RSS feed Get our RSS feed

News by Topic

management policy

Results 1 - 25 of 111Sort Results By: Published Date | Title | Company Name
By: Jamf     Published Date: Aug 06, 2019
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
     Jamf
By: SAP Concur     Published Date: Aug 07, 2019
"Reworking an outdated invoice policy can be intimidating. Get a head start with this whitepaper, produced by Proformative and sponsored by SAP Concur. You'll get 9 tips for building an invoice policy and a template to help you create a vendor invoice and will take the pain out of accounts payable management. Once created and enforced, an effective accounts payable policy will: Reduce time spent on approving invoices Better store and retain important documents Make pulling documents for research, audit or litigation easier"
Tags : 
     SAP Concur
By: SAP Concur     Published Date: Aug 07, 2019
"Companies need to provide a seamless experience for their road warriors who are traversing the globe in search of new clients, attending conferences, exploring new business opportunities and checking on projects. The goal of automating the T&E function isn’t just to save the company time and money, although that is a significant consideration. With policies in place, companies can ensure that business travelers are adhering to allowances for meals, hotels and other travel-related expenses. Companies that establish clear policies for how employees can book and pay for travel — and which vendors to use — can negotiate discounts and rewards with hotels, rental car agencies and airlines. In addition to the financial benefits of an expense management policy, employee satisfaction is also at stake. Creating a realistic travel policy that is clear, simple and easily accessible makes employees happy. A quick and hassle-free travel expense management process reduces traveler stress, enabling
Tags : 
     SAP Concur
By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : corporate network, personal devices, smartphone, tablet, legacy networks, byod
     HPE
By: FICO     Published Date: Aug 27, 2012
This white paper provides a step-by-step guide to ensuring success with your business rules management project. You'll learn the components of a successful business rules management project.
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     FICO
By: Entrust Datacard     Published Date: May 10, 2017
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively.
Tags : certificate management, digital business, pki, datacard, certificate management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
     Entrust Datacard
By: TriNet     Published Date: Jul 28, 2015
How to keep the keepers and maintain optimal turnover levels.
Tags : employee retention management, turnover levels, employee performance management, effective retention policy, hr functions
     TriNet
By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
     Zscaler
By: SAS     Published Date: Apr 16, 2015
The framework presented here is a way to avoid data dysfunction via a coordinated and well-planned governance initiative. These initiatives require two elements related to the creation and management of data: • The business inputs to data strategy decisions via a policy development process. • The technology levers needed to monitor production data based on the policies. Collectively, data governance artifacts (policies, guiding principles and operating procedures) give notice to all stakeholders and let them know, “We value our data as an asset in this organization, and this is how we manage it.”
Tags : 
     SAS
By: Abacus Labs     Published Date: Jun 14, 2018
The purpose of expense reporting software is to streamline your team’s workflow for submitting and reviewing business expenditures. By implementing an expense management solution, you can decrease the time and costs associated with processing expenses and increase your visibility into the implications of business spend, while helping improve general expense policy compliance and reduce expense fraud.
Tags : reporting, software, expense, finance, business, management
     Abacus Labs
By: NAVEX Global     Published Date: Jul 17, 2017
Download your Definitive Guide to Policy Management for real-world examples of companies avoiding litigation and penalties by having a well thought out compliance programme. Organisations that approach policy management strategically and exercise ruthless discipline with respect to their policies yield massive returns in organisational alignment, corporate culture, and ultimately their bottom-line results. And when incidents occur or regulators come knocking, you'll be prepared.
Tags : policies, enforcement, perception, culture, templates, meta-policy, properties, links
     NAVEX Global
By: CA WA     Published Date: May 12, 2008
Although typically thought of as an artifact of legacy computing, batch processes remain vital to today’s real-time enterprises. Behind the real time systems that power the real time enterprise, such as customer order fulfillment, account management, supply chain scheduling and optimization, or financial trading systems, are regularly-updated back office business systems. Over the years, batch technology has evolved from script-based automation to rules or policy-driven workload automation.
Tags : bpa, business process automation, soa, service oriented, workload automation, ca wa
     CA WA
By: NAVEX Global     Published Date: Jul 02, 2015
This report reveals practical recommendations from NAVEX Global experts that you need to make better decisions and take your policy management program to the next level.
Tags : navex global, policy management, policy management program, ethics and compliance, compliance, ethics, automated policy management software
     NAVEX Global
By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : messagelabs, email retention, archiving, risk, compliance
     MessageLabs
By: Good Technology Corporation     Published Date: Mar 19, 2013
Learn how to tackle the challenges of supporting BYOD programs in this on-demand webcast with Good Technology professional services consultants.
Tags : bring your own device, byod security, byod management, byod solutions, byod policy, byod trend, byod challenges, byod strategy
     Good Technology Corporation
By: NAVEX Global     Published Date: Sep 05, 2013
Explore four important facets of managing social media use by employees in your organization. Craft a best practice social media policy and navigate the legal landscape, train employees, address retaliation, and take a comprehensive approach. View examples of organizations that have successfully and creatively implemented social media guidelines.
Tags : social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
     NAVEX Global
By: Jamf     Published Date: Nov 05, 2018
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
     Jamf
By: XpertHR     Published Date: Oct 23, 2017
Employers should take note that a significant number of legal changes on the federal, state and local level have or will have a substantial impact on workplace policies and employee handbooks. It is critical for an employer to review, amend and properly update its handbook for 2018 so that it reflects the latest legal requirements. An employer also needs to understand what the legal update is and how it affects the workplace, as well as develop and implement policies, practices and procedures to remain compliant. Further, an employer may need to update its employee handbook based on internal changes (e.g., benefits, performance management). Below are relevant XpertHR resources, including Employee Handbook policy statements, to assist an employer in updating its own handbook.
Tags : 
     XpertHR
By: NAVEX Global     Published Date: Apr 20, 2018
Learn how to effectively and efficiently manage your organisation's employee handbook, code of conduct and other important documents. This guide gives organisations of all sizes insight on how to optimize policy and procedure management with real-world examples, helpful tips, and research. What you’ll learn: - Best Practices on How to Plan, Implement, and Measure your programme - Eleven Commandments of Policy Formatting and Writing - 20 Questions for Prioritising Policy Development Efforts - Pros & Cons of Various Distribution Methods - Assessment Questions to Evaluate Your Current Document Management Strategy - Build versus Buy Considerations
Tags : 
     NAVEX Global
By: NAVEX Global     Published Date: Jul 31, 2018
Compare your policy and procedure management programme to industry standards and identify where your programme needs improvements. Read the top challenges policy management programmes face in 2018 and expert recommendations on meeting those challenges. What You'll Learn: Where organisations are struggling with policy management What the best organisations do to create efficiency in their programme How organisations are starting to comply with new SFO and DOJ guidance How automated systems improve results and satisfaction for policy management
Tags : 
     NAVEX Global
By: Absolute Software     Published Date: Sep 09, 2011
This white paper provides guidelines to help you create policies for computer energy consumption that are sensible and easy to enforce.
Tags : absolute, power saving policy, management, roi, energy savings, policy metrics, network management
     Absolute Software
By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage
     NetApp
By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware
     Skillsoft
By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor
     McAfee
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics