Skip to main content
 

management policy

Results 1 - 25 of 115Sort Results By: Published Date | Title | Company Name
Published By: Jamf     Published Date: Aug 06, 2019
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Published By: Navex Global     Published Date: Jun 05, 2014
If you are looking for a deeper understanding of how to effectively and efficiently manage your organization’s employee handbook, code of conduct, and policies and procedures, The Definitive Guide to Policy Management is your go-to resource. No matter where you are today in your understanding of policy management, or how effective your current system may be, this guide will close the gaps in your understanding and offer new and practical perspectives and insights.
Tags : 
policy, management
    
Navex Global
Published By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : 
corporate network, personal devices, smartphone, tablet, legacy networks, byod
    
HPE
Published By: FICO     Published Date: Aug 27, 2012
This white paper provides a step-by-step guide to ensuring success with your business rules management project. You'll learn the components of a successful business rules management project.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding
    
FICO
Published By: Entrust Datacard     Published Date: May 10, 2017
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively.
Tags : 
certificate management, digital business, pki, datacard, certificate management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
    
Entrust Datacard
Published By: TriNet     Published Date: Jul 28, 2015
How to keep the keepers and maintain optimal turnover levels.
Tags : 
employee retention management, turnover levels, employee performance management, effective retention policy, hr functions
    
TriNet
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: SAS     Published Date: Apr 16, 2015
The framework presented here is a way to avoid data dysfunction via a coordinated and well-planned governance initiative. These initiatives require two elements related to the creation and management of data: • The business inputs to data strategy decisions via a policy development process. • The technology levers needed to monitor production data based on the policies. Collectively, data governance artifacts (policies, guiding principles and operating procedures) give notice to all stakeholders and let them know, “We value our data as an asset in this organization, and this is how we manage it.”
Tags : 
    
SAS
Published By: Abacus Labs     Published Date: Jun 14, 2018
The purpose of expense reporting software is to streamline your team’s workflow for submitting and reviewing business expenditures. By implementing an expense management solution, you can decrease the time and costs associated with processing expenses and increase your visibility into the implications of business spend, while helping improve general expense policy compliance and reduce expense fraud.
Tags : 
reporting, software, expense, finance, business, management
    
Abacus Labs
Published By: NAVEX Global     Published Date: Jul 17, 2017
Download your Definitive Guide to Policy Management for real-world examples of companies avoiding litigation and penalties by having a well thought out compliance programme. Organisations that approach policy management strategically and exercise ruthless discipline with respect to their policies yield massive returns in organisational alignment, corporate culture, and ultimately their bottom-line results. And when incidents occur or regulators come knocking, you'll be prepared.
Tags : 
policies, enforcement, perception, culture, templates, meta-policy, properties, links
    
NAVEX Global
Published By: CA WA     Published Date: May 12, 2008
Although typically thought of as an artifact of legacy computing, batch processes remain vital to today’s real-time enterprises. Behind the real time systems that power the real time enterprise, such as customer order fulfillment, account management, supply chain scheduling and optimization, or financial trading systems, are regularly-updated back office business systems. Over the years, batch technology has evolved from script-based automation to rules or policy-driven workload automation.
Tags : 
bpa, business process automation, soa, service oriented, workload automation, ca wa
    
CA WA
Published By: NAVEX Global     Published Date: Jul 02, 2015
This report reveals practical recommendations from NAVEX Global experts that you need to make better decisions and take your policy management program to the next level.
Tags : 
navex global, policy management, policy management program, ethics and compliance, compliance, ethics, automated policy management software
    
NAVEX Global
Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance
    
MessageLabs
Published By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to tackle the challenges of supporting BYOD programs in this on-demand webcast with Good Technology professional services consultants.
Tags : 
bring your own device, byod security, byod management, byod solutions, byod policy, byod trend, byod challenges, byod strategy
    
Good Technology Corporation
Published By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global
Published By: Jamf     Published Date: Nov 05, 2018
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Published By: XpertHR     Published Date: Oct 23, 2017
Employers should take note that a significant number of legal changes on the federal, state and local level have or will have a substantial impact on workplace policies and employee handbooks. It is critical for an employer to review, amend and properly update its handbook for 2018 so that it reflects the latest legal requirements. An employer also needs to understand what the legal update is and how it affects the workplace, as well as develop and implement policies, practices and procedures to remain compliant. Further, an employer may need to update its employee handbook based on internal changes (e.g., benefits, performance management). Below are relevant XpertHR resources, including Employee Handbook policy statements, to assist an employer in updating its own handbook.
Tags : 
    
XpertHR
Published By: NAVEX Global     Published Date: Apr 20, 2018
Learn how to effectively and efficiently manage your organisation's employee handbook, code of conduct and other important documents. This guide gives organisations of all sizes insight on how to optimize policy and procedure management with real-world examples, helpful tips, and research. What you’ll learn: - Best Practices on How to Plan, Implement, and Measure your programme - Eleven Commandments of Policy Formatting and Writing - 20 Questions for Prioritising Policy Development Efforts - Pros & Cons of Various Distribution Methods - Assessment Questions to Evaluate Your Current Document Management Strategy - Build versus Buy Considerations
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
Compare your policy and procedure management programme to industry standards and identify where your programme needs improvements. Read the top challenges policy management programmes face in 2018 and expert recommendations on meeting those challenges. What You'll Learn: Where organisations are struggling with policy management What the best organisations do to create efficiency in their programme How organisations are starting to comply with new SFO and DOJ guidance How automated systems improve results and satisfaction for policy management
Tags : 
    
NAVEX Global
Published By: Absolute Software     Published Date: Sep 09, 2011
This white paper provides guidelines to help you create policies for computer energy consumption that are sensible and easy to enforce.
Tags : 
absolute, power saving policy, management, roi, energy savings, policy metrics, network management
    
Absolute Software
Published By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : 
netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage, das, data management, data integration, storage, storage efficiency, implementation, esg, it sandbox, microsoft office sharepoint server, moss, mission-critical, sql
    
NetApp
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats
    
Skillsoft
Published By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : 
mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor, mcafee risk & compliance
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
Vulnerability assessment vendors compete on management features, configuration assessment, price and more, with other security products. Buyers must consider how VA will fit into their vulnerability management process when evaluating VA products,
Tags : 
vulnerability management, network scanning, strong positive, mcafee vulnerability manager, mvm, mcafee epolicy orchestrator, epo, nitro siem, mcafee security innovation alliance
    
McAfee
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.