RSS feed Get our RSS feed

News by Topic

fines

Results 101 - 125 of 221Sort Results By: Published Date | Title | Company Name
By: Delta Risk     Published Date: Jan 03, 2017
This white paper takes an extensive look at the regulatory and legal obligations providers must uphold to avoid costly fines, compromise of PHI, reputational damage, and potential litigation. Download now!
Tags : 
     Delta Risk
By: VMware     Published Date: Nov 07, 2016
This 3-page trend brief discusses the IT challenges of digital business, and how CIOs need to improve the delivery of IT to meet business needs. The brief defines cloud management platform, including Day 1/Day 2 capabilities for an advanced platform.
Tags : 
     VMware
By: Balihoo     Published Date: May 28, 2010
One of the major challenges facing manufacturers' marketing teams in their efforts to make reseller co-op marketing more effective is at the very heart of what defines the century-old co-op marketing concept -- the coordination and execution of programs and financial transactions across two separate organizations. Today, when the manufacturer is working with hundreds if not thousands of different resellers, the scale and breadth of the effort can be overwhelming. However breakthroughs are not only possible today,but quite achievable by applying specialized and fully integrated technology solutions, bringing co-op marketing management into the modern age.
Tags : co-op marketing, co-op advertising, reseller marketing, other
     Balihoo
By: IBM     Published Date: May 12, 2008
Managing compliance is a huge challenge for companies, straining IT resources needed to meet service level agreements. To overcome these challenges, IT must support the objectives of your business. This white paper describes how IBM Service Management does just that. It defines and monitors IT governance and compliance management in a repeatable manner across businesses of any size.
Tags : service, service management, sla, service level, ibm, ibm g&rm, ibm grm, compliance
     IBM
By: IBM     Published Date: Jul 10, 2009
With the economy in constant fluctuation, this white paper is especially timely. “Enhancing your infrastructure in an uncertain economy to support your SOA business initiatives” defines the challenges facing IT executives, and outlines actions they can take now to cut costs, increase productivity and get more out of existing IT investments.
Tags : soa, ibm, cost cutting, service oriented architecture, roi, return on investment, plug and play, real time data
     IBM
By: Progress Software Corporation CEP     Published Date: Oct 23, 2009
IDC Report: Complex Event Processing Opportunity Analysis and Assessment of Key Products Read this excerpt of the 2009 IDC study by Maureen Fleming and Jeff Silverstein looking at complex event processing. The excerpt includes IDC opinion on the market for CEP, what defines CEP and independently profiles Progress Apama, which was ranked "Top CEP Innovator" in the report.
Tags : progress software, idc, complex event processing, business intelligence, cep, mom
     Progress Software Corporation CEP
By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware
     NeoSpire Managed Hosting
By: GoToMeeting     Published Date: Oct 08, 2013
Are you an Extreme Leader? Do you aspire to be one? The Extreme Leader doesn't just meet the existing standards; she or he defines higher ones. This handbook draws upon lessons from The Radical Leap Re-Energized by leadership expert Steve Farber, offering tips for taking your leadership to the next level.
Tags : yankee group, pim bilderbeek, leadership, daily, handbook, productivity, communication, collaboration
     GoToMeeting
By: SAS     Published Date: Aug 03, 2016
Failing to contain financial crime hits banks with the double impact of crime-related losses and fines imposed by regulators and law enforcement agencies. Depending on the magnitude of a bank’s failure to stem financial crime, fines can run into hundreds of millions of dollars – and even higher in exceptional cases. More importantly, institutions are keen to protect their brand from association with transnational organized-crime rings and scandals related to corruption.
Tags : best practices, productivity, finance, financial crime, security
     SAS
By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester
     NetIQ
By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics
     NetIQ
By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
Designing and implementing an enterprise security plan can be a daunting task for any business. To help facilitate this endeavor NaviSite has developed a manageable process and checklist that can be used by enterprise security, compliance, and IT professionals as a framework for crafting a successful cloud computing security plan. It defines seven steps—sequentially—that have been tested and refined through NaviSite’s experiences helping hundreds of companies secure enterprise resources according to best practices. This plan enables organizations to gain the economic advantages of secure and compliant managed cloud services.
Tags : cloud, security, cloud computing, security plan, enterprise security
     Navisite- A Time Warner Cable Company
By: CDW     Published Date: Feb 24, 2015
Software piracy, whether accidental or malicious, is a problem for software vendors as these activities can directly affect the bottom line. Organizations that use software are affected as well. Along with rising software prices, they can face stiff fines and other costs for noncompliance with software licenses. This can come as a result of an audit that software vendors are more inclined to initiate in a lackluster economy. This white paper will discuss actions to take before, during and after an audit. As well as outline the best ways for the enterprise to remain compliant with software licenses.
Tags : software piracy, software vendors, audit, software licenses, software compliance, piracy misconceptions
     CDW
By: Sage     Published Date: Oct 17, 2013
Why are some companies thriving while others are struggling to stay in business? What is the distinctive difference between a good company and a truly great company? The answers to these questions can only be found when looking at what defines the company: its people. This extensive 17 page whitepaper by Sage discusses the many benefits of engaged employees, details the true costs behind employee replacement, and outlines steps to ensure a much better work environment to optimize your return on employees.
Tags : employee engagement, employee happiness, productivity, workplace management, talent, investment
     Sage
By: Sage     Published Date: Oct 14, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : sage, compliance, workforce, fines, reporting, mandates
     Sage
By: Sage     Published Date: Nov 23, 2015
Learn how to protect yourself and your organization from government scrutiny, noncompliance penalties, or expensive employee lawsuits. Sage created this guide to help you stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : compliance, noncompliance, employer compliance, hr manager, employment laws
     Sage
By: RingCentral     Published Date: Mar 21, 2014
This IDC white paper examines cloud-based communications as a service and defines and explores the emerging iCaaS segment. It also discusses the benefits of implementing a cloud-based iCaaS solution.
Tags : ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
     RingCentral
By: Simplivity     Published Date: Jul 02, 2015
ActualTech Media and SimpliVity have partnered to create a new report that presents data from surveyed IT professionals and their experiences with hyperconverged infrastructure. The report defines Hyperconvergence and outlines the future of the industry.
Tags : hyperconvergence, robo, market report, storage, disaster recovery, operational efficiency, high it costs, data protection
     Simplivity
By: Dell EMC     Published Date: May 12, 2016
XtremIO gives you unmatched efficiencies for all database workloads. A scale-out database storage platform that consolidates and accelerates everything. Supercharge production, dev/test, and BI/analytics workflows with incredible data reduction and copy data management services. You get incredible and predictable scale-out performance with a low total cost of ownership.
Tags : xtremio, all-flash array, agility, application landscapes, data management services, scale-out performance
     Dell EMC
By: Avaya     Published Date: Jun 15, 2016
How the industry’s first holistic software-defined networking architecture fulfills the promise of SDN The Avaya SDN Fx™ architecture defines a solutions framework that enables customers to reap the benefits of network simplicity, reliability, and virtualization. Read how a simple solution solves big problems in this white paper.
Tags : networking, best practices, software, technology, productivity
     Avaya
By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance
Tags : security, technology, best practices, information technology, business analytics, business management
     LogRhythm
By: LogRhythm     Published Date: Apr 04, 2017
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.
Tags : 
     LogRhythm
By: Insight     Published Date: Dec 05, 2017
Will you evolve with the digital workforce? New-era workers are breaking the confines of their cubicles. That means businesses need to offer more digital work experiences — but the path isn’t always clear. We’re rallying three workplace technology experts to discuss how to orchestrate a modern device and cloud application rollout to empower your anywhere, anytime workforce. Today’s solution landscape is ripe with effective ways to help organizations empower modern workers. In this exclusive Livestream, you’ll learn the true value of modern devices and cloud applications — and how to orchestrate every moving part of a connected workforce without compromising security.riving workplace disruption? This Livestream recording will reveal: -What’s driving workplace disruption? -What real-world tactics can we implement to conquer disruption? -How can we leverage the cloud? -What are the biggest challenges IT faces when modernizing?
Tags : technology, forum, workforce, workers, business, security
     Insight
By: CradlePoint     Published Date: May 17, 2016
Healthcare IT Enabled by 4G LTE It’s time for healthcare providers to change the way they think about their services. No longer is healthcare simply about healing sick patients in the confines of the office or hospital. Growing competition driven by changes in public policy and consumer expectations mean that healthcare organizations must find ways to meet patients where they want and need healthcare the most—which requires extending care, and connectivity, beyond the boundaries of traditional healthcare facilities.
Tags : 
     CradlePoint
By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
     Centrify Corporation
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics