control

Results 351 - 375 of 2111Sort Results By: Published Date | Title | Company Name
Published By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : 
hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
    
dvsAnalytics
Published By: Gleanster Research     Published Date: Oct 26, 2013
This Deep Dive research study from Gleanster explores how Top Performing organizations are using a new class of multi-channel campaign management technology called "local marketing automation" to empower local / regional marketers with marketing technology while simultaneously maintaining corporate control over the brand.
Tags : 
    
Gleanster Research
Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : 
software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction, ibm tivoli, business alignment, it infrastructure library, itil, it strategy, it planning, software licences, analytics, audit preparedness, virtualization, cloud, saas
    
IBM
Published By: TAKE Supply Chain     Published Date: Mar 18, 2016
TAKE's tailored solution for Applied Materials delivered real-time information and enhanced controls from the initial order to just-in-time parts delivery to the manufacturing shop floor. Results include a 10-15% increase in on-time delivery, 30% reduction in premium freight costs, 25-30% reduction in receiving discrepancies, and an ROI of nearly 500% and $2.5 million in recurring annualized savings.
Tags : 
    
TAKE Supply Chain
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Sherwood International, a specialist in providing customised in-bound supply chain solutions into Africa, has implemented the Sage Business Cloud Enterprise Management solution business management solution to boost efficiencies in its operations and gain better visibility into its business. It has also been able to streamline finances and improve operational controls.
Tags : 
    
Sage Software (APAC)
Published By: Cohesity     Published Date: Aug 21, 2018
As one of the nation’s largest and most sophisticated controlled-temperature food distribution companies, Burris Logistics offers over 60 million cubic feet of freezer warehousing space in 15 strategic locations along the East Coast. For over 90 years, Burris has been a family-owned, family-run business that employs over 1500 people. Burris has built a solid reputation through strong culture, people and commitment to its customers - all reasons why national leading retailers turn to them for custom supply chain solutions.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 24, 2018
As one of the nation’s largest and most sophisticated controlled-temperature food distribution companies, Burris Logistics offers over 60 million cubic feet of freezer warehousing space in 15 strategic locations along the East Coast. For over 90 years, Burris has been a family-owned, family-run business that employs over 1500 people. Burris has built a solid reputation through strong culture, people and commitment to its customers - all reasons why national leading retailers turn to them for custom supply chain solutions. Download this case study to learn how Cohesity helped Burris Logistics reduce their backup windows by over 80%.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Nov 20, 2018
As one of the nation’s largest and most sophisticated controlled-temperature food distribution companies, Burris Logistics offers over 60 million cubic feet of freezer warehousing space in 15 strategic locations along the East Coast. Burris Logistics IT Team manages two data centers, one primary and another DR site that supports multiple remote locations up and down the East Coast. Download this case study to see how Burris Logistics acheived these benefits: - Over 80% reduction in backup windows - 25% CapEx savings and ongoing OpEx savings - Simplified operations with an easy-to-use and manage UI
Tags : 
    
Cohesity
Published By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : 
cloud reporting, business management, economic impact, forrester, consulting, business technology, data center
    
IBM
Published By: Okta     Published Date: Mar 10, 2016
To manage and control how the airport's employees make use of these cloud-computing services, Gatwick has turned to the cloud-based identity management service from Okta, which lets the security manager centrally manage, provision and de-provision single sign-on access to cloud services for Gatwick's staff.
Tags : 
    
Okta
Published By: Tapinfluence     Published Date: Jun 07, 2016
This study looks at the effects of influencer marketing on in store sales. The study uses point of sale data to compare purchases from consumers exposed to influencer content to a matched control group of consumers who did not see influencer content.
Tags : 
marketing, content marketing, best practices, business optimization, business practices
    
Tapinfluence
Published By: Litmos     Published Date: Apr 27, 2015
Read this white paper to learn how IOFM used Litmos resulting in: - Cost Savings - User Engagement - Course Availability
Tags : 
finance, controllership, user engagement, accessibility, mobile access
    
Litmos
Published By: Cohesity     Published Date: Aug 21, 2018
WestLotto is Germany’s largest lottery provider and the control centre for the transnational lottery Eurojackpot including 18 European countries. The company has been in operation for more than 60 years. The 350 employees at the WestLotto headquarters in Münster look after more than 3,300 sales outlets and the internet gaming platform “westlotto.de”. These sales channels offer lottery products such as LOTTO 6aus49, instant lotteries and the Eurojackpot. In 2017, WestLotto processed nearly 187 million game transactions.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 24, 2018
WestLotto is Germany’s largest lottery provider and the control centre for the transnational lottery Eurojackpot including 18 European countries. The company has been in operation for more than 60 years. The 350 employees at the WestLotto headquarters in Münster look after more than 3,300 sales outlets and the internet gaming platform “westlotto.de”. These sales channels offer lottery products such as LOTTO 6aus49, instant lotteries and the Eurojackpot. In 2017, WestLotto processed nearly 187 million game transactions. Download this case study to find out how WestLotto reduced backup and recovery times by up to 98% with Cohesity’s hyperconverged secondary storage system.
Tags : 
    
Cohesity
Published By: XOsoft     Published Date: Aug 21, 2009
Mitigate risk and lower costs by letting your disaster recovery replica server double as a server for performing an offsite backup. This informative white paper will teach you how...
Tags : 
disaster plan, backup plan, backup and recovery, redundant, server replication, cost control, it spending, disaster recovery, backup, xosoft, storage, data management
    
XOsoft
Published By: Avocent     Published Date: Aug 22, 2011
Download this whitepaper to learn how to achieve secure access to any server or network device from a single interface.
Tags : 
avocent, centralized management software, best practices, data center control, secure access, remote maintenance, kvm server management, full remote access, power management, data center
    
Avocent
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic, it management
    
Cenzic
Published By: Fiserv     Published Date: Nov 06, 2017
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen.
Tags : 
automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for financial institutions and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : 
automated reconciliation, automated reconciliation for banks, automated certification, automated certification for banks, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : 
automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
    
Fiserv
Published By: Oracle     Published Date: Apr 29, 2014
This white paper examines how advanced controls can substantially improve the bottom line, the scope of the issues addressed by advanced controls, and the reasons why leading companies and experts who monitor cash leakage are increasingly looking to advanced control solutions.
Tags : 
oracle, cash leakage, cash management, improve the bottom line, vendor payments, advanced controls, knowledge management
    
Oracle
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : 
insider threat, network security, it administrator, comply with regulations, it infrastructure, compliance, change management, it management, access control, it security, netiq, net iq
    
NetIQ Corporation
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.