regulatory compliance

Results 51 - 75 of 223Sort Results By: Published Date | Title | Company Name
Published By: Epicor     Published Date: Apr 01, 2009
This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.
Tags : 
epicor, grc, governance risk and compliance, supply chain visibility, erp solutions, expense management, data auditing
    
Epicor
Published By: DocuLex     Published Date: Jan 27, 2012
Automotive Dealer solution to affordable protection of customer files from identity theft and legal exposure.
Tags : 
    
DocuLex
Published By: Workday     Published Date: Aug 07, 2018
Read the whitepaper “Rochester Regional Health – Equipping HR to support the evolving demands of the health care industry” to learn how cloud-based technology helps respond to critical M&A business needs and drivers, improves operational effectiveness and efficiency, and enhances capabilities and streamline regulatory compliance.
Tags : 
    
Workday
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Customers now expect the same level of service on social media from financial firms, insurance providers, and other regulated enterprises as they receive from technology and retail companies. But without the right compliance controls in place, your organization could violate customer privacy rules and other regulatory guidelines. Are you taking the right steps to ensure compliance?
Tags : 
compliance, social media, social media management, enterprise, hootsuite
    
uberVU via HootSuite
Published By: Imprivata     Published Date: Nov 17, 2014
This whitepaper will tell you what you need to know when it comes to implementing electronic prescriptions for controlled substances.
Tags : 
imprivata, epcs, electronic prescriptions, controlled substances, solution vendors, practitioners, regulatory compliance, transmitted electronically, dea regulations
    
Imprivata
Published By: MarkLogic     Published Date: Mar 29, 2018
Executives, managers, and users will not trust data unless they understand where it came from. Enterprise metadata is the “data about data” that makes this trust possible. Unfortunately, many healthcare and life sciences organizations struggle to collect and manage metadata with their existing relational and column-family technology tools. MarkLogic’s multi-model architecture makes it easier to manage metadata, and build trust in the quality and lineage of enterprise data. Healthcare and life sciences companies are using MarkLogic’s smart metadata management capabilities to improve search and discovery, simplify regulatory compliance, deliver more accurate and reliable quality reports, and provide better customer service. This paper explains the essence and advantages of the MarkLogic approach.
Tags : 
enterprise, metadata, management, organizations, technology, tools, mark logic
    
MarkLogic
Published By: MarkLogic     Published Date: May 07, 2018
Executives, managers, and users will not trust data unless they understand where it came from. Enterprise metadata is the “data about data” that makes this trust possible. Unfortunately, many healthcare and life sciences organizations struggle to collect and manage metadata with their existing relational and column-family technology tools. MarkLogic’s multi-model architecture makes it easier to manage metadata, and build trust in the quality and lineage of enterprise data. Healthcare and life sciences companies are using MarkLogic’s smart metadata management capabilities to improve search and discovery, simplify regulatory compliance, deliver more accurate and reliable quality reports, and provide better customer service. This paper explains the essence and advantages of the MarkLogic approach.
Tags : 
agile, enterprise, metadata, management, organization
    
MarkLogic
Published By: XpertHR     Published Date: Aug 02, 2018
When it comes to managing the risk of sexual harassment claims, today’s headlines and news stories make it abundantly clear that it’s not just what you’re doing today that may create risk—but what you’ve done, or haven’t done, in the past. XpertHR’s recent Sexual Harassment Survey revealed a wide range of responses from employers hoping to tackle the issue in 2018. New and vastly varying federal and state laws challenge HR professionals to remain on top of regulatory requirements related to policies, training and other compliance issues. XpertHR’s webinar, “Coming Soon: 50 States, 50 Sexual Harassment Training Laws,” will help you ensure you’re prepared, compliant and poised to act appropriately amid a growing number of regulations and continually emerging claims. Get tips from expert attorneys who will help you get up-to-date on: ? New training requirements for private sector employers in New York and varying requirements in other states ? Why high-quality harassment training i
Tags : 
sexual harassment, compliance training, #metoo, harassment training, harassment claim, compliance, harassment, employee management
    
XpertHR
Published By: Dassault Systèmes     Published Date: May 09, 2018
More connected, informed and demanding customers have the financial services sector looking closely at their processes and products. Collaborative digital platforms can transform your value network and approach. • Improve data insights: Transform legacy systems, manual processes and data silos for consumer-centric collaboration. • Compete with agile FinTech startups: Use disruptive technologies to meet clients’ changing needs. • Empower me to make my own decisions: Give self-directed customers exceptional experiences, like rapid enrolment and self-assessment tools. • Turn regulatory compliance to competitive advantage: Use digitization to improve compliance, reduce risk and enhance governance. • Improve customer experience through digitization: Reduce regulatory issues, gain insights, increase efficiency and customer-centric innovation. I invite you to download your targeted industry analysis and uncover the expectations to take into account at every stage to be disruptive in the age o
Tags : 
    
Dassault Systèmes
Published By: TIBCO Software     Published Date: May 20, 2019
The biggest headache for most payment operations teams is cost control — and a large part of it comes from fraud management: Investigation teams waste large amounts of time just assembling the data needed to make decisions. Detection engines are always playing catchup with the latest fraud patterns. Ever changing regulations increase the time and cost required to reach compliance and meet audit standards. Given their scope and impact, replacing core fraud systems is not an option for most firms. But instead of replacing them, you can improve the investigative process with augmented investigation, and improve the detection process by enhancing current systems. This whitepaper describes three ways financial services firms can use TIBCO solutions to lower the cost of investigations through faster results, reduce fraud losses through better detection, and simplify audit and regulatory compliance through centralized access to information.
Tags : 
compliance, audit, fraud, data, detection, transactions, investigation, cost
    
TIBCO Software
Published By: Oracle     Published Date: Oct 20, 2017
Traditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance
Tags : 
    
Oracle
Published By: Mimecast     Published Date: Apr 18, 2017
"Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance."
Tags : 
forrester, gdpr, organizational processes, security, compliance
    
Mimecast
Published By: Innotas     Published Date: Jan 09, 2014
Learn to escape the chaos of regulatory compliance with Integrated IT Portfolio Management. This eBook for healthcare IT executive shares how to gain greater visibility into the delivery and execution of complex projects such as implementing EHR implementation, ICD-10 compliance efforts and the Affordable Care Act.
Tags : 
innotas, meaningful use, icd-10 compliance, project management system, portfolio management, project management office, it governance, governance model, resource management software, ppm software, it project portfolio management, apm saas, pmo services, ppm tools, information technology, practice management
    
Innotas
Published By: IBM Corporation     Published Date: Oct 20, 2011
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Tags : 
ibm, guardium, technology, data, security, privacy, risk reduction
    
IBM Corporation
Published By: LogRhythm     Published Date: Jan 24, 2013
Gartner's 2012 SIEM Magic Quadrant report that positions LogRhythm as a leader against other technologies designed to collect, store, analyze and report on log data for regulatory compliance and forensics.
Tags : 
logrhythm, magic quadrant, security information, event management, gartner
    
LogRhythm
Published By: AWS     Published Date: Aug 23, 2018
AWS supports healthcare organizations with HIPAA Eligible Services and the AWS Healthcare Compliance program. AWS products and services are being used by many customers that handle electronic patient health information (PHI) to build solutions that meet HIPAA and HITRUST regulatory requirements for cloud-based workloads. In this webinar, you’ll learn how AWS HIPAA Eligible Services can help you build secure workloads to handle PHI in compliance with HIPAA and HITRUST standards. AWS Healthcare experts will be joined in this webinar by AWS Partner Network (APN) Partners ClearDATA and Cloudticity.
Tags : 
    
AWS
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.
Tags : 
trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance, proactive network security
    
TriGeo Network Security
Published By: IBM     Published Date: Apr 18, 2012
Join this webcast to learn how HealthCare specific Asset and Service Management functionality can improve uptime to support patient care and optimize procedure scheduling, control costs for procurement, maintenance, labor and materials, extend asset longevity, and Support regulatory compliance activities.
Tags : 
healthcare, cost, ibm, asset management, service management, technology
    
IBM
Published By: IBM     Published Date: Apr 27, 2012
During this Webcast, Axendia Industry Analyst Daniel Matlis discusses with Mr. Lentz how The Johns Hopkins Hospital uses its Integrated Asset and Service Management solution to improve uptime to support patient care; control costs for procurement, maintenance, labor and materials; support regulatory compliance activities; and use workflow capabilities for internal controls.
Tags : 
healthcare, ibm, labor, maintenance, patient care
    
IBM
Published By: McAfee     Published Date: Jan 23, 2013
Information security based on regulatory compliance stipulations cannot keep up with today’s sophisticated and rapidly changing threat landscape. CISOs need to implement a new discipline that ESG calls, “Real-time Risk Management."
Tags : 
enterprise strategy group, esg, jon oltsik, real-time risk management, threats and vulnerabilities
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.
Tags : 
vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.