.” Discover these findings and more when you download the free report: • Improved Business Continuity. How enhanced business continuity lead to an avoidance in lost billable hours of $15,000 annually. • Increased mobile worker productivity. How an investment in mobility saved45 hours per year per worker. • Lowered Security, Risk, and Compliance Costs. How an organization went from 15 data breaches per year
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Jun 03, 2016
Did you know that just like email, video conferencing is susceptible to security risks? Our “Online Meetings: Secure Your Video Conferences” eBook shows you how small and medium businesses can use Skype for Business to provide effective collaboration tools—like HD video conferencing*—that are more secure and simple to use. In this ebook, you’ll discover how to: Save on security, risk, and compliance costs Reduce risk with a comprehensive solution Simplify your IT environment and increase security *For HD video, compatible HD hardware and broadband connection with at least 4 Mbps required.
Tags : 
    
Microsoft Office 365
Published By: DocuSign     Published Date: Mar 23, 2016
This whitepaper examines these pain points and suggests how a proven DTM solution such as DocuSign’s can work with an enterprise-grade productivity platform like Microsoft Office 365 to address your pain points, mitigate risk, and strengthen your competitive advantage.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Mar 23, 2016
A recent survey of IT professionals by IDG Research shows that companies are struggling to keep their processes and documents in compliance with frequently changing — and often conflicting — regulatory standards.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
Staffing companies play a critical role in recruiting and onboarding talent to ensure that operations don’t skip a beat. In today’s competitive recruiting market, staffing companies need to invest in digital tools to hire and onboard the best professionals faster and more efficiently. Download this brief to learn how DocuSign can help you: • Attract and secure talent faster • Improve security and compliance for everyone • Reduce costs for the workplace
Tags : 
    
DocuSign
Published By: VMware     Published Date: Feb 24, 2017
As the volume and variety of mobile devices surge, so do expectations among end users and business leaders to put these devices to work—as tools for productivity and a competitive advantage for the enterprise. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. So, how do you know if your organization is ready to make the move? Read this white paper to determine if now is the right time to adopt EMM, especially if your organization experiences: - Increased need for security and compliance - Device expansion - Rapid growth - And more
Tags : 
    
VMware
Published By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration, engineering disciplines, business objectives, change management, compliance standards, systems age, engineering process, information integration, communication
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : 
quality management approaches, compliance requirements, health sector, regulatory requirements, risk management
    
IBM
Published By: Viavi Solutions     Published Date: Jan 04, 2017
Network performance Monitoring and diagnostics (NPMD) solutions are designed to capture and in many cases store network conversations in order to manage and troubleshoot IT service issues. Therefore, your NPMD solution must be viewed as an integral part of PCI DSS compliance efforts and never compromise these initiatives. This white paper goes through the best offerings that can strengthen these efforts.
Tags : 
    
Viavi Solutions
Published By: Symantec     Published Date: Nov 30, 2015
Website security is important for every business that has an online presence, but different companies have different needs and compliance requirements.
Tags : 
    
Symantec
Published By: IBM     Published Date: Oct 10, 2014
This paper discusses the practices that companies should explore to move beyond traditional PLM and ALM to realize the broader capabilities of systems engineering for reducing time to market, meeting regulatory compliance mandates and improving product quality.
Tags : 
ibm, systems engineering, business agility, smart products, cut costs, agility, revolutionizing requirements, system modelling, collaborate changes, modelling changes, engineering
    
IBM
Published By: IBM     Published Date: Oct 10, 2014
IBM Rational solutions for the oil and gas industry combine process, requirements, architecture, models and test tools with an underlying platform that supports requirements management, risk analysis, conformance assessments and more.
Tags : 
ibm, requirements management, risk analysis, conformance assessments, addressing complexity, manage requirements, manage compliance
    
IBM
Published By: Symantec Corporation     Published Date: Oct 03, 2013
This report looks at the challenges and requirements of protecting confidential patient data online, the risk of security breaches in the world of EHR, and the measures that healthcare organizations must take in order to achieve and maintain compliance.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: NAVEX Global     Published Date: Dec 22, 2017
An effective third-party risk management programme is in your best interest. Not only can you more confidently engage with a growing network of vendors, suppliers, resellers and distributors; but when done effectively, you can have a positive impact on the effectiveness and efficiency of your broad ethics and compliance programme. NAVEX Global research has shown that organisations pursue strong ethics and compliance programmes for myriad reasons, but at the top is a desire to cultivate and maintain a culture of ethics and respect. A strong third-party risk management solution helps organisations realise that objective through engaging with third parties that abide by codes of conduct, that are transparent and communicative and that you can be proud to do business with.
Tags : 
third party risk management, third party risk, managing third parties, risk management, anti-bribery programme, compliance programme
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 22, 2017
Ethics and compliance officers have many opportunities to leverage the data in their hotline and incident management systems to improve their compliance programmes— and their organisational culture of ethics and respect. This year’s benchmarks point to several opportunities to increase programme effectiveness. Hotline data that is carefully tracked, reviewed, benchmarked and presented with sufficient context often provides the early warning signs needed to detect, prevent and resolve problems. We at NAVEX Global hope that this report is helpful to your organisation and we welcome any feedback on these findings.
Tags : 
whistleblowing, hotline, whistleblowing hotline, hotline best practices, hotline benchmark data, whistleblower protection, whistleblowing programe
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 22, 2017
Assessment is part of your compliance programme’s necessary life cycle for improvement. We work in an ever-evolving landscape of risk that requires compliance professionals to identify the gaps their programmes have today, and may have tomorrow. Your programme effectiveness as a whole is based on the effectiveness of each one of its parts. So, ensure your assessment is broad as well as in-depth. Programme assessment is not a tick-the-box exercise. It is just as important as creating a company culture and mitigating risk. Remember, if your assessment is thorough and effective, you will have identified weaknesses in your programme and vulnerabilities for risk. Don’t be discouraged by your work to highlight these areas for improvement. Your programme and your organisation will be better for it once you make the necessary adjustments for a robust and effective ethics and compliance programme.
Tags : 
compliance programme, compliance, programme assessment, definitive guide, improving compliance, ethics and compliance, programme awareness, anti-bribery awareness, ethics programme, risk assessment
    
NAVEX Global
Published By: AlienVault     Published Date: Mar 30, 2016
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
The promise of SIEM is clearly an essential one – aggregate, correlate & analyze all of the security-relevant information in your environment so that you can: Identify exposures Investigate incidents Manage compliance Measure your information security program
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
Common PCI DSS compliance challenges Questions to ask as you plan and prepare Core capabilities needed to demonstrate compliance How to simplify compliance with a unified approach to security
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Start   Previous    42 43 44 45 46 47 48 49 50 51 52 53 54 55 56    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.