Skip to content
 

software compliance

Results 1 - 25 of 150Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software APAC     Published Date: May 31, 2018
With data the new competitive battleground, businesses that take advantage of their data will be the leaders; those that do not will fall behind. But gaining an advantage is a more difficult technical challenge than ever because your business requirements are ever-changing, your analytic workloads are exploding, and your data is now widely-distributed across on-premises, big data, the Internet of Things, and the Cloud. TIBCO® Data Virtualization is data virtualization software that lets you integrate data at big data scale with breakthrough speed and cost effectiveness. With TIBCO Data Virtualization, you can build and manage virtualized views / data services that access, transform, and deliver the data your business requires to accelerate revenue, reduce costs, lessen risk, improve compliance, and more.
Tags : 
    
TIBCO Software APAC
Published By: Abacus Labs     Published Date: Jun 14, 2018
The purpose of expense reporting software is to streamline your team’s workflow for submitting and reviewing business expenditures. By implementing an expense management solution, you can decrease the time and costs associated with processing expenses and increase your visibility into the implications of business spend, while helping improve general expense policy compliance and reduce expense fraud.
Tags : 
reporting, software, expense, finance, business, management
    
Abacus Labs
Published By: Epicor     Published Date: Apr 17, 2018
Running a successful firearms and shooting sports retail business offers unique challenges. To achieve growth, you need a software solution that streamlines nearly every aspect of your firearms business—letting you focus on running a more compliant, efficient, and profitable operation. Created in collaboration with Orchid Advisors, Epicor FFL Compliance Manager is a robust, cloud-based system for firearms retailers that seamlessly manages ATF compliance for higher profits and faster growth. This fast, easy-to-use bound book solution can: • Quickly package compliance reports on demand and review bound book activity with dashboards to support ATF inspections • Save time by scanning serial numbers instead of entering them manually • Relieve audit stress thanks to easy access to bound book data and on-demand, ATF-friendly reporting Read on to hear from businesses currently powered by Epicor FFL Compliance solutions.
Tags : 
firearms collection software, firearms inventory software, firearms management system, firearms tracking software
    
Epicor
Published By: Epicor     Published Date: Jul 10, 2018
In today’s competitive market, FFLs often have inadequate tools that are hindering their growth, or are often sold software rather than solutions to their ATF compliance needs—leaving them confused and less compliant than before. Fortunately, it just got easier to streamline compliance processes and keep your Bound Book up-to-date. Get the facts in a quick-reading guide from the FFL Operations experts at Orchid Advisors and the software experts at Epicor. Learn how firearms businesses like yours are using cloud technology to keep their bound book to date, making compliance tasks much simpler and more cost effective. • Why the ATF changed its rules in 2016 and how you take advantage of it • Practical tips for moving your Bound Book to the cloud, stress-free • Streamline business process and improve ATF Compliance
Tags : 
electronic bound book software, regulations, compliancy, bound book, firearms pos, atf audits, shooting sports software, a&d logging, eforms software, ffl compliance, e4473, guardrails, atf inspections, atf software, firearms retailers, atf compliance, atf eforms, businesses efficiency
    
Epicor
Published By: Workday UK     Published Date: Mar 07, 2018
Learn why a new approach is needed. Read this whitepaper, “A New Approach to Audit and Control in Enterprise Software”, and discover more about the changing landscape of control and governance. Learn how rethinking technology can be the touchstone to separation of duties, transparent business processes and comprehensive auditing. Understand: •How the changing world of control and governance places new requirements on today’s finance systems •Why legacy systems with bolt-on finance controls fail to deliver complete compliance •How technology innovations help transform the finance function and reinforce control
Tags : 
    
Workday UK
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: CDC Software     Published Date: Mar 03, 2011
A Practical Guide to Successfully Addressing Your Industry-Specific Requirements.
Tags : 
cdc software, erp application, process manufacturers, process manufacturing, compliance
    
CDC Software
Published By: ServiceNow     Published Date: Nov 05, 2012
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
itam, servicenow, it asset management, software asset management, sam, security, drive standardization
    
ServiceNow
Published By: ServiceNow     Published Date: Jul 12, 2013
"Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges."
Tags : 
software, asset management, software asset management, webinar
    
ServiceNow
Published By: Adobe     Published Date: Feb 20, 2014
Award-winning design practice advances architecture, interior design, and planning excellence by standardizing on Adobe Creative Cloud and Adobe Acrobat® Pro.
Tags : 
adobe, adobe creative cloud, software, software deployment, enterprise agreement, license management, document security, compliance, collaboration, productivity, file management, pdf files, it management, document management, standardization
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.
Tags : 
adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment, license management, productivity, document security, compliance, industry regulations, file management, document management
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
As a valued customer, Adobe understands that your enterprise takes extensive advantage of our software, with anywhere from hundreds to thousands of licenses for a variety of Adobe solutions. With the Adobe Enterprise Term License Agreement (ETLA), we are now making the management and procurement of your Adobe software simpler, more flexible, and predictable.
Tags : 
adobe, adobe software, enterprise term licensing, etla, adobe solutions, software management, software compliance, tco, total cost of ownership, deployment, workflow, support, collaboration, information management, document management
    
Adobe
Published By: Workforce Software     Published Date: Jun 04, 2015
If you ask ten different people to define workforce management, you are likely to get ten different answers. Download to learn the answers.
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper provides a guide to large employers confronted by the time and attendance evaluations dilemma.
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software
Published By: Workforce Software     Published Date: Jun 04, 2015
In the case of a technology project seeking to hit its mark—from staying on budget to achieving the desired results—these failures can be traced back to shortcomings in how the human element of the project was managed. Download to learn more!
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software
Published By: Workforce Software     Published Date: Jun 04, 2015
If you ask ten different people to define workforce management, you are likely to get ten different answers. Download to get the answers!
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software
Published By: Puppet     Published Date: Mar 09, 2017
Configuration management can play an incredibly important role in IT security due to its basis in establishing and maintaining a known and consistent state of the physical and software elements at your organization’s disposal. This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including: • Creation of a Standard Operating Environment (SOE) • Reporting on and control of configuration drift • Enhanced change remediation • Insight into configuration knowledge • And more
Tags : 
    
Puppet
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This solution brief introduces the Smart Archive strategy from IBM, which is a comprehensive approach that combines IBM software, systems and service capabilities to help you drive down costs down and help ensure critical content is properly retained and protected.
Tags : 
ibm uk, ibm smart archive, ibm smart archive strategy, hardware, software, services, optimize, unify content, ingest, infrastructure, integrate, integration, compliance, analytics, ediscovery
    
Ogilvy - IBM UK
Published By: Workday DACH     Published Date: Mar 16, 2018
Erfahren Sie, warum ein neuer Ansatz nötig ist. Lesen Sie das Whitepaper “Ein neuer Ansatz für Audits und Kontrollen in Enterprise-Software” und erfahren Sie mehr über die sich verändernde Kontroll- und Governance-Landschaft. Lesen Sie, wie ein neu definierter Umgang mit Technologie zum Prüfstein für Aufgabentrennung, transparente Geschäftsprozesse und umfassende Audits werden kann. Das Whitepaper liefert Ihnen Antworten auf folgende Fragen: Inwiefern ändern sich die Anforderungen an moderne Finanzlösungen durch neue Kontroll- und Governance-Prozesse? Warum lässt sich mit traditionellen Lösungen und nachträglich hinzugefügten Funktionen zur Finanzkontrolle keine vollständige Compliance erreichen? Wie können technologische Innovationen dazu beitragen, das Finanzmanagement zu transformieren und die Kontrolle zu stärken?
Tags : 
    
Workday DACH
Published By: sumtotal     Published Date: Jul 08, 2014
A SumTotal paper on the benefits of being audit ready.
Tags : 
compliance software, integrated compliance, compliance ready hr solutions, talent expansion, sumtotal
    
sumtotal
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care. • How built-in data encryption keeps your PHI, DICOM studies safe • Why more security pros are concerned with user behavior than cloud tools • What your organization should know about the cloud and compliance
Tags : 
cloud security, electronic security, health care, security risk management, user authentication, cloud technology
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care. • How built-in data encryption keeps your PHI, DICOM studies safe • Why more security pros are concerned with user behavior than cloud tools • What your organization should know about the cloud and compliance
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : 
software provider, cloud service provider, gdpr
    
Mimecast
Published By: IBM     Published Date: Jun 16, 2015
This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.
Tags : 
data center, mobility, software defined environment, service optimization, business solutions, data center security, compliance, automating protective measures, virtualization
    
IBM
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.