RSS feed Get our RSS feed

News by Topic

pay

Results 151 - 175 of 1215Sort Results By: Published Date | Title | Company Name
By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: OpenText     Published Date: Mar 02, 2017
Watch the video to learn how Procure-to-Pay (P2P) solutions automate B2B processes to help you gain better visibility into transaction lifecycles, improve efficiency, and increase the speed and accuracy of order, shipping, and invoice processing.
Tags : supply chain, b2b, procure-to-pay, shipping, invoicing
     OpenText
By: SAS     Published Date: Oct 18, 2017
Health insurers have long been plagued by issues of fraud, waste, abuse, error and corruption. Taking an enterprise approach to payment integrity – one that combines advanced data management and sophisticated analytics – can help payers detect and prevent fraud; effect positive change in how providers, employees and patients behave; and substantially reduce health care costs. Payers can achieve better outcomes when software support for the core disciplines of payment integrity run on a single platform.
Tags : 
     SAS
By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
     SAS
By: NetIQ     Published Date: Dec 23, 2010
The Payment Card Industry Data Security Standard (PCI DSS) establishes standard requirements protecting cardholder information. It applies to all entities that store, process, or transmit cardholder data, such as retail merchants, payment processors, and banks.
Tags : netiq, roi, pci dss, compliance
     NetIQ
By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn why Mr. and Mrs. Evans decided to go with a more flexible and cost effective alternative for their human resources system, AsureForceT Time & Labor Management Solutions.
Tags : workforce management, time and attendance automation, human resources, payroll solutions
     Asure Software
By: Ephesoft     Published Date: Apr 04, 2018
All accounting procedures, especially remittance and AR/AP processing, are critical to any organization’s financial well-being. Manual data entry of invoices is an inefficient, expensive, labor intensive and often errorprone process. Slow and mistake-laden document processing lengthens payment cycles, reduces staff productivity, adds late payment penalties and causes missed early payment discounts
Tags : 
     Ephesoft
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager
     IBM
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
     Trend Micro, Inc.
By: CA Technologies     Published Date: Aug 26, 2016
Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.
Tags : 
     CA Technologies
By: Adobe     Published Date: Apr 13, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes. Learn how organizations of all sizes in all industries around the world are suffering from what we call the “document disconnect.” Learn how this is causing significant delays and errors across critical business functions such as sales contracting and quoting, procurement, talent acquisition, and onboarding. Download this white paper to learn more.
Tags : adobe, talent acquisition, sales contracting, sales quoting, document disconnect
     Adobe
By: Adobe     Published Date: Aug 11, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : adobe, enterprise, mobile, security, saas, document management, cloud, website development
     Adobe
By: Adobe     Published Date: Nov 10, 2015
Download this white paper to hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : adobe, information technology, data management, business technology, document disconnect, sales management, contracts, e-signatures
     Adobe
By: GFI Software     Published Date: Mar 21, 2011
This white paper examines the necessary requirements to adhere to PCI DSS, the implications of non-compliance as well as how effective event log management and network vulnerability management play a key role in achieving compliance.
Tags : gfi, pci dss, credit card, event log management, network vulnerability management, compliance
     GFI Software
By: Ademero     Published Date: Oct 04, 2010
Managing accounts payable is a common practice in every commercial establishment. Whether you deal with goods or provide services, materials and supplies have to be purchased to conduct ordinary business.
Tags : document management, paper capture, paper scanning, workflow management, paperless office, document storage, automated workflow, retention policies
     Ademero
By: Adobe     Published Date: Mar 07, 2013
Our eighth Digital Intelligence Briefing, in association with Econsultancy highlights key digital marketing trends for 2013, and outlines the challenges and opportunities which organisations are (or should be) paying close attention to this year.
Tags : digital marketing trends, adobe, social media engagement, targeting and personalisation, mobile optimisation
     Adobe
By: EMC Corporation     Published Date: Aug 05, 2014
Roland Cloutier, CISO of ADP, describes how the largest single payer in the US tax system leverages RSA Security Analytics as the foundation of their Trusted Platform Security Initiative.
Tags : case study, adp, best practices, security analytics, rsa, trusted platform security initiative, security
     EMC Corporation
By: ZirMed     Published Date: Jun 28, 2013
Advanced Medical Imaging (AMI) offers a full range of diagnostic imaging and intervention services in the metro Denver, Colorado area. In an effort to create a more proactive patient collection process they turned to ZirMed. Learn how AMI was able to increase point-of-care collections by estimating patient responsibility and collecting a portion of payment before service.
Tags : medical imaging, radiologic services, ami, diagnostic imaging, intervention services, radiologist, claims management
     ZirMed
By: IBM     Published Date: May 26, 2017
Business executives and managers at business-to-business (B2B) enterprises care about time, money, competitive advantage, customer loyalty and growth. Few pay much attention to the vital IT infrastructure that supports transactions and collaboration with trading partners—though that B2B backbone directly affects performance and profitability. In fact, just 26 percent of business managers view B2B integration as a competitive differentiator, according to a study for IBM by Vanson Bourne, a research consultancy. As a result, many enterprises continue to utilize manual and error-prone emails, faxes and file transfers for B2B transactions. Reliance on complex, brittle and antiquated systems to exchange critical data impacts time to market, cost-efficiency and satisfaction across suppliers and end-customers. Modernization of B2B integration in recent years has moved forward in fits and starts, often undermined by competing priorities and misalignment between business and IT managers.
Tags : b2b integration, customer loyalty, ibm, customer growth
     IBM
By: Availity     Published Date: Aug 08, 2013
Adventist Health System was troubled by inconsistent billing practices and disparate systems across seven central billing offices. Find out how they reduced time-to-payment by 17 percent -- bringing days in accounts receivable to an all-time low -- by standardizing processes and improving workflow with RealMed (now known as Availity Revenue Cycle Management).
Tags : accounts receivable, revenue cycle, revenue cycle management, billing practices, claim denial, electronic claim submission, cbo, blue cross and blue shield
     Availity
By: iCompass Technologies     Published Date: Feb 06, 2015
You know every tax dollar counts: The post-recession drop in funding coupled with mounting financial commitments and legislative demands for improved access to information leave no choice but to make operations more efficient. Agenda automation software eliminates manual tasks associated with creating, distributing, and publishing agendas, reduces the prep time (by as much as 50% or more) and associated costs of meetings while introducing a flexibility that makes tight deadlines easier to manage. The impact is far reaching, from improved transparency to freeing up staff time to work on other priorities. It not only pays for itself in paper savings, it brings money back into the budget—from $300 to $1000 per meeting, depending on the size of the organization. Learn more about how easy it can be to automate your meeting agendas, and what you can get back as a result.
Tags : agenda management, meeting management, meeting management software, records management, records management software, paperless document management, local government transparency, agenda automation
     iCompass Technologies
By: Iovation     Published Date: Aug 02, 2019
Aite Group’s second Payment Services Directive (PSD2) Research Report, commissioned by iovation, a TransUnion Company, provides an in-depth analysis of how those in the payment services and e-commerce market should prepare to handle the new strong customer authentication (SCA) requirements under PSD2. See the results of the actual market status in Europe regarding the main changes that PSD2 will bring to the e-commerce payments market. This complimentary, custom report, PSD2: Advent of the New Payments Market in Europe, will teach you what Aite Group concluded after interviewing 20 payments executives from European banks, other PSPs, merchants, payment networks and industry experts.
Tags : payment services directive, psd2 regulation
     Iovation
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic and Sungard Availability Services
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics