compliance management

Results 1 - 25 of 453Sort Results By: Published Date | Title | Company Name
Published By: Spredfast     Published Date: Aug 24, 2018
It only takes one accidental Tweet to undo years of brand reputation. It's important to understand the opportunities and risks your brand faces on social, and what you can do about them. Download this whitepaper to learn more about the risks and gain advice and tips on how to protect your brand.
Tags : 
social media risk management, risks of social media, social media compliance, social media user management, social media security, social media management tools, social media monitoring, social media governance, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, social media management software, social media marketing tools, social media monitoring tools, social media management company
    
Spredfast
Published By: Datastax     Published Date: Aug 27, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 28, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The combination of legislation, market dynamics, and increasingly sophisticated risk management strategies requires you to be proactive in detecting risks like fraud quicker and more effectively. Dynamic detection systems need to adapt to evolving compliance regulations, scale to deal with growing transaction volumes, detect sophisticated risk specific patterns, and reduce false-positives. TIBCO's Risk Management Accelerator uses a combination of predictive analytics, streaming analytics, and business process management to deliver a powerful and cost-effective system for detecting anomalies. Download this solution brief to learn more.
Tags : 
    
TIBCO Software APAC
Published By: XpertHR     Published Date: Jun 13, 2018
Multiple locations. Many hourly employees. Myriad pay rates and scheduled hours. Add multiple sick leave laws to the mix. The result: potential chaos and confusion. XpertHR can help. We take the complexity out of staying on top of the shifting paid sick leave law landscape to ensure compliance, understanding and clear employee communication. Michigan and Indiana are banning local sick leave laws. Cities from San Francisco to New York City are leading the pack in favor of them. These and other states and cities around the country are creating a complex playing field for HR professionals when it comes to ensuring compliance with paid sick leave laws. You don’t have the time, or resources, to stay on top of these trends. We do! ? Understanding variations and similarities in laws across jurisdictions ? Understanding how local laws relate to federal and state laws ? Identifying implications related to temporary and contract staff ? Ensuring compliance with notification, documentation, acc
Tags : 
paid sick, leave management, employee leave, compliance, leave laws, employee management, employee benefit
    
XpertHR
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: Oracle     Published Date: Jan 12, 2017
In this report, you will learn why: • Business stakeholders need better planning, insight, reporting and compliance. • Why Oracle is a leader in Enterprise Performance Management. • Modeling and management reporting are key differentiators as EPM moves rapidly to SaaS.
Tags : 
    
Oracle
Published By: Digital Realty     Published Date: Feb 24, 2015
Enterprise data center clients operate in some of the most complex and regulated environments in the world. These clients need assurance that their partners are up to the challenge of meeting their needs and operating effectively within a dynamic ecosystem. For the client-focused data center solutions provider, this presents a perfect opportunity to differentiate its services from those of other solution providers who simply provide five 9’s. See how they manage the regulatory landscape.
Tags : 
compliance, data center, management
    
Digital Realty
Published By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet
Published By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet
Published By: ServiceNow     Published Date: Jul 12, 2013
"Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges."
Tags : 
software, asset management, software asset management, webinar, software development, it management, data management, business technology
    
ServiceNow
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Discover how your business can institute an effective management strategy to reduce costs, increase productivity and manage document related risks by outsourcing your document process management function.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management, document management services, managed print services, document processing center, document workflows, business management, business imaging, knowledge management, enterprise applications
    
Canon Business Process Services
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Gain control of your organization’s records, proactively maintain regulatory compliance and, most importantly, protect your firm from legal risk and exposure by reading an important whitepaper on best practices for administering a successful program.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic records, electronic records management, document imaging, document imaging services, document management, document management services, business management, business imaging, business performance, document workflows, business outsourcing, knowledge management, enterprise applications
    
Canon Business Process Services
Published By: Canon Business Process Services     Published Date: Aug 28, 2013
Effective records management programs mitigate records compliance risk, leverage proven technology, gain more control over its information assets, improve operational efficiency and offer the ability to continuously improve.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management, document management services, managed print services, document processing center, document workflows, business management, business imaging, knowledge management, enterprise applications
    
Canon Business Process Services
Published By: CA Technologies     Published Date: Aug 26, 2016
Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: Skillsoft     Published Date: Apr 27, 2015
To compete in today’s global marketplace, employees at every level of your organisation need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions - even when no one is watching.
Tags : 
skillsoft, conduct programme, compliance training programme, workplace, risk, compliance issues, culture of workplace, elearning, learning management system
    
Skillsoft
Published By: The TriZetto Group     Published Date: Aug 01, 2011
Learn how to maximize efficiencies through greater system integration and automation, enable seamless interactions with providers, members and other constituents, and drive increased healthcare value with automated, value-based programs.
Tags : 
trizetto, trizeto, healthcare reform for payers, payers and healthcare reform, reform and payers, compliance with reform, administrative efficiency, technology, icd-10, 5010, claims administration, mlr requirement, value-based insurance design, value-based reimbursement programs, healthcare information technology, population health management, mlr
    
The TriZetto Group
Published By: Adobe     Published Date: Feb 20, 2014
Award-winning design practice advances architecture, interior design, and planning excellence by standardizing on Adobe Creative Cloud and Adobe Acrobat® Pro.
Tags : 
adobe, adobe creative cloud, software, software deployment, enterprise agreement, license management, document security, compliance, collaboration, productivity, file management, pdf files, it management, document management, standardization, software development
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.
Tags : 
adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment, license management, productivity, document security, compliance, industry regulations, file management, document management, software development
    
Adobe
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.