RSS feed Get our RSS feed

News by Topic

compliance

Results 1 - 25 of 1581Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
     Proofpoint
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
The digital, connected world is fundamentally changing the dynamics of the financial services industry. Consumers expect anytime and anywhere access with a customer experience commensurate with the Internet world, while fintech start-ups disrupt established value chains, driving a need to deliver faster innovation. This is creating tremendous pressure on the network, with escalating demands for performance and agility, while cost control and compliance imperatives remain as dominant as ever. This paper looks at optimal strategies for CIOs and CTOs, exploring how the future network needs to evolve to both drive operational effectiveness and enable business change, while assessing key investment and strategic considerations for equipping the network for the digital financial institution.
Tags : security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
     Juniper APAC DWA Cloud Leads July 2017
By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer service—along with the reputation of your brand—and boost your bottom line. But, as with many areas of business, the rules of the game are changing. What’s changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chains—all these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job.
Tags : cloud, supply chain management, scm, cloud computing
     Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
By: Mimecast     Published Date: Apr 25, 2017
Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance.
Tags : 
     Mimecast
By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care: How built-in data encryption keeps your PHI, DICOM studies safe Why more security pros are concerned with user behavior than cloud tools What your organization should know about the cloud and compliance
Tags : healthcare, data security, cloud software, privacy, patient care
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: Protect your data and reputation while meeting clients’ cybersecurity expectations Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing Comply with regulations and ethics codes
Tags : accounting, risk reduction, encryption, compliance, data security
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : finance, data encryption, cyber security, data efficiency, client expectations
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : data security, mobility, content collaboration, security efficiency, productivity
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: Avoid costly security missteps, leaks, and hacks. Protect your firm's reputation while meeting clients' cyber security expectations. Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, encryption, efficiency, compliance
     Citrix ShareFile
By: NAVEX Global     Published Date: Jul 17, 2017
Establishing a culture of integrity, ethics and respect is the number one priority for companies in 2017, according to a new report. In common with the 2015 report, getting an organisation's culture right is the main objective for compliance professionals in the year ahead, with 85 per cent of respondents saying it is one of their three main goals. However despite this, only 32 per cent of firms indicated that they are planning to undertake a culture or ethics assessment in the next twelve months. In addition, workplace behaviour was rated as the lowest area of risk receiving attention by stakeholders (29 per cent). Download the full report for additional stats on board level reporting, increasing compliance programme awareness and satisfaction with third party risk management.
Tags : measuring programme effectiveness, insufficient staff, managing regulations, lack of tools, budget issues, programme reporting
     NAVEX Global
By: NAVEX Global     Published Date: Jul 17, 2017
Screening your third party vendors and business partners for risk can be a challenging process. With so many different factors to consider, where do you even begin? We've developed our Anti-Bribery and Corruption Risk Assessment Checklist so you can streamline your compliance risk assessment processes and ensure each potential risk is addressed. Keep up with changing European laws and regulations with this checklist.
Tags : training, communication, culture, controls, oversight, policies, risk assessment
     NAVEX Global
By: NAVEX Global     Published Date: Jul 17, 2017
Download your Definitive Guide to Policy Management for real-world examples of companies avoiding litigation and penalties by having a well thought out compliance programme. Organisations that approach policy management strategically and exercise ruthless discipline with respect to their policies yield massive returns in organisational alignment, corporate culture, and ultimately their bottom-line results. And when incidents occur or regulators come knocking, you'll be prepared.
Tags : policies, enforcement, perception, culture, templates, meta-policy, properties, links
     NAVEX Global
By: Concur     Published Date: Aug 15, 2017
As travel and expense (T&E) management solutions have improved, the expectations of the end user are higher than ever before. Business travellers want a seamless experience and you want better visibility, increased compliance, and reduced spend. Our research identified two types of people – Leaders and Followers. Leaders have most of their spending under management, have increased compliance to company policies and approve expense reports more quickly. Followers are lagging behind.
Tags : platform, travel, payment, expense management, mobile app, corporate budgets, trip cost visibility, enterprise
     Concur
By: Concur     Published Date: Aug 15, 2017
At Concur, we receive a lot of questions about the best way to audit expense claims. Often the approaches to audit vary greatly by industry and company culture. It doesn’t have to be confusing. In this report, we hope to provide a clear perspective that can help every business identify ways to improve their audit process.
Tags : reporting, configuration, auditing, email reminders, data, communication, concur, maxus
     Concur
By: Comcast     Published Date: Jul 10, 2017
Healthcare technologies have proven their worth for practitioners and facilities in increasing the quality of patient care while saving time and streamlining operations. In some cases, however, the benefits of these technologies are outweighed by their impact on the network, slowing network performance sometimes to the point of ineffectiveness.Software-defined networking can be the bridge to help healthcare providers update their networks and avoid disruption. SDN helps organizations save money on networking infrastructure, reduces the complexity of managing networks, enhances security through added intelligence and simplifies compliance, among other benefits.
Tags : healthcare, sdn, healthcare technology, patient care, technology, reducing costs, improve security, healthcare benefits
     Comcast
By: Mimecast     Published Date: Apr 18, 2017
"Your organization can’t survive without email. In turn, the data held within email is an invaluable resource for compliance, e-discovery and workflow efficiency purposes. And moving to the cloud involves its own set of challenges around preserving that content. It’s time to rethink archiving. Download our E-book, 5 Essentials for Cloud Archiving Success, to learn: - How to avoid common misconceptions about cloud email archiving - Ways to enable employee efficiency and productivity through archiving - Why every organization must be prepared for e-discovery and litigation "
Tags : cloud, cloud archiving, email archiving, litigation
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"With over 112 billion emails sent and received on a daily basis, email continues to be the dominant form of business communication. Organizations must formulate a strategy for not just storing email but meeting compliance requirements, responding to litigation requests and providing instant access to these important conservations. While this has traditionally been accomplished with on-premises technology, the cloud has transformed archiving by delivering new capabilities at lower costs. Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : email archiving, cloud, cloud based infrastructure, cyber security, cloud security
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Looking to achieve regulatory compliance? Legal risk mitigation? Information governance? Workflow efficiency imperatives? Download this white paper from Enterprise Management Associates (EMA) for a checklist for evaluating email archiving solutions. This white paper also provides insights offered by IT professionals about their experiences with Mimecast and the cost savings experienced."
Tags : email archiving, mimecast, risk mitigation, information governance
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance."
Tags : forrester, gdpr, organizational processes, security, compliance
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : gdpr, email, personal data, security, data protection
     Mimecast
By: HotSchedules (nFusion)     Published Date: Aug 14, 2017
Well-run restaurants go beyond just creating schedules and take the extra steps to optimize labor, manage compliance and engage with employees. Successful restaurant managers and operators take extra steps to manage labor, including mastering scheduling. In this ebook we will walk you through tried and true best practices so you are better prepared to: Improve Sales Performance and Guest Satisfaction Control Labor Costs Optimize Staff Productivity Attain Company Goals Reach Your Professional Goals
Tags : 
     HotSchedules (nFusion)
By: Kronos     Published Date: Jul 26, 2017
Learn about HCM strategies such as using mobile technology to optimize communication; offering flexible working hours for work-life balance; managing employee absences for stronger compliance, cost control, and employee well-being; and using analytics for workforce insights.
Tags : mobile technology, work life balance, cost control, employee satisfaction, workforce insights
     Kronos
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics