Skip to main content
 

regulatory

Results 226 - 250 of 440Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc, audit, regulatory compliance
    
NetIQ
Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci, pc ftp application, script file exposure, file encryption processes
    
Linoma Software
Published By: IBM Corp     Published Date: Sep 23, 2011
This solution brief discusses the backup and archive challenges that SMBs face and how tape storage solutions address regulatory compliance.
Tags : 
ibm, smb, backup, technology, data recovery, archive
    
IBM Corp
Published By: Zebra     Published Date: Jul 10, 2014
Maximizing patient safety and improving the quality of care is the ultimate goal for healthcare providers. Doing so requires staying within regulatory compliance, while also advancing staff retention and meeting fiscal constraints. Barcode technologies provide a “virtual voice” to patients, applications and workflows. Barcoding accomplishes this by laying a solid foundation for enhancing patient identification, providing visibility into medical practices, and driving efficiencies throughout healthcare applications, and is an integral part of electronic medical record (EMR) adoption. Download to learn more!
Tags : 
zebra, patient safety, closed loop process, malpractice, misdiagnosis, error costs, financial implications, caregiver, misidentification, emr adoption, electronic medical record, wristbands, information technology, practice management
    
Zebra
Published By: CenturyLink     Published Date: Nov 18, 2011
Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, disaster, threats, downtime, regulatory, compliance, bcdr, business continutity, protection
    
CenturyLink
Published By: IBM     Published Date: Feb 21, 2013
With this book, you find out how a unified CCR process gives leaders timely and accurate insights to make smarter decisions. You also discover features of the ideal CCR solution and learn what to look for in the selection process.
Tags : 
close, consolidate, report, ibm, ccr, business performance, finance, xbrl, regulatory reports, statutory
    
IBM
Published By: Esker     Published Date: Jan 06, 2014
How to increase profit and productivity via Accounts Payable Automation in an ERP environment
Tags : 
esker, accounts payable, erp, productivity, automation solution, erp applications, business landscape, internal processes, automation, ap operations, level of maturity, modernization, manual vendor, invoice processing, ap challenges, albemarle, regulatory compliance
    
Esker
Published By: Esker     Published Date: Jan 06, 2014
How Adding AP Workflow Automation to Vendor Invoice Processing Can Make Your AP Operation Best-in-Class
Tags : 
esker, accounts payable, erp systems, end-to-end automation, productivity, automation solution, erp applications, business landscape, internal processes, automation, ap operations, level of maturity, modernization, manual vendor, invoice processing, ap challenges, albemarle, regulatory compliance
    
Esker
Published By: Esker     Published Date: Jan 06, 2014
Manual processing of vendor invoices presents a roadblock to the success of your accounts payable (AP) department and overall business objectives. As you look to automation to get your company on the right track, consider this guidebook your map along the 7-step path to AP automation success.
Tags : 
esker, accounts payable, erp, productivity, automation solution, erp environment, business landscape, internal processes, automation, ap operations, level of maturity, modernization, manual vendor, invoice processing, ap challenges, regulatory compliance, procure-to-pay cycle, manual to touchless
    
Esker
Published By: IBM     Published Date: Jun 20, 2013
The global financial crisis of 2008 still reverberates today. Sluggish economic growth, stricter regulatory requirements and rapidly changing consumer behavior are placing unprecedented demands on the banking industry. In recent years, banks – particularly those with substantial retail operations – have relied on the lethargy of their customers to maintain their business. Customer loyalty has been based more on proximity of local branches and convenience of ATM networks than the quality of customer care or products and services priced and tailored to a bank’s best customers. In response to the financial crisis, banks have focused on wringing complexity and costs from their systems – exacerbated by mergers and acquisitions – while dealing with new and tighter regulations. Yet, their traditional “one-size-fits-all” mass-marketing approach to customers has remained constant.
Tags : 
customer-centric, increase revenue, relationships, operations
    
IBM
Published By: The Vitality Group     Published Date: Jan 28, 2014
This technical brief streamlines and simplifies the key issues in the new regulatory landscape and provides information to help inform important business decisions regarding Wellness programs. "The Legal Environment of Wellness" offers in depth information abuot wellness program requirements under the ACA, and reviews how corporate wellness programs are impacted by the rulings of the Affordable Care Act (ACA) and HIPAA. In addition to the ACA, it covers information companies need to be aware of regarding how other legislation may impact their health promotion efforts. Choosing a new wellness program or bringing current programs into compliance will require a thorough understanding of new and existing laws and sometimes complex decisions and structural redesign.
Tags : 
employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program, employee health incentive pgoram, employee wellness incentive program, workpace wellness program, workplace health program, workplace health promotion, health and wellness program, workpace health program, workplace health promotion, health and wellness program, corporate health program cost, affordable care act compliance, afordable care act provisions
    
The Vitality Group
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
    
OpenText
Published By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector
    
BitSight Technologies
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: Silanis     Published Date: Aug 30, 2015
Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.
Tags : 
silanis, esignlive, electronic signature, regulatory compliance, compliance, health records, digital signature, signature, paperwork, contracts, forms, paperwork, mobile / wireless, document imaging, electronic health records
    
Silanis
Published By: Workterra     Published Date: Jan 27, 2016
In a world of increasingly complex financial models, ever-more confusing regulatory demands, and a multi-generational, highly mobile workforce, the future of human capital management (HCM) is wide open.
Tags : 
workterra, hcm, regulation, mobile workforce
    
Workterra
Published By: DocuSign     Published Date: Mar 23, 2016
In today’s digital world, paper documents are an obstacle to doing business. Implementing a Digital Transaction Management (DTM) system can help, but financial services firms need solutions that offer bank-level security, regulatory compliance, operational efficiency, and a positive end-user experience. Read the report and discover the top 10 reasons why Financial Services firms choose DocuSign for their Digital Transaction Management and esignature solution.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Mar 23, 2016
Download this complimentary Ombud analyst report which examines best practices for leveraging DocuSign’s Digital Transaction Management solution for CIA compliance and the impact such technologies are already having on forward-thinking Fortune 500 companies.
Tags : 
    
DocuSign
Published By: Oracle     Published Date: Feb 10, 2016
There is little question that cloud is well established as a way to deliver business applications. Based on IDC research, over 70% of manufacturing companies are using hosted applications somewhere within their supply chain, with another 25% considering it. The most popular supply chain management (SCM) application areas are transportation related (transportation management, global trade management), where the "network effect" (i.e., carrier pooling, regulatory impact) can leverage both shared knowledge and existing connectivity along with sales and operations planning, demand signal management, and business intelligence/analytics. The concern that cloud is "risky" is increasingly taking a back seat to the perceived benefits of the technology. Indeed, those benefits, both achieved and anticipated, are significant, including cost, speed of implementation, and the ability to "consume" new capabilities and functionality easily and transparently.
Tags : 
oracle, supply chain cloud, supply chain best practices, idc research
    
Oracle
Published By: Cymfony     Published Date: Sep 13, 2007
The pharmaceutical industry is very interested in using social media to promote products, services and issues important to it. However, many drug firm executives are uncertain about how to tackle the legal and regulatory issues associated with social media communications.
Tags : 
health, healthcare, pharmaceuticals, pharmaceutical, social media, fda, compliance, cymfony
    
Cymfony
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Be sure your site is in compliance with government data regulations by reading about the different data regulatory standards in this white paper. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, trust, security, compliance, pci, hippaa, sarbanes-oxley, fisma, sox, security, data, data security
    
VeriSign Incorp.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.