corporate compliance

Results 1 - 25 of 48Sort Results By: Published Date | Title | Company Name
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: Thomson Reuters     Published Date: Feb 09, 2016
Download this report for insights from industry experts on some of the biggest corporate tax shakeups in 2015, as well as key topics to keep in mind in 2016 and what that all means for tax technology.
Tags : 
global tax compliance, corporate tax software, tax technology, thomson reuters onesource, corporate income tax, direct tax, tax provision, transfer pricing, beps, fatca, tax information reporting, global trade management, supply chain management, tax data management, global tax survey, indirect tax, property tax, statutory reporting, trust tax, country-by-country reporting
    
Thomson Reuters
Published By: Thomson Reuters     Published Date: May 05, 2016
Most tax departments spend 80 percent of their time collecting and manually inputting data and 20 percent reviewing it. Using tax technology, you can flip those proportions and transform how you gather, use, store and reuse data across your global tax processes. This step-by-step guide discusses how technology can convert each challenge in your tax lifecycle to an opportunity for your success. Download today!
Tags : 
global tax compliance, corporate tax software, tax technology, thomson reuters onesource, corporate income tax, direct tax, tax provision, beps, tax data management, corporate compliance, process management, task management, data management, workpapers, international compliance, direct tax technology, direct tax software
    
Thomson Reuters
Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paperā€based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software
Published By: Ping Identity     Published Date: Jan 29, 2013
Corporate security compliance requirements are driving new demands/requirements for identity and access management (IAM). Learn how you can extend your enterprise beyond the perimeter with stronger security, less risk and higher efficiency.
Tags : 
access management, age of cloud computing, cloud, ping, iam, enterprise security
    
Ping Identity
Published By: Tripwire     Published Date: Jul 05, 2007
Find out about the requirements and issues addressed in corporate governance Bill 198, Canada's version of Sarbanes-Oxley, for internal controls for technology and how IT configuration auditing brings compliance.
Tags : 
sox, sarbanes-oxley, bill 198, canada, canadian financial, canadian sox, financial controls, compliance, compliant, tripwire
    
Tripwire
Published By: CEB     Published Date: May 19, 2014
Establishing compliance training requirements has always been difficult, but given recent changes to the regulatory and corporate work environments, the costs of failure are now more significant. To help companies get their training curricula right, CEB created a step-by-step guide to building a truly effective compliance training curriculum: one that reduces risk.
Tags : 
ceb, risk based compliance, training, reduce risk, regulatory changes, corporate work environments
    
CEB
Published By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : 
compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management
    
Computhink
Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance, california sb-1386, california state bill 1386, authentication, secure computing, securecomputing
    
Secure Computing
Published By: IBM     Published Date: Jun 17, 2014
Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. As global mandates and compliance directives continue to snowball, organizations are faced with an imminent need to adopt a programmatic approach and tightly integrate risk management initiatives with ongoing business processes. Business intelligence and reporting also provide a powerful mechanism for gaining a deep understanding of key factors that impact corporate performance.
Tags : 
ibm, corporate governance, risk, compliance, grc, erm, risk management, business analytics, business intelligence
    
IBM
Published By: Skillsoft     Published Date: May 19, 2015
This paper shows how companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives.
Tags : 
business corruption, complaince training, skillsoft, anti-corruption training, employee corruption training, changing landscape of corruption
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 13, 2015
Most companies are well aware of the risks bribery and corruption pose when operating in the global marketplace. However, what companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives. With the recent up-tick in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in other areas of the globe, including upcoming legislation in Ireland, knowledge of bribery rules and regulations has never been more critical.
Tags : 
skillsoft, corruption, bribery, foreign corrupt practices act, fcpa, compliance, compliance initiatives
    
Skillsoft
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files, the right managed file transfer (MFT) solution can allow such transfers to continue without risking the security of the corporate network. The paper explains that the right MFT solution can enable business growth, enhance operational efficiency, enable compliance, reduce costs, and increase ROI. Choosing the right MFT solution requires eight considerations described in the paper, and concludes by explaining why Globalscape solutions are the choice of our customers around the world.
Tags : 
    
Globalscape
Published By: IBM     Published Date: Feb 23, 2009
This webcast features addresses the challenges of protecting corporate and confidential data. It focuses on the untold story of data privacy and many of the compliance challenges that companies now face. The webcast features Dennis Gaughan and Cynthia Babb and is 55 minutes and 33 seconds.
Tags : 
ibm idm, data privacy, data security, database security, confidential data
    
IBM
Published By: BlackBerry     Published Date: Aug 26, 2008
It's important that corporate mobile policies cover everything from what types of devices will be available to users, how and when they can use them, what corporate resources they are able to access and what security measures will be instituted. Furthermore, Mobile managers must not ignore the impact of government regulations and compliance when laying out their corporate mobile policies.
Tags : 
blackberry, mobile policies, vpn, mobile devices, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : 
ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
    
NAVEX Global
Published By: NetApp Exchange Upgrade     Published Date: Dec 17, 2008
Regardless of industry or geographic location, business information is exploding on a massive scale—affecting primary, secondary, and archival storage systems. The sheer quantity of data being amassed is outpacing organizations' ability to keep tabs on it, maintain corporate compliance, meet strict government regulation, and even simply house it in a useful format that can provide invaluable history and knowledge. Learn more today.
Tags : 
netapp, microsoft exchange server 2007, netapp networked storage, storage systems, storage infrastructure, microsoft exchange deployments, server virtualization, scalability limitations
    
NetApp Exchange Upgrade
Published By: Lenovo and Microsoft     Published Date: Aug 13, 2013
In the wake of major security, management, and interface limitations, Microsoft has decided to end support for Windows XP. This decision has important implications for corporate management as it presents a number of risk, security, operations, and compliance issues. This white paper looks at the top five issues that business management must be aware of and provides non-technical business justifications for driving a migration program forward.
Tags : 
windows xp, migration, managment, top 5 threats to business
    
Lenovo and Microsoft
Published By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : 
security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber, ciso, experts, ebook
    
Tenable
Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, nemx
    
Nemx Software Corporation
Published By: Mimecast     Published Date: Sep 30, 2008
Infrastructures of potentially dozens of servers have built up around corporate email systems to provide better governance, reduced risk and improved legislative compliance - anti-virus, anti-spam, attachment handling, encryption, disclaimers, archiving and hot-standby mail servers to name a few.
Tags : 
mimecast, saas, software as a service, email archive, cpr, email evidence, ediscovery, medium-size business, esg, storage
    
Mimecast
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
Aberdeen - youSENDit
Published By: IBM     Published Date: Dec 30, 2008
Corporate master data is a critical asset that must be increasingly managed within and beyond the enterprise, primarily to solve business problems in compliance, customer service, sales, and marketing. Such master data may be indentified, harmonized and integrated at multiple levels of the software stack to materialize a single customer view (or supplier, product, view etc.).
Tags : 
ibm, enterprise master data management, corporate master data, data integration
    
IBM
Published By: SilkRoad Technology     Published Date: Feb 24, 2016
For decades, learning in a corporate environment consisted of a day or a week of classroom-based training. However, technological advances delivered on the promise of a more complex learning protocol with automated, virtual, and experiential elements. At Connections 2014, SilkRoad’s annual user conference, a panel of learning professionals convened to discuss five major learning themes this year, including integration, mobility, engagement, compliance, and analytics.
Tags : 
silkroad, human resources, industry trend, learning
    
SilkRoad Technology
Published By: Polycom     Published Date: May 12, 2015
To mitigate their risk and maintain the trust of the customer, smart FSIs are learning how to collaborate so they can incorporate all compliance programs necessary to keep them in good standing throughout their integrated businesses.
Tags : 
polycom, enterprise, collaboration, fsi, compliance
    
Polycom
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: