Business of Information Technology  >   Business Management  >   Financial Management  >  

Financial Controls

RSS Feed    Add to Google    Add to My Yahoo!
Financial Controls Reports
 
Internal Controls Checklist for Corporate Data Protection and Compliance
sponsored by SearchSecurity.com
EGUIDE: In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
Posted: 11 May 2011 | Published: 09 May 2011

SearchSecurity.com

Overcoming the Challenges of Green Procurement through eProcurement
sponsored by Dimension Data Global
WHITE PAPER: This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program.
Posted: 30 Sep 2008 | Published: 26 Sep 2008

Dimension Data Global

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Oracle Database Vault
sponsored by Oracle Corporation
WHITE PAPER: Oracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat.
Posted: 15 Jul 2008 | Published: 01 Jun 2007

Oracle Corporation

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

Internal controls checklist for corporate data protection, compliance
sponsored by Novell, Inc.
EGUIDE: In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
Posted: 20 May 2011 | Published: 20 May 2011

Novell, Inc.

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Automating IT Security Audits to Demonstrate Compliance and Protect Data
sponsored by NetIQ Europe
WHITE PAPER: This white paper will tell you why IT security auditing is so important, the problems with the current approach to it, and how this product can help you automate your IT security audits.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

Top 12 Solutions in Financial Services
sponsored by Qlik
WHITE PAPER: This white paper looks at the top 12 solutions in today's financial services and how leading companies are utilizing visual analytics platforms. Find out how these solutions enable companies to better visualize and explore information, generate insight, and make better decisions.
Posted: 27 Dec 2016 | Published: 27 Dec 2016

Qlik

Complex Decisions Made Simple With Structure and Tools
sponsored by Global Knowledge
WHITE PAPER: Structuring techniques are the foundation of decision making. There are a number of techniques that will quickly and easily improve the analysis of virtually any problem. This white paper introduces some of the simplest and most effective structuring techniques including sorting, sequencing, placement, decision trees, and ranking.
Posted: 23 Dec 2016 | Published: 23 Dec 2016

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement