auditing

Results 1 - 25 of 116Sort Results By: Published Date | Title | Company Name
Published By: Concur     Published Date: Aug 15, 2017
At Concur, we receive a lot of questions about the best way to audit expense claims. Often the approaches to audit vary greatly by industry and company culture. It doesn’t have to be confusing. In this report, we hope to provide a clear perspective that can help every business identify ways to improve their audit process.
Tags : 
reporting, configuration, auditing, email reminders, data, communication, concur, maxus
    
Concur
Published By: Absolute Software     Published Date: Nov 21, 2011
With increased visibility into computers on and off their network, Allina Hospitals was able to optimize security and comply with regulations.
Tags : 
auditing, audit, accuracy, allina hospitials, allina, optimize security, security, regulations
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Leonard Niebo, Director of IT for Brick Township Public Schools leads a discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs, and incidents of loss and theft.
Tags : 
school, education, budget, diversity, managing diversity, auditing, virtualization, cloud computing
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Working closely with Absolute Software Chicago Public Schools is managing over 100,000 PCs, Macs, and iOS 4 devices and have recovered over 350 stolen computers allowing them to invest in the future (versus replacement computers).
Tags : 
school, education, budget, diversity, managing diversity, auditing, virtualization, cloud computing
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security, virtualization, cloud computing, infrastructure
    
Absolute Software
Published By: mindSHIFT     Published Date: Nov 29, 2007
A millisecond of downtime can mean millions of dollars. Maintaining compliance while ensuring your firm has the required speed and uptime can be daunting. Learn what you can do with your email and instant messages to prepare for your next regulatory audit.
Tags : 
secure im, secure instant messaging, audit, security audit, auditing, compliance, email security, high availability
    
mindSHIFT
Published By: Red Hat     Published Date: Sep 25, 2014
As a strategic partner in your business, you face increasing demands from your line-of-business leaders for new functionality and advanced capabilities, which you must deliver with a constrained IT budget. What could you do to meet these expectations and add value to the business if you could contain costs, increase operational efficiency, and do more with less? You need to overcome several challenges. The cost of software licensing management is rising as a result of maintaining proprietary platforms or legacy technology, making it difficult to modernize your datacenter and migrate to more cost-effective solutions. You’re likely burdened by regulatory compliance mandates, which create enforcement, reporting, and auditing expenses. And, like 67% of IT organizations, your budget is probably shrinking. Red Hat can help. Red Hat® Enterprise Linux® gives you the high-value subscription model, built-in governance processes, and simplified migration path you need to aggressively lower your
Tags : 
increased demands, functionality, software licensing management, proprietary platforms, legacy technology, datacenter, it organization, it management
    
Red Hat
Published By: Epicor     Published Date: Apr 01, 2009
This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.
Tags : 
epicor, grc, governance risk and compliance, supply chain visibility, erp solutions, expense management, data auditing, it management
    
Epicor
Published By: GFI Software     Published Date: May 18, 2012
GFI LanGuard provides a complete network security overview with minimal administrative effort. Why use GFI LanGuard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching, security
    
GFI Software
Published By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
This paper lays out the challenges with complying with SOX and suggests a radical solution: build a self-service, automated IT control framework in which all the information required to verify compliance is available in a single reporting system.
Tags : 
compliance, sox, sox compliance, sarbox, sarbox compliance, audit, self audit, self auditing
    
Solidcore
Published By: Netwrix     Published Date: Oct 01, 2013
Who Accessed Your CEO’s Mailbox? Netwrix Free Trial
Tags : 
netwrix, free trial, financial data, sox, glba and hipaa, auditing, netwrix auditor, security
    
Netwrix
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
    
Centrify Corporation
Published By: Intacct Corporation     Published Date: Jun 18, 2014
In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!
Tags : 
intacct corporation, accounting and financial software, roi, auditing, networking, software development, it management, business technology
    
Intacct Corporation
Published By: McAfee     Published Date: Mar 07, 2013
McAfee recently bridged the MySQL security gap with a unique solution that combines an open source auditing plug-in with industry-leading database security modules — the McAfee MySQL Audit Plug-In.
Tags : 
securing mysql, mysql security, sql injections, mysql database, mysql audit plugin, cert, pci dss, glba
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley
    
McAfee
Published By: Rizepoint     Published Date: Feb 13, 2017
Consumers and other stakeholders increasingly want to know where their products come from and how they are produced. A successful Responsible Sourcing program strengthens the corporate brand by making it more predictive and adaptive to changing market needs and helping the company develop resilience, mitigate risk, improve efficiency, and better manage supplier relationships. Download this complimentary guide to read about key concepts and principles that apply to virtually any organization when managing Corporate's Responsible Sourcing guidelines, and ensuring franchisee compliance for protection of your brand and commitment.
Tags : 
    
Rizepoint
Published By: Rizepoint     Published Date: Feb 13, 2017
Download this white paper,Improving RTE Food Safety by Building a more Complete and Modern Safety Management System, and read about the food safety challenges of ready-to-eat and fresh prepared foods, and how technology plays a growing role in achieving active managerial control with crucial characteristics and capabilities required for a next-generation food safety auditing solution.
Tags : 
    
Rizepoint
Published By: Rizepoint     Published Date: Feb 13, 2017
Every successful multi-unit food service or hospitality organization understands the importance of consistent audits and recognizes the essential function they provide. Today, thousands of businesses—from giant multi-national chains to small family-owned businesses—depend on regular internal and third-party audits to monitor, control, and manage everything from sanitation and food safety regulations to internal facility standards and brand consistency.
Tags : 
    
Rizepoint
Published By: Rizepoint     Published Date: Feb 13, 2017
At the most fundamental level, your company’s brand is the central, defining promise you make to your customers—and the sum of every transaction, impression, and experience they have with your business. So in a very practical sense, the strength of your brand is directly connected to how consistently you keep those promises—day in and day out—across all of your locations or properties.
Tags : 
    
Rizepoint
Published By: Dell Software     Published Date: Jul 25, 2012
Customization is the toughest part of maintaining an environment that keeps users productive. You have to make every desktop, whether physical or virtual, exactly right for each user without crushing IT administration resources that are already stretched to the limit.Quest Workspacetm Desktop Authority ®-part of Quest's User Workspace Management solution-gives you a single console to configure, manage, secure and support each user's unique workspace-including the most targeted mix possible of resources, security requirements, applications, peripherals and even Outlook settings-wherever that user logs in. Desktop Authority complements traditional desktop management-focused on software deployment and asset tracking-with true user environment management for companies of all sizes and all infrastructures.
Tags : 
desktop management, environment management, desktop authority, microsoft, web-based management, expertassist, user environment configuration, device security
    
Dell Software
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.