audits

Results 1 - 25 of 67Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity, business intelligence, business management
    
Absolute Software
Published By: Amazon Web Services     Published Date: Apr 11, 2018
Effectively monitoring and managing cloud infrastructure configuration changes and performing on-going vulnerability analyses through forensics, troubleshooting, audits, and automation are key activities to help secure your AWS environment.
Tags : 
    
Amazon Web Services
Published By: AppZen     Published Date: Jun 17, 2019
Occupational fraud is not a small issue. On average, a company loses 5% of its revenues to employee financial fraud each year, with the annual median loss at $140,000 and over 20% of companies reporting losses of $1 million or more. The key to keeping a lid on this fraud is identifying the fraud before it takes too much of a bite out of the companys bottom line, or even further, to put processes and controls in place that automatically audits, monitors, and accepts or rejects transactions that dont fit an recognized pattern.
Tags : 
    
AppZen
Published By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : 
idm, identity management, user monitoring, identityview, enterpriseview, logs, siem, event logs
    
ArcSight
Published By: ArcSight     Published Date: Mar 04, 2009
This whitepaper will outline the drivers for log management as well as their underlying challenges and drive towards a common set of requirements for evaluation of log management tools.
Tags : 
log management, logs, siem, arcsight logger, event logs, security, compliance, regulatory audits
    
ArcSight
Published By: Asure Software     Published Date: Nov 06, 2013
The white paper will discuss in greater detail what the cost associated with audits, corporate hackers, tax issues, payroll disputes, and employee lawsuits can be. We will then explore how time management software can resolve the problem, and what the next steps to implementing this technology are.
Tags : 
data security, data storage, payroll security, payroll data, workforce management solutions, workforce management software, time and labor management
    
Asure Software
Published By: Auditrax     Published Date: Jun 28, 2011
Benefits of Procurement Audits for Private Equity Firms & Portfolio Companies
Tags : 
accounts payable audit, cash flow, recovery audit, procurement audit, financial audit, audit, accounts payable, business solutions
    
Auditrax
Published By: Avalara     Published Date: Jan 28, 2014
Sales tax compliance and the CFO: What automation means for risk management conveys why its time C-level executives should take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and dont know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance and, more importantly what the accounting and finance professionals in the trenches are doing to safeguard their organizations from potential audits and accounting pitfalls. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices
    
Avalara
Published By: Black Duck Software     Published Date: May 18, 2016
Read this report to learn the results from our open source security audits: - How much open source is typically in use - How many commercial applications contain security vulnerabilities in open source - How many open source component vulnerabilities are in each application
Tags : 
black duck, open source, software, security, security report, enterprise applications
    
Black Duck Software
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Todays IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainableits dangerous. Delays in responding to security threats and compliance issues can have devastating effects: Security breaches Failed audits Financial losses Loss of customers and reputation Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance
    
Bocada
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depthproviding broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accountslike the UNIX and Linux root and Microsoft Windows administratorthis system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: CDW     Published Date: Jul 18, 2013
Understanding The Complications of Software License Management
Tags : 
cdw. software, software management, software audits, it organizations, license compliance, security, software development
    
CDW
Published By: CDW     Published Date: Nov 05, 2013
A software audit can be either an internal process, executed by an in-house team or consultants, or it can be done externally, by the vendor. If done internally, the results are used by the organization to check what software is installed across the network, how the software is being used and how this usage compares with the entitlements owned by the organization. If you havent already been auditedget ready; its not a case of if, but when.
Tags : 
cdw solutions, software audit, software publisher, end user license agreement, eula, asset management, conduct self-audits, desktop deployment
    
CDW
Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment mobile devices, cloud computing and virtualization requires new approaches to familiar challenges. Whats more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management, software testing
    
CDW
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeedor even survivethey must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits
    
Cisco
Published By: Concur ENT     Published Date: Nov 07, 2017
Concurs Audit services provide a thorough, objective, third-party review without office politics or a strain on internal resources. Businesses have saved time and money by redirecting those resources into other valuable activities, while turning audits around efficiently and accurately. Visit concur.co.uk/expense-audit or call Features outlined in this report may differ between Standard 01628 645100 to learn more.
Tags : 
auditing, configuration, reporting, data, email reminders, communication, concur
    
Concur ENT
Published By: DataMotion     Published Date: Oct 01, 2008
With HIPAA audits now randomized, you must be prepared for them every day. And with state regulations requiring compliance-breach reporting, you must become your own auditor. HIPAA is the Health Insurance Portability and Accountability Act, the 1996 federal regulation that mandated health-data privacy.This regulation requires compliance by all insurers and health care providers, including physician’s offices, hospitals, health plans, employers, public health authorities, life insurers, clearinghouses, billing agencies, information systems vendors, service organizations, and universities.But that’s not all.
Tags : 
certifiedmail technology, act's privacy rule, health insurance portability, accountability act, security, it management, data management, firewalls
    
DataMotion
Published By: Domo APAC     Published Date: Mar 04, 2019
Ciscos marketing team has invested massively in technology over the past two years. This $50 million investment in software has put Cisco at the leading edge of B2B technology marketing. 40 new applications have been put in place, creating one of the most sophisticated marketing technology stacks in the industry, resembling the more consumeroriented Amazon, Google, and Facebook. This investment has earned Ciscos marketing team plaudits and several industry awards View Domos privacy policy
Tags : 
    
Domo APAC
Published By: Eaton     Published Date: Jun 01, 2012
For all their advantages, virtualization and cloud computing bring some unique challenges: higher power demands per server and enclosure, more critical applications residing on each server, and a need for greater visibility into power conditions.
Tags : 
virtualization, cloud computing, resellers, power distribution, power protection, business continuity, power monitoring, power audits
    
Eaton
Published By: Ecora Software     Published Date: Aug 15, 2007
Better preparation means better results – Learn how to prepare for an audit; how to develop a self-audit process; how to develop a security template; and much more.
Tags : 
security audit, audit, auditing, vulnerability assessment, vulnerability management, infrastructure, patch, patch management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Do you need to implement corporate policies regarding security and confidential health information? Learn: How to use IT documentation to prepare for and pass Security audits; What IT data is critical for Security Standards; What is the difference between Security and IT Audits. You can implement a sustainable HIPAA Security Standard – Read this paper to learn more.
Tags : 
hipaa, hippa, health care, healthcare, compliance, privacy, consumer data, data privacy
    
Ecora Software
Published By: Epicor     Published Date: Jul 10, 2018
In todays competitive market, FFLs often have inadequate tools that are hindering their growth, or are often sold software rather than solutions to their ATF compliance needsleaving them confused and less compliant than before. Fortunately, it just got easier to streamline compliance processes and keep your Bound Book up-to-date. Get the facts in a quick-reading guide from the FFL Operations experts at Orchid Advisors and the software experts at Epicor. Learn how firearms businesses like yours are using cloud technology to keep their bound book to date, making compliance tasks much simpler and more cost effective. Why the ATF changed its rules in 2016 and how you take advantage of it Practical tips for moving your Bound Book to the cloud, stress-free Streamline business process and improve ATF Compliance
Tags : 
electronic bound book software, regulations, compliancy, bound book, firearms pos, atf audits, shooting sports software, a&d logging
    
Epicor
Published By: HP     Published Date: May 05, 2014
Discover, map, and optimize assets to streamline global data centers, speed audits, slash costs: Using HPs Business Services Management portfolio, GE Capital has realized an $8 million annual savings through data center consolidation. Find out how they addressed their key IT challenges of data center simplification, asset management and capacity management. GE Capital is the financial services unit of the American conglomerate General Electric. GE Capital provides commercial lending and leasing, as well as a range of financial services.
Tags : 
bsm, business service management, ddma, discovery and dependency mapping, it operations group, it performance suite, it case study, ge capital
    
HP
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.