Business of Information Technology  >   Business Management  >   Financial Management  >  

Financial Controls

RSS Feed   
Financial Controls Reports
 
Internal Controls Checklist for Corporate Data Protection and Compliance
sponsored by SearchSecurity.com
EGUIDE: In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
Posted: 11 May 2011 | Published: 09 May 2011

SearchSecurity.com

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Overcoming the Challenges of Green Procurement through eProcurement
sponsored by Dimension Data Global
WHITE PAPER: This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program.
Posted: 30 Sep 2008 | Published: 26 Sep 2008

Dimension Data Global

Oracle Database Vault
sponsored by Oracle Corporation
WHITE PAPER: Oracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat.
Posted: 15 Jul 2008 | Published: 01 Jun 2007

Oracle Corporation

Internal controls checklist for corporate data protection, compliance
sponsored by Novell, Inc.
EGUIDE: In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
Posted: 20 May 2011 | Published: 20 May 2011

Novell, Inc.

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

How America’s Largest Department Store Saved 1,500 Man Hours and Nearly $500k in Less Than a Year
sponsored by Ayehu
CASE STUDY: Despite the retail bankruptcy trend, the largest department store in America leveraged an automation platform to cut down 1,500 labor hours and save $500,000 in less than a year. Download this AI case study to see the 5 business outcomes of this AI platform implementation.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Ayehu

SAP Concur Empowers Organizations to Digitally Transform their Expense, Travel and Invoicing Process
sponsored by Concur Technologies
RESOURCE: How can SAP Concur help your organization transform their expense, travel, and invoicing processes? View this infographic from IDC to find out.
Posted: 17 Sep 2019 | Published: 31 Dec 2018

Concur Technologies

Creating the Self-Driving Service Desk
sponsored by Ayehu
WHITE PAPER: According to Gartner Research, by 2020 less than 30% of all service desk calls will be handled by a real person – because companies recognize the value in automation. Use this service desk automation whitepaper to learn 4 practical uses cases for self-service desks, and review 5 reasons many businesses are making the transition.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Ayehu
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement