Compliance And ValueWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Compliance And Value returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Data Protection and Privacy
 •   Treasury / Cash / Risk Management
 •   Identity Management/ User Provisioning
 •   Business Process Management (BPM)
 •   Security Policies
 •   Information Lifecycle Management
 •   Records Management

Related Searches
 •   Calendar Compliance And
 •   Compliance And Value Buys
 •   Compliance Employee
 •   Cycle Compliance
 •   Knowledge Compliance And
 •   Practices Compliance
 •   Records Compliance And
 •   Security Compliance And
 •   Trend Compliance
 •   View Compliance
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Delivering Enterprise Value with Oracle Governance, Risk & Compliance by Oracle Corporation

October 01, 2010 - (Free Research)
In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 30, 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI by RSA, The Security Division of EMC

June 01, 2009 - (Free Research)
This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. 
(WHITE PAPER) READ ABSTRACT |

Realizing Business Value with Identity and Access Management by IBM

September 25, 2009 - (Free Research)
Read this white paper to learn how IBM identity and access management solutions help organizations realize business value through a centralized, automated identity and access management infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk, and Compliance Management: Realizing the Value Of Cross-Enterprise Solutions by SAP America, Inc.

January 01, 2007 - (Free Research)
This paper explains SAP’s vision for a cross-enterprise GRC solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options. 
(WHITE PAPER) READ ABSTRACT |

Breaking Through the GRC Value Ceiling by EMC Corporation

September 30, 2013 - (Free Research)
This paper uses the RSA Archer GRC Reference Architecture to illustrate the value of operational technologies while acknowledging there is a ―Value Ceiling‖ for some niche operational tools, highlighting the missed opportunity for broader value. 
(WHITE PAPER) READ ABSTRACT |

CA Identity Lifecycle Management Solution Implementation: Implement an Effective Identity Lifecycle Management Solution by CA Technologies.

April 27, 2009 - (Free Research)
The CA Identity Lifecycle Management Solution Implementation deploys CA Identity Manager and/or CA Role & Compliance Manager in 60-day engagement phases for rapid time-to-value. Read this paper for details and learn if this solution is right for your company. 
(DATA SHEET) READ ABSTRACT |

Leveraging XBRL for Value in Organizations by ISACA

August 18, 2011 - (Free Research)
This white paper was developed jointly by ISACA and IFAC, providing guidance on how to leverage value from XBRL initiatives and compliance requirements, with examples and case studies included. 
(WHITE PAPER) READ ABSTRACT |

Driving Maximum Business Value From Records and Information Management by Iron Mountain

August 09, 2013 - (Free Research)
Check out this exclusive eBook to explore today's new era of records and information management. 
(EBOOK) READ ABSTRACT |

Practical Steps to Achieve and Maintain NERC Compliance by Tripwire, Inc.

December 08, 2008 - (Free Research)
This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals. 
(WHITE PAPER) READ ABSTRACT |

Develop Effective User Management to Demonstrate Compliance Efforts and Achieve Business Value by IBM

December 2008 - (Free Research)
Learn how IBM solutions can help organizations support compliance efforts and business requirements through user management solutions based on IBM Tivoli Identity Manager software and other IBM offerings. 
(WHITE PAPER) READ ABSTRACT |

5 Keys to a Successful Identity and Access Management Implementation by CA Technologies.

December 2007 - (Free Research)
An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation. 
(WHITE PAPER) READ ABSTRACT |

SAP® Support of the Healthecare Supply Chain's Ongoing Effort to Ensure Patient Safety and Drive Business Value by SAP AG

June 2009 - (Free Research)
The Center for Healthcare Supply Chain Research (formerly the HDMA Research & Education Foundation) recently published an important study concerning data management and data sharing in the healthcare supply chain. This whitepaper discusses the key conclusions of their study. 
(WHITE PAPER) READ ABSTRACT |

Business Value Analysis Study: Citizens Business Bank by Symantec Corporation

March 2009 - (Free Research)
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found. 
(WHITE PAPER) READ ABSTRACT |

Profiting from PCI Compliance by IBM

September 2007 - (Free Research)
This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards® by Advent Software, Inc

April 2010 - (Free Research)
Whether you are just starting a compliance program or need to fine-tune your existing process, this document will help you understand the steps involved in becoming GIPS compliant. It is not a substitute for the Standards themselves. It is designed to help you understand the value of compliance, what’s needed to achieve it, pitfalls to avoid. 
(WHITE PAPER)

Risk Management: Protect and Maximize Stakeholder Value by Oracle Corporation

February 2009 - (Free Research)
This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats. 
(WHITE PAPER) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

EMC VNXe Series Software Packs: Simple Data Protection and More by EMC Computer Systems (UK) Ltd.

February 2011 - (Free Research)
EMC has packaged unique and powerful add-on storage software into two attractively priced, easy-to-order software packs: Total Value Pack and Total Protection Pack available for the VNXe 3100 and VNXe 3300 respectively, ensuring maximum protection, security, and compliance. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Risk Management: Protect and Maximize Stakeholder Value by Oracle Corporation UK Ltd

February 2009 - (Free Research)
This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats. 
(WHITE PAPER) READ ABSTRACT |

Managing Big Data Using Sybase IQ VLDB Option by Sybase, an SAP company

December 2011 - (Free Research)
This brief white paper outlines information lifecycle management (ILM), a set of strategies for managing the growth, storage and retrieval of information over its useful life. Its goal is to ensure that frequently accessed data is returned as fast as possible, while controlling storage costs. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Business Process Management with Business Rules by FICO

May 2010 - (Free Research)
While a business process management system can save time and cut costs by governing process, it can’t decide what to do, given a particular circumstance. A business rules management system enables the right decisions to be made quickly. This white paper uses case studies to illustrate the value of adding rules to BPM. 
(WHITE PAPER) READ ABSTRACT |

How Web Security Improves Productivity and Compliance by Webroot

December 2012 - (Free Research)
This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more. 
(WHITE PAPER) READ ABSTRACT |

How Web Security Improves Productivity and Compliance by Webroot

December 2012 - (Free Research)
This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more. 
(WHITE PAPER) READ ABSTRACT |

Strengthening Governance, Risk, and Compliance in the Banking Industry by SAP America, Inc.

January 2011 - (Free Research)
Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. Read this report to learn more. (Economist Intelligence Unit, 2009) 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts