RecruitingBlogscom

Follow Us:

 

audi

Results 301 - 325 of 1014Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, jennifer bayuk, bear stearns, ciso, application security best practices
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, ciso, cyber crime, breaches, information technology, c-level
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Adrian Asher, Chief Security Officer at Betfair, an online UK betting exchange explains how he manages a “culture of security” and protects the Betfair brand in this 20-minute candid interview.
Tags : 
betfair, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, brand
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
With an extensive background in police, military, government, and industry security, Howard Schmidt explains how to respond to the changing landscape of cyber threats and how business leaders are helping set the standards for application security. He then profiles industry role models who are setting the standard for application security.
Tags : 
howard schmidt, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: SAP Inc.     Published Date: Jul 28, 2009
Companies can squeeze further business benefits from their existing SAP ERP and supply chain systems in order to save money at a time when it's desperately needed. This Report, which summarizes detailed data from a field study conducted exclusively for AMR Research SAP Peer Forum clients, was written to help business audiences looking for every opportunity to reduce the total business expenses of their huge, existing investments in SAP.
Tags : 
sap, fast payback, detailed data, business expense projects, sap erp, supply chain systems, amr, peer forum, business intelligence, field study, purchasing, order fulfillment, manufacturing, coe, cost of excellence
    
SAP Inc.
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, sox, sarbanes-oxley, hipaa, glba, pci, cross-platform, auditing, logging, security, rbac, entitlements, privilege management
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
    
Centrify Corporation
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
Organizations face many challenges when creating a constellation of global Web sites. They need to maintain brand consistency while allowing for variations that reflect local culture. Creating truly localized Web sites can be a daunting process, in which corporate and local marketing teams need to work together to provide relevant information to many different target audiences.
Tags : 
sdl tridion, a/b, crm, ecm, blueprinting, flysn, wcm, dam, wcm, web content management, multisite functionality
    
SDL Web Content Management Solutions
Published By: SDL Web Content Management Solutions     Published Date: Jul 06, 2010
In today's connected world, a well managed Web presence is essential for any organization to achieve business success. The internet provides unprecedented opportunities for border-free communication. Many organizations use the internet to reach worldwide audiences. These organizations need to balance centralized messages and branding with localized content and contributions. SDL Tridion's BluePrinting technology allows you to create this balance.
Tags : 
sdl tridion, blueprinting, communication, localization, multidimensional communication
    
SDL Web Content Management Solutions
Published By: Ambrose Group     Published Date: Nov 29, 2010
Professional Employer Organizations partner with businesses to manage payroll, employee benefits, and back-office HR administration. The PEO solution involves a legal arrangement called "co-employment" which allows the PEO to make payroll, deposit employment taxes, and provide insurance benefits from its own account, rather than as an agent or on behalf of its client.
Tags : 
ambrose, peo, hedge funds, management, professional employer organizations, fixed fee, esac, audited statements, administration, human resources management
    
Ambrose Group
Published By: 8x8, Inc.     Published Date: May 13, 2013
As voice, video, and data networks meld into a single user experience, solutions that integrate phone service, unified messaging, voicemail, audio and video capabilities, rich-media conferencing, and mobility solutions are in high demand.
Tags : 
8x8, voip, mobility, pbx, voice over internet protocol
    
8x8, Inc.
Published By: Ambrose Group     Published Date: Nov 23, 2010
Professional Employer Organizations partner with businesses to manage payroll, employee benefits, and back-office HR administration. The PEO solution involves a legal arrangement called "co-employment" which allows the PEO to make payroll, deposit employment taxes, and provide insurance benefits from its own account, rather than as an agent or on behalf of its client.
Tags : 
ambrose, peo, hedge funds, management, professional employer organizations, fixed fee, esac, audited statements, administration
    
Ambrose Group
Published By: Intacct Corporation     Published Date: Jun 18, 2014
In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!
Tags : 
intacct corporation, accounting and financial software, roi, auditing, networking, software development, it management, business technology, personal finance, finance, e-commerce, research
    
Intacct Corporation
Published By: Intacct Corporation     Published Date: Mar 31, 2014
Independent external audits of GAAP financial statements are an inescapable reality for finance professionals. External audits are required by statute for public companies and are also becoming the norm among private companies experiencing growing demands for transparency from regulators, investors, and other stakeholders.
Tags : 
cloud accounting software, finance, streamline, revenue recognition, accounts receivable, financial audits, audit preparation
    
Intacct Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
Learn the 10 critical database activities & behaviors enterprises should audit now.
Tags : 
ibm, guardium, database, audit, security, risk, monitoring
    
IBM Corporation
Published By: JobApp     Published Date: Jul 26, 2012
Experts say an automated I-9 management solution can greatly reduce the risk of fines and penalties resulting from audits. But many purchasers believe false myths about the systems, and not all systems are created equal.
Tags : 
jobapp, form i-9, paperless, onboarding, automated i-9 management, human resources management
    
JobApp
Published By: Turn     Published Date: Mar 27, 2014
Download this report to learn about how the rise of the cross-channel brand.
Tags : 
turn, marketing, global marketing, global audience, global digital audience, cross-channel brand, social networking, consumer engagement, roi, analytics, ecpm, audience targeting, emerging marketing, social media
    
Turn
Published By: Turn     Published Date: Jun 17, 2014
Every day, the Turn marketing platform collects massive amounts of data on consumer behavior, resulting in an unprecedented level of game-changing insights. Download this report to learn about the Digital Elite, the world's most valuable audience.
Tags : 
turn, advertising intelligence, global programmatic, programmatic spending, global advertising, cpm changes, growth percentage, regional insights, ad spend, spending trends, real-time insights, analytic platforms
    
Turn
Published By: The Mx Group     Published Date: Jul 12, 2017
As the number of tactics available to marketers has multiplied, it has become harder and harder for many to determine where they should focus their resources. Digital marketing, in particular, is becoming increasingly sophisticated and offers opportunities for highly targeted and effective campaigns. But as B2B marketers are designing integrated programs, many overlook a tactic that has successfully generated leads and closed sales for decades: telemarketing. Strategically deploying telemarketing to enhance engagement, nurture prospects and improve your data can make the difference between revenue that goes to your bottom line and revenue that goes out the door. This kind of direct, one-to-one communication has a natural connection with the B2B world, a field built around relationships and tightly targeted audiences.
Tags : 
digital marketing, telemarketing, lead generation, sales, engagement
    
The Mx Group
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top