RecruitingBlogscom

Follow Us:

 

audit compliance

Results 51 - 75 of 102Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : 
software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction, ibm tivoli, business alignment, it infrastructure library, itil, it strategy, it planning, software licences, analytics, audit preparedness, virtualization, cloud, saas
    
IBM
Published By: ITinvolve     Published Date: Jun 01, 2012
Demonstrating PCI compliance with policies and regulations is an IT necessity, especially when periodic audits are conducted. ITinvolve has a better approach to change management with the capability to identify official PCI systems and their associated policies and documentation thus eliminating manual processes and reducing the risk of errors and delays.
Tags : 
it operations, information technology, audit, compliance, pci, governance, business technology
    
ITinvolve
Published By: CDW     Published Date: Feb 24, 2015
Software piracy, whether accidental or malicious, is a problem for software vendors as these activities can directly affect the bottom line. Organizations that use software are affected as well. Along with rising software prices, they can face stiff fines and other costs for noncompliance with software licenses. This can come as a result of an audit that software vendors are more inclined to initiate in a lackluster economy. This white paper will discuss actions to take before, during and after an audit. As well as outline the best ways for the enterprise to remain compliant with software licenses.
Tags : 
software piracy, software vendors, audit, software licenses, software compliance, piracy misconceptions, business technology
    
CDW
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications, business technology
    
Intralinks
Published By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : 
workforce mobility, manage and secure, business data, enterprise, collaboration solution, security, enterprise applications
    
Intralinks
Published By: Globalscape     Published Date: Jun 27, 2014
Globalscape’s Enhanced File Transfer™ (EFT™) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper discusses how EFT, the HSM, and ARM can help you achieve compliance and stay compliant with the PCI DSS.
Tags : 
globalscape, enhanced file transfer, high security module, auditing, reporting, security practices, compliance, file transfer, records management
    
Globalscape
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation
Published By: Numara Software     Published Date: Jul 16, 2009
Software Compliancy issues are time consuming and are an expensive undertaking. See how easy Software Compliance can be with Numara® Track-It! ®. Software License Management is included with the Numara® Track-It! ® Audit license at no extra cost! • Manage Software Serial numbers and activation keys • Understand which software you own, lease or rent; where they are located and when they expire • Easily identify assets which may have license overages • Fully integrated with the Numara® Track-It!® Inventory and Purchasing modules 
Tags : 
software compliancy, numara, track it, software license management, audit, purchasing, inventory, license overage, compliance, best practices, software, audit software, license contracts, it fail, purchasing, license, role responsibility, imaging computers, security
    
Numara Software
Published By: Avalara     Published Date: Jan 28, 2014
While sales tax compliance is no laughing matter, the following list of what to do to increase sales tax audit risk hopefully demonstrates the right approach to ensuring real compliance. Here are 8 (tongue-in-cheek) surefire ways to increase your company’s sales tax audit risk. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, business technology
    
Avalara
Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, website development, enterprise applications, small business, finance, e-commerce, retail
    
Avalara
Published By: Tripwire     Published Date: Jul 05, 2007
Discover how high-performing IT organizations are able to create a culture that supports and uses change management to their advantage, facilitating enterprise business goals.
Tags : 
cmdb, configuration management, auditing, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, it management
    
Tripwire
Published By: Tripwire     Published Date: Aug 21, 2009
This paper covers the implementation, disclosure and ongoing evaluation of internal controls for SOX compliance with a focus on the role of IT, as well as the penalties for non-compliance.
Tags : 
sarbane oxly act, sarbanes oxley, sox, sarbox, sarbanes-oxley, financial, it management, audit, compliance, auditing, enron, tripwire, data management
    
Tripwire
Published By: Tripwire     Published Date: Jul 05, 2007
Find out about the requirements and issues addressed in corporate governance Bill 198, Canada's version of Sarbanes-Oxley, for internal controls for technology and how IT configuration auditing brings compliance.
Tags : 
sox, sarbanes-oxley, bill 198, canada, canadian financial, canadian sox, financial controls, compliance, compliant, tripwire, it management
    
Tripwire
Published By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : 
change management models, auditing, configuration management, security, change management, network security, efficiency, productivity, tripwire, cmdb, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, change control
    
Tripwire
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : 
tripwire, information security, infrastructure, change management, change, change auditing, security
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : 
tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness, fda, solutions, solution, electronic systems, hipaa, policy, requirements, electronics
    
Tripwire
Published By: Tripwire     Published Date: Jun 30, 2009
Learn how Tripwire can help you deploy a comprehensive configuration assessment and control solution that: a) reduces the time and resources required to verify compliance and prepare for audits; and b) maintains continuous compliance by allowing IT to immediately identify any exceptions and trigger remediation of configurations that do not conform to policy.
Tags : 
tripwire, automate, fisma, compliance, configuration, assessment, solution, audit, policy, electronic systems, infrastructure, security, management, control, documentation, it management
    
Tripwire
Published By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : 
tripwire, information security, audit fatigue, compliance, security risk
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing
    
Tripwire
Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems, security
    
IBM
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
With competition growing for your prospects’ attention, it’s never been more important to create powerful messaging that builds a bridge between an issue that’s on their minds and your company’s solution or service. This white paper outlines three steps for creating relevant messages and effective calls to action.
Tags : 
calls to action, bds, bulldog solutions, messaging, planning, promotion planning, lead gen, topics, messages, effective calls to action, audience, audit, gap, compliance, black box
    
Bulldog Solutions
Published By: Splunk Inc.     Published Date: Jun 02, 2009
Compliance is high on the IT agenda today, yet no one seems to have a clear picture of what it really involves. Inconsistent interpretation by different auditors, regulators and vendors means what worked in one year's audit could fail in the next. This whitepaper is designed to help Demystify Compliance as it relates to IT and give you some simple recipes for analyzing your own environment in the light of specific mandates.
Tags : 
compliance, splunk, it agenda, it security, regulations, proof-of-compliance, pci, hipaa, sox, ad-hoc, search, privacy, secure, customer privacy, financial markets, it search, reporting, security
    
Splunk Inc.
Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top