Skip to content
 

risk and compliance

Results 76 - 100 of 174Sort Results By: Published Date | Title | Company Name
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending
    
Brainloop
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
Published By: NAVEX Global     Published Date: Apr 20, 2018
Discover how organisations similar to your own are developing an effective ethics and compliance programme to improve workplace culture and reduce compliance risk. Our new research will help you identify the most appropriate activities to consider for your own programme, provide the data to help benchmark your results, and the guidance to improve buy-in and programme resources. What you'll learn: How are new regulations changing potential ethics and compliance risks? What challenges do compliance professionals face when trying to improve company culture? How are organisations investing in compliance activities? What results are compliance programmes achieving?
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation. What you'll learn: How internal and external parties define programme effectiveness The eight essential components of an effective ethics and compliance programme How to share your assessment in a meaningful way
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
Learn everything you need to know about creating an engaging training programme—from defining your strategy to measuring effectiveness—in our comprehensive guide. What you'll learn: How to prevent misconduct through training How to create an engaging training programme - from defining strategy to measuring effectiveness How to develop the foundation of an ethical culture Tips, advice and examples to help organisations develop cost-effective, high-value and successful ethics and compliance training programmes How to mitigate risk and promote adherence to compliance objectives How to improve employee engagement and trust and strengthen alignment around a set of core values
Tags : 
    
NAVEX Global
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards
    
HP - Enterprise
Published By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : 
forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance, enforcement, remediation & scalability, byod, grc
    
ForeScout
Published By: Intralinks     Published Date: May 29, 2013
Ensuring the security of confidential, sensitive information is an essential element of enterprise Security and Governance, Risk Management and Compliance programs. Regulations, such as the HIPAA, FDA, and SOX, place significant requirements on organizations for securely sharing sensitive data such as confidential personally identifiable information (PII) and personal health information (PHI).
Tags : 
security, sensitive information, sharing, mobile file sharing, solutions, confidential
    
Intralinks
Published By: Tripp Lite     Published Date: Jun 28, 2018
Credit, debit and ATM card fraud costs consumers, merchants and financial institutions billions in losses every year. The payment card industry has responded by creating the PCI security standard. Merchants that fail to comply with PCI face increased risk of security breaches and substantial contractual penalties. Tripp Lite Wall-Mount Rack Enclosures help merchants achieve PCI compliance by securing network/telecommunications hardware and storage media in retail point-of-sale environments and other locations.
Tags : 
    
Tripp Lite
Published By: Pega     Published Date: Sep 11, 2015
Download thsi white paper to learn how financial institutions can implement full end-to-end compliance and risk management through Pega BPM: -Transforming compliance from burden to benefit -Ensuring KYC, Suitability and Affordability compliance -Managing and measuring complaints to resolution -Providing governance, control and transparency around new products -Agility to extend to new risks and regulatory requirements -One common platform with specialized rules by regulatory requirement, geography and risk type
Tags : 
    
Pega
Published By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
    
Kronos
Published By: Mimecast     Published Date: Nov 10, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, software as a service, saas, data loss prevention, risk and compliance, email, security
    
Mimecast
Published By: Mimecast     Published Date: Nov 10, 2010
Continuity and archiving services may prove more cost effective for email than high availability clustering, especially when considered in the light of continued governance, risk mitigation and compliance.
Tags : 
mimecast, software as a service, saas, email, business continuity, risk mitigation, compliance, clustering, archiving services
    
Mimecast
Published By: Citrix Systems     Published Date: Feb 27, 2014
New ways of working call for new ways of managing risk. Mobility, flexwork, bring-your-own device (BYOD) and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. The challenge is to allow people the flexibility they need for optimal business productivity while ensuring the security and compliance required by the enterprise. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.
Tags : 
citrix, information security, desktop virtualization, virtualization
    
Citrix Systems
Published By: Skillsoft     Published Date: Mar 06, 2014
Establishing an integrated GRC framework gives a company visibility and insight, plus the ability to reduce cost and exposure to violations, and increased control over remote operations and employees.
Tags : 
skillsoft, governance, risk management, compliance, grc framework, remote operations
    
Skillsoft
Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft
Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control, maps, leading, compliance, mandates, and helps, automate, grc, operations, federal, rules, nerc, ffiec
    
ForeScout
Published By: McAfee     Published Date: Jan 24, 2013
This paper reports on the findings when testing McAfee's Risk Management solution from a holistic risk management and vulnerability life-cycle management perspective. Download this white paper to learn more.
Tags : 
miercom lab test report, mcafee risk management, vulnerability life cycle management, security and compliance, mcafee epolicy orchestrator, mcafee global threat intelligence, mcafee labs, malware, asset inventory, mcafee vulnerability manager, vulnerability detection, mcafee gti
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor, mcafee enterprise security manager
    
McAfee
Published By: Polycom     Published Date: May 12, 2015
To mitigate their risk and maintain the trust of the customer, smart FSIs are learning how to collaborate so they can incorporate all compliance programs necessary to keep them in good standing throughout their integrated businesses.
Tags : 
polycom, enterprise, collaboration, fsi, compliance
    
Polycom
Published By: Rizepoint     Published Date: Feb 13, 2017
Consumers and other stakeholders increasingly want to know where their products come from and how they are produced. A successful Responsible Sourcing program strengthens the corporate brand by making it more predictive and adaptive to changing market needs and helping the company develop resilience, mitigate risk, improve efficiency, and better manage supplier relationships. Download this complimentary guide to read about key concepts and principles that apply to virtually any organization when managing Corporate's Responsible Sourcing guidelines, and ensuring franchisee compliance for protection of your brand and commitment.
Tags : 
    
Rizepoint
Published By: Oce Business Services     Published Date: Mar 24, 2008
Effective records management has never been more crucial to meeting corporate governance, risk management and operational mandates. Yet half of enterprises lack a fully implemented records management program. Download this white paper to learn how strategic outsourcing can help you mitigate risks, apply best practices, meet compliance mandates and improve overall records management ROI.
Tags : 
oce, records management
    
Oce Business Services
Published By: Kaseya     Published Date: Mar 12, 2015
The risks of irregular maintenance and non-compliance of IT and security policies are not only measured in dollars lost but in lives saved. With such a complex and critical proposition, efficiency is paramount to fulfilling the organization’s mission of providing quality, timely patient care.
Tags : 
healthcare, daily operations, health record system, practice management, coding software, health statistics, prescribing systems, healthcare providers
    
Kaseya
Published By: Kaseya     Published Date: Mar 12, 2015
The risks of irregular maintenance and non-compliance of IT and security policies can cost the organization much in terms of fines, lost opportunities and a damaged reputation. With such a serious and complex challenge, employing an efficient and comprehensive solution is paramount to minimize risk and instill confidence in the organization’s ability to fulfill on its compliance requirements.
Tags : 
it systems, systems management, financial institutions, banking sector, compliance hurdles
    
Kaseya
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption, compliance, data encryption, data protection, regulation compliance, efficiency
    
Citrix ShareFile
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.