software compliance

Results 126 - 150 of 150Sort Results By: Published Date | Title | Company Name
By: Interactive Intelligence     Published Date: Feb 28, 2013
In this white paper series, on TCPA, from ARM.com, Latitude Software, and Interactive Intelligence, we asked collection industry attorneys David Kaminski and Anita Tolani to weight in on different aspects of technology for TCPA compliance.
Tags : tcpa compliance, telephone consumer protection act, compliance, interactive intelligence, enterprise applications
     Interactive Intelligence
By: NetSupport     Published Date: Nov 14, 2007
A majority of organizations do not have efficient ways of keeping track of their IT assets. That opens them up to dangers like system downtime from improperly implemented upgrades, potential licensing violations, poor customer service, overpaying on license fees and improper usage of software and the Internet by employees.
Tags : itam, asset management, spend management, cost savings, cost control, risk management, it management, software compliance
     NetSupport
By: CA ITAM     Published Date: Sep 09, 2008
Learn more on how improving the efficiency of software inventory and license management processes can provide you with a host of benefits, including improved IT governance through stronger software compliance standards and processes, automated correlation of relevant software products within an organization’s infrastructure to their respective licenses, and reduced costs in the areas of license procurement, use rights and software purchases.
Tags : 
     CA ITAM
By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : mobile apps, lifecycle approach, mobility services, bring-your-own-device, software
     HP - Enterprise
By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
     Enhancement Software
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
     Data Guard Systems, Inc
By: ScriptLogic     Published Date: Jan 11, 2012
Discover how the software helps achieve compliance with HIPAA standards, by giving IT administrators the power and control they need.
Tags : network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
     ScriptLogic
By: CDC Software     Published Date: Mar 02, 2011
A Practical Guide to Successfully Addressing Your Industry-Specific Requirements.
Tags : cdc software, erp application, process manufacturers, process manufacturing, compliance
     CDC Software
By: Workforce Software     Published Date: Nov 17, 2011
During the past several years, challenges such as increased regulatory pressures, employee fatigue and the ever-present need to reduce costs have all weighed heavily on most human resource organizations. As a result, HR and payroll professionals are playing an increasingly strategic role in the day-to-day operation of the business.
Tags : workforce management software, labor laws, california labor laws, change management, labor law compliance, time and attendance, time and attendance software, labor scheduling
     Workforce Software
By: ServiceNow     Published Date: Apr 19, 2013
Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges.
Tags : software, lincense, compliance, software asset management, service management
     ServiceNow
By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : asset management, technology, software asset management, compliance, mitigation of security risks, automation, security, it management
     ServiceNow
By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
     CDW
By: Optis     Published Date: Feb 26, 2013
Don’t let a lack of people data insight keep you from making the right business decisions. Learn how to become people data strategic and make your disparate data easy to understand, control and see.
Tags : people data management, disparate people data, analyze leave data, employment data, employee benfits data, workforce data management, integrated people data, people data strategy
     Optis
By: Optis     Published Date: Mar 07, 2013
Companies can realize significant savings with an automated absence management system. Download the Optis study to see how one company saved over $8 million by reducing lost time and getting a handle on leave.
Tags : people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy
     Optis
By: Optis     Published Date: Mar 07, 2013
When employee absences can make up 36 percent of an employer’s payroll, companies need to manage leave without adding costs. Find out how an integrated system will improve the bottom line and bring people data together.
Tags : people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy
     Optis
By: Optis     Published Date: Mar 07, 2013
Integrating leave and workforce data doesn’t have to be overly complicated. With the right plans, you can make the business case to implement an integrated database so you can get the people answers you need.
Tags : integrated workforce database,   implementing integrated systems,   data quality management,   value of integrated data,   people data management,   disparate people data,   analyze leave data,   employment data
     Optis
By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
     NETIQ
By: nettime solutions     Published Date: Jan 27, 2014
In this 30-minute webinar, time and attendance leader nettime solutions will first break down the essentials of the healthcare law, and then dive into the ACA software module available in stratustime that will simplify your ACA compliance and ensure your team can focus on the objectives that matter most in your organization.
Tags : time and attendance, cloud based time and attendance, aca compliance, affordable care act, saas time and attendance, workforce management, time off tracking, labor analytics
     nettime solutions
By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
     AlienVault
By: Workforce Software     Published Date: Nov 23, 2015
Access this white paper to learn how WorkForce Software’s EmpCenter suite meets the needs of global employers by automating organizational policies in alignment with national and local labor laws, as well as internal policies and union rules. You’ll learn: The challenges associated with overlapping and ambiguous labor regulations WorkForce Software’s approach to meeting the needs of global companies How WorkForce Software applies regulatory updates to the EmpCenter suite Which compliance regulations are covered in EmpCenter’s preconfigured solutions
Tags : labor compliance, multinational organizations, global employers, automation, labor laws, union rules, compliance, labor regulations
     Workforce Software
By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : security, big data, ibm, data protection
     IBM
By: SAP Concur     Published Date: Sep 25, 2019
"This IDC study reviews the competitive market for travel and expense management software in 2018. ""Industry leaders need to leverage advanced technologies to augment their capabilities for streamlining approvals, combating fraud, and maintaining compliance. Many of these technologies have taken large leaps forward in terms of usability and accuracy over the past 24 months,"" said Kevin M. Permenter, research manager for Enterprise Applications with IDC. There is no magic formula to rid the business of the burden of noncompliance. Download this report to find out how organisations can minimize risk for noncompliance and fraud amidst rapid international growth. "
Tags : 
     SAP Concur
Start   Previous    1 2 3 4 5 6     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com