audits

Results 1 - 25 of 67Sort Results By: Published Date | Title | Company Name
Published By: AppZen     Published Date: Jun 17, 2019
Occupational fraud is not a small issue. On average, a company loses 5% of its revenues to employee financial fraud each year, with the annual median loss at $140,000 and over 20% of companies reporting losses of $1 million or more. The key to keeping a lid on this fraud is identifying the fraud before it takes too much of a bite out of the company’s bottom line, or even further, to put processes and controls in place that automatically audits, monitors, and accepts or rejects transactions that don’t fit an recognized pattern.
Tags : 
    
AppZen
Published By: Oracle     Published Date: May 20, 2019
Une équipe financière qui grandit déploie des efforts considérables pour élaborer des contrôles et des processus qui ne freinent pas l’activité, mais permettent de surveiller ses progrès et de la faire évoluer. Or les audits orientés sur la conformité peuvent donner une impression d’inutilité, comptetenu des heures et des coûts engagés. Définissons ce que l’audit doit être pour une entreprise en croissance et comment en tirer le meilleur parti.
Tags : 
    
Oracle
Published By: ServiceNow     Published Date: May 14, 2019
It’s nearly impossible to effectively manage software assets without first normalizing disparate software discovery data. This best practice guide will help you get the most out of software normalization process and showcase the benefits realized during software publisher audits and renewal discussions.
Tags : 
servicenow, software, asset, management, data, audits
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 13, 2019
It’s nearly impossible to effectively manage software assets without first normalizing disparate software discovery data. This best practice guide will help you get the most out of software normalization process and showcase the benefits realized during software publisher audits and renewal discussions.
Tags : 
    
ServiceNow
Published By: Domo APAC     Published Date: Mar 04, 2019
Cisco’s marketing team has invested massively in technology over the past two years. This $50 million investment in software has put Cisco at the leading edge of B2B technology marketing. 40 new applications have been put in place, creating one of the most sophisticated marketing technology stacks in the industry, resembling the more consumeroriented Amazon, Google, and Facebook. This investment has earned Cisco’s marketing team plaudits and several industry awards View Domo’s privacy policy
Tags : 
    
Domo APAC
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
    
SafetyCulture
Published By: Epicor     Published Date: Jul 10, 2018
In today’s competitive market, FFLs often have inadequate tools that are hindering their growth, or are often sold software rather than solutions to their ATF compliance needs—leaving them confused and less compliant than before. Fortunately, it just got easier to streamline compliance processes and keep your Bound Book up-to-date. Get the facts in a quick-reading guide from the FFL Operations experts at Orchid Advisors and the software experts at Epicor. Learn how firearms businesses like yours are using cloud technology to keep their bound book to date, making compliance tasks much simpler and more cost effective. • Why the ATF changed its rules in 2016 and how you take advantage of it • Practical tips for moving your Bound Book to the cloud, stress-free • Streamline business process and improve ATF Compliance
Tags : 
electronic bound book software, regulations, compliancy, bound book, firearms pos, atf audits, shooting sports software, a&d logging
    
Epicor
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: Amazon Web Services     Published Date: Apr 11, 2018
Effectively monitoring and managing cloud infrastructure configuration changes and performing on-going vulnerability analyses through forensics, troubleshooting, audits, and automation are key activities to help secure your AWS environment.
Tags : 
    
Amazon Web Services
Published By: Workday France     Published Date: Mar 08, 2018
Historiquement les notions de gouvernance, de conformité, de contrôle et d'audit n'ont été pensées qu'après coup dans les modules financiers des logiciels ERP classiques. Ce sujet a longtemps été ignoré à l'occasion de la conception, du développement et de l’évaluation des logiciels de gestion d’entreprise. Le contrôle n’est pas aussi urgent que le traitement des transactions, pas aussi visible que le reporting financier ou pas aussi passionnant que le décisionnel. Il vient donc souvent dans un second temps. De nos jours, la gouvernance est devenue centrale. C'est sur ce précepte que Workday a conçu ses solutions. Au début des logiciels de gestion, dans les années 80 et 90, le contrôle était loin d'être une priorité. Les lois Sarbanes-Oxley, Basel II et IFRS n’existaient pas encore et « l’audit hors logiciel » était monnaie courante. Les « gros ERP » ont résolu ce problème comme ils le pouvaient, en rachetant des technologies ou en créant des fonctionnalités qui ont été ensuite intégré
Tags : 
    
Workday France
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Partnering with Spectrum Enterprise sustains client loyalty by instilling confidence in how the bank operates, provides superior network service level agreements that ensure minimal downtime and assures smoother state and FDIC audits thanks to cybersecurity safeguards such as built-in redundancy and private network service.
Tags : 
    
Spectrum Enterprise
Published By: MineralTree     Published Date: Jan 23, 2018
By automating the accounts payable process, Moda Operandi is not dreading their 2018 audit. Audit trails are easy to search for and extracted. Gone are the days of missing documentation.
Tags : 
business payments, accounts payable, payment automation, invoice automation, accounting applications
    
MineralTree
Published By: NAVEX Global     Published Date: Jan 11, 2018
NAVEX Global recommande l’utilisation d'un logiciel (tel que le logiciel de gestion des incidents EthicsPoint™) pour bénéficier d'une approche cohérente de recueil de données et d’outils applicables à l’ensemble de l’entreprise pour gérer plusieurs programmes de signalement. Les utilisateurs sont ainsi en mesure d’identifier facilement les tendances concrètes, d’atténuer les risques et de gérer un programme efficace de gestion des incidents où qu’ils se trouvent, tout en restant ouverts aux audits et informés des évolutions constantes de leur environnement professionnel. Un système solide de gestion des incidents n’est pas seulement essentiel pour susciter l’implication des employés et développer un climat de confiance au sein d'une entreprise, c’est également une composante cruciale de protection des employés, de la réputation et de la santé financière de l’entreprise.
Tags : 
planification, mise en ceuvre, evaluation, ressources, supplementaires, navex
    
NAVEX Global
Published By: Concur ENT     Published Date: Nov 07, 2017
Concur’s Audit services provide a thorough, objective, third-party review without office politics or a strain on internal resources. Businesses have saved time and money by redirecting those resources into other valuable activities, while turning audits around efficiently and accurately. Visit concur.co.uk/expense-audit or call Features outlined in this report may differ between Standard 01628 645100 to learn more.
Tags : 
auditing, configuration, reporting, data, email reminders, communication, concur
    
Concur ENT
Published By: Sage People     Published Date: Nov 02, 2017
These are the end times for traditional enterprise resource planning (ERP) solutions. Overstatement? Not really—especially for growing businesses like yours. Old-school ERP systems are simply too slow, complex, and inflexible to keep up with today’s business climate. Think about your existing ERP. Does it support industry-specific best practices, ever-changing regulatory requirements, and emerging technologies such as social media, mobile, cloud, and analytics? If not, you could risk losing ground to your competitors as a result.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting
    
Sage People
Published By: Sage People     Published Date: Nov 02, 2017
Did you ever wonder what enterprise resource planning or ERP is and how it can help your business? Or perhaps you know a little about ERP but you’re not sure if you should opt for an on-premise or cloud solution and what to expect from your final choice. Don’t worry. If you’re a business owner, manager or director in a mid-sized or growing business and you’re confused about ERP, this guide will help you.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting
    
Sage People
Published By: Sage People     Published Date: Nov 02, 2017
Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester’s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting
    
Sage People
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits
    
Cisco
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits
    
CA Technologies
Published By: Rizepoint     Published Date: Feb 13, 2017
Every successful multi-unit food service or hospitality organization understands the importance of consistent audits and recognizes the essential function they provide. Today, thousands of businesses—from giant multi-national chains to small family-owned businesses—depend on regular internal and third-party audits to monitor, control, and manage everything from sanitation and food safety regulations to internal facility standards and brand consistency.
Tags : 
    
Rizepoint
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity, business intelligence, business management
    
Absolute Software
Published By: Black Duck Software     Published Date: May 18, 2016
Read this report to learn the results from our open source security audits: - How much open source is typically in use - How many commercial applications contain security vulnerabilities in open source - How many open source component vulnerabilities are in each application
Tags : 
black duck, open source, software, security, security report, enterprise applications
    
Black Duck Software
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking, software development
    
Venafi
Published By: Kaseya     Published Date: May 13, 2015
Turn management data into actionable business information that helps create operational efficiencies and demonstrate value.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data
    
Kaseya
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.