compliance

Results 76 - 100 of 1952Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Feb 04, 2015
In the last few years there have been radical changes in the ways organizations operate and people work. Explosion of data, increased mobile demands, and the globalization of business in general are making 24/7 access to people and information the norm. Sophisticated cyber attacks are requiring robust systems security designed to counter new threats. And velocity is now essential when delivering new IT services.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
With support for Windows Server 2003 ending, transitioning to Server 2012 is clearly a must for companies. While migration will be an adjustment for organizations relying on niche applications that are 10 years old, the costs of not upgrading to Server 2012 could prove fatal.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, cloud, platforms, future, mobility, standardization, byod, virtualization
    
Dell
Published By: Key Private Bank     Published Date: May 22, 2018
There are obviously a variety of choices open to you: a spreadsheet plug-in may be appropriate if you are only focused on general ledger reporting and do not have concerns over security or compliance. You might also suppose that this is a low-cost option, though we would argue that the remediation required, the additional audit fees and the lack of repeatability means that this is a false economy and that this approach will end up costing you more in the long term. A second use case would be where you already have a financial reporting solution installed, when the add-on facilities for purposes such as business intelligence are likely to be your major focus. In this case an Oracle based solution is likely to be as good as anything else.
Tags : 
finance, business, planning, integration, strategy, company
    
Key Private Bank
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware, anti-virus, software, protection, solutions
    
Dell
Published By: CDC Software     Published Date: Mar 03, 2011
A Practical Guide to Successfully Addressing Your Industry-Specific Requirements.
Tags : 
cdc software, erp application, process manufacturers, process manufacturing, compliance
    
CDC Software
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.
Tags : 
mobile connectivity, byod, device security, policy compliance, enduser, pulse secure, mobile worker
    
PulseSecure
Published By: FICO     Published Date: Aug 27, 2012
This white paper provides a step-by-step guide to ensuring success with your business rules management project. You'll learn the components of a successful business rules management project.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance, access policy, user provisioning, access certification, access intelligence, user access, onboarding
    
FICO
Published By: Alert Logic     Published Date: Sep 03, 2014
As more organizations consider a move to the cloud, security remains a top concern. Learn how Alert Logic’s suite of security solutions are designed to provide infrastructure and application security and compliance through a cloud-native model that takes advantage of the AWS business model and elastic scaling capabilities.
Tags : 
alert logic, amazon web security solutions, aws business model
    
Alert Logic
Published By: Schneider Electric     Published Date: Jun 06, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Schneider Electric     Published Date: Nov 21, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 02, 2018
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : 
arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
    
Schneider Electric
Published By: Iron Mountain     Published Date: Aug 28, 2014
Download this infographic to learn 5 common myths about EMR Transition and enterprise-wide information governance revealed in a survey conducted by Iron Mountain.
Tags : 
iron mountain, him, health information managers, healthcare technology, information management, healthcare it, emr, emr transition, enterprise-wide information governance, compliance, information technology
    
Iron Mountain
Published By: IFS     Published Date: Jan 04, 2012
How do Oracle and Microsoft SQL Server database platforms compare on reliability, scalability and cost? Download this whitepaper for details.
Tags : 
superior solutions, clarity, compliance, control, investment, advisor, regulators, technology
    
IFS
Published By: IFS     Published Date: Jan 04, 2012
How can ERP with Green SCM tools help manufacturers satisfy green supply chain requirements in order to satisfy customers and regulators? Find out now
Tags : 
superior solutions, clarity, compliance, control, investment, advisor, regulators, technology
    
IFS
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: ADP     Published Date: Jun 09, 2017
One of the most powerful ways to save time – and to defuse a potential payroll time bomb – is by automating tasks to help simplify your job. When you do, you can benefit from time-savings, greater accuracy and improved compliance.
Tags : 
time, errors, payroll, simplify, adp
    
ADP
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
Published By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
    
Teradata
Published By: Nuance EMEA     Published Date: Jun 04, 2019
New market entrants are shifting the way the financial sector operates, new business models are changing customer expectations, and ever-changing client demographics are forcing businesses to adapt the way they work. As we move into a decade of artificial intelligence (AI) and digital innovation, huge opportunities are opening up for the financial sector to combat these changes. But with this comes new challenges, and exponential increases in available information must be accompanied by smart tools and processes to make sense of it, ensure regulatory compliance, and add real value to clients. To find out more, download this ebook!
Tags : 
    
Nuance EMEA
Published By: Sage EMEA     Published Date: Nov 05, 2018
This report was produced specifically for the UK and Ireland (UK/I) region and is based on data gathered from real-world business leaders explaining how they perform tasks on a daily basis. In the report, we will look at how business managers can step up from the operational tasks and focus on work that will propel their business forward. We will: • Touch on the priorities of what we could be termed 'accelerated business leader's': those decision makers leading their industries forward in a way that harnesses emerging technologies and agile new ways of working. • Examine key factors that hold businesses back and limit business growth. • Explore the technologies that can drive operational agility and scale.
Tags : 
finance, cashflow, compliance, process efficiency, automation
    
Sage EMEA
Published By: Emmi Solutions     Published Date: Sep 12, 2013
You are accountable for results. Your engagement partner should be too. Proof over promises: Total engagement can deliver proven clinical and fiscal success. Read this paper to learn how 8 elements can create total patient engagement that pays off.
Tags : 
experience, engagement, compliance, patient activation, activation, patient satisfaction, population health, outcomes, clinical outcomes, financial outcomes, accountable care, empower, aco, medical home, triple aim
    
Emmi Solutions
Published By: Emmi Solutions     Published Date: Nov 01, 2013
This paper provides a framework to help healthcare organizations achieve effective, affordable and measurable patient empowerment, encouraging populations of patients to take greater responsibility for their own care.
Tags : 
experience, engagement, compliance, patient activation, activation, patient satisfaction, population health, outcomes, clinical outcomes, financial outcomes, accountable care, empower, aco, medical home, triple aim, information technology, practice management
    
Emmi Solutions
Published By: Entrust Datacard     Published Date: May 10, 2017
Entrust Datacard provides customers with a commercial security public key infrastructure (PKI) solution that addresses authentication and data protection needs for enterprise and government customers
Tags : 
    
Entrust Datacard
Published By: ServiceNow     Published Date: Nov 05, 2012
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
itam, servicenow, it asset management, software asset management, sam, security, drive standardization
    
ServiceNow
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.