Business of Information Technology  >   Business Management  >   Financial Management  >   Auditing (Finance)  >  

Compliance (Finance)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Financial Compliance
DEFINITION: Compliance assesses whether actual money- raising and spending adhere to budget mandates set by a governing body.
Compliance (Finance)Reports
51 - 75 of 220 Matches Previous Page  | Next Page
Prevent Audit Problems with Effective Software Asset Management
sponsored by CDW Corporation
WHITE PAPER: This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

CDW Corporation

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Mom, Apple Pie, and the Office of Comptroller of the Currency
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Iron Mountain

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

Time to Get Rid of Big Paper
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief white paper highlights the banking industry's challenges with big paper – paper-based processes. Click now to see how digitizing some of this, traditionally, paper-based information can significantly improve customer relationships, aid regulatory compliance, and reduce risks of fraud.
Posted: 23 Jan 2014 | Published: 23 Jan 2014

Hewlett-Packard Company

Understanding Your PCI DSS Guidelines: Successes and Failures
sponsored by SearchSecurity.com
EGUIDE: This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

SearchSecurity.com

Top Monitoring Tools to Help Meet Regulatory Compliance Standards
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

SearchSecurity.com

Global profiles of the fraudster
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life.
Posted: 18 Sep 2013 | Published: 18 Sep 2013

SearchSecurity.com

Simplifying your Compliance Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Expenses, VAT and HMRC Compliance in a Nutshell
sponsored by Concur Technologies
WHITE PAPER: 75% of senior finance leaders say they wish they knew more about employee expenses and VAT reclaim. If you're a member of that overwhelming population, then this e-book is for you. Download now to get a crash course on the often-misunderstood concepts of VAT, compliance, HMRC policies, and expenses.
Posted: 01 Apr 2014 | Published: 30 Nov 2013

Concur Technologies

2013 Data Governance Survey Results
sponsored by Rand Secure Data
WHITE PAPER: Check out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.
Posted: 10 Mar 2014 | Published: 09 Oct 2013

Rand Secure Data

Compliance Guide: Ensure Social Media Compliance Across Your Organization
sponsored by Hootsuite
WHITE PAPER: Whether you're in the financial, medical, or other industry, there are unique regulatory and legal requirements to consider when interacting on social media. In this informative resource, learn how a social relationship platform can help you manage all the areas of social media compliance,
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Hootsuite

Case Study: Customer and Channel Insight Shapes Business Decisions
sponsored by Aria
CASE STUDY: This brief case study reveals how the right billing system enabled communications provider IMN to meet the needs of sales growth by supporting enterprise-wide billing and customer management.
Posted: 21 Nov 2013 | Published: 31 Dec 2012

Aria

Advances in Financial Disclosure and Risk Management
sponsored by IBM
WEBCAST: This on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.
Posted: 01 Nov 2013 | Premiered: Feb 5, 2013

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

File Archive: the next big thing?
sponsored by EMC Corporation
VIDEO: Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.
Posted: 08 Oct 2013 | Premiered: 08 Oct 2013

EMC Corporation

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.
51 - 75 of 220 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement