Compliance Week
 

systems

Results 1 - 25 of 3883Sort Results By: Published Date | Title | Company Name
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: 3D Systems     Published Date: Aug 29, 2019
As a mold maker, you have probably experienced challenges with your current software including working with multiple solutions, inefficient mold design capabilities, poor technical support and many more. By switching to an integrated CAD/CAM software that’s dedicated for mold design and manufacturing, you can reduce delivery times, improve tool quality and gain a competitive advantage. Download this whitepaper to learn more about why you need an integrated solution, as well as the key elements to look for in a CAD/CAM solution.
Tags : 
cad cam, cad/cam, cad/cam software, cad software, cam software, mold, mold design, mold design software, injection molding, injection mold, injection mould, injection moulding, injection mold design, plastic mold design, cad cam software, milling, machining, tooling, electrode, cimatron
    
3D Systems
Published By: Kustomer     Published Date: Aug 27, 2019
One of Away’s core values is being “customer-obsessed”. But Away’s customer service agents had to constantly switch between systems to get the information they needed. Learn how Kustomer enabled them to deliver best-in-class customer experience, in real time.
Tags : 
“customer service”, “customer support”, “customer experience”, “customer service software”, “conversational commerce”, “streamlined customer support”, “streamlined customer service”, “streamlined customer experience”, “customer support optimization”, “customer service optimizations”, “customer experience optimization”, “personalized customer service”, “personalized customer support”, “personalized customer experience”, “customer support insights”, “customer service personalization”, “customer support personalization”, “customer experience personalization”
    
Kustomer
Published By: LogMeIn EMEA     Published Date: Oct 11, 2019
More and more organizations are looking to implement an intuitive remote support solution that gives support professionals on-demand productivity and provides quick resolutions to the ever-evolving set of pains that bedevil support teams today. But choosing the best remote support solution can be a challenge, especially as user expectations grow and systems become more complex and offer more options and features. This buyer’s guide can help you select the remote support tool that will work best for your organization. With more than 15 years of experience, LogMeIn delivers remote support solutions with key features and functionalities that make us the market leader in the remote support space.
Tags : 
    
LogMeIn EMEA
Published By: Kindred Hospital Rehabilitation Services     Published Date: Aug 26, 2019
Research has demonstrated enhanced technology can improve communication between patients, families and care providers, improve motivation, and has the potential to effect better outcomes and higher levels of patient satisfaction. Additionally, better technology also makes the workplace more appealing to employees. With the investment and complexity involved, how can health systems utilize technology in the most efficient and effective ways to drive business results?
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: SAP Concur     Published Date: Sep 25, 2019
"Whether companies are expanding to sell into new markets or working with overseas suppliers, today’s CEOs are focused on driving profitable growth. But growth makes everything complex. Complexity manifests in many forms such as new industry and country regulations, ever-evolving tax requirements, and language differences. Finance and IT leaders play critical role in helping CEOs overcome barriers and grow the business. In this new SAP Concur ebook Scaling Travel, Expense, and Invoice Management Growth, we discuss how CFO and CIO collaboration can help deploy intelligent, scalable systems to manage core financial functions and drive business growth as an Intelligent Enterprise. Download the ebook to learn more."
Tags : 
    
SAP Concur
Published By: SAP Concur     Published Date: Sep 25, 2019
"Finance and IT leaders play critical role in helping CEOs overcome barriers and grow the business. In this new SAP Concur ebook Scaling Travel, Expense, and Invoice Management Growth, we discuss how CFO and CIO collaboration can help deploy intelligent, scalable systems to manage core financial functions and drive business growth as an Intelligent Enterprise. Download the ebook to learn more."
Tags : 
    
SAP Concur
Published By: BeyondTrust     Published Date: Sep 24, 2019
HOW TO USE THIS BUYER’S GUIDE Today, privileges are built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, robotic automation processes, and more. Cybercriminals covet privileges/privileged access because it can expedite access to an organization’s most sensitive targets. With privileged credentials and access in their clutches, a cyberattacker or piece of malware essentially becomes an “insider”.
Tags : 
    
BeyondTrust
Published By: Oracle     Published Date: Sep 25, 2019
Research shows that legacy ERP 1.0 systems were not designed for usability and insight. More than three quarters of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans 1. These systems lack modern best-practice capabilities needed to compete and grow. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. Oracle’s goal is to help you navigate your own journey to modernization by sharing the knowledge we’ve gained working with many thousands of customers using both legacy and modern ERP systems. To that end, we’ve crafted this handbook outlining the fundamental characteristics that define modern ERP.
Tags : 
    
Oracle
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Published By: BehavioSec     Published Date: Oct 04, 2019
A Global 2000 bank was evaluating new methods of authentication for their digital clients to protect accounts under constant attack by malware and fraudsters. In evaluating behavior biometric vendors, they selected BehavioSec, for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
    
BehavioSec
Published By: BehavioSec     Published Date: Oct 04, 2019
A consortium of Global 2000 companies founded a joint authentication service provider to keep up with innovation at competitive Fintech companies. The new provider developed a mobile authentication app to maintain a high degree of mobile security without losing customers to UX-focused Fintech companies. As peer-to-peer (P2P) transactions grew rapidly, so did the false rejections and need for manual review. In evaluating security vendors for a more cohesive and frictionless solution, the provider selected BehavioSec for its enterprise grade capabilities to be deployed on-premise and integrate with existing legacy risk management systems.
Tags : 
    
BehavioSec
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Aug 02, 2019
A perfect storm of legislation, market dynamics, and increasingly sophisticated fraud strategies requires you to be proactive in detecting fraud quicker and more effectively. TIBCO’s Fraud Management Platform allows you to meet ever-increasing requirements faster than traditional in-house development, easier than off-the-shelf systems, and with more control because you’re in charge of priorities, not a vendor. All this is achieved using a single engine that can combine traditional rules with newer predictive analytics models. In this webinar you will learn: Why a fraud management platform is necessary How to gain an understanding of the components of a fraud management platform The benefits of implementing a fraud management platform How the TIBCO platform has helped other companies Unable to attend live? We got you. Register anyway and receive the recording after the event.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
First Citizens Bank & Trust Company is a chartered commercial bank offering a complete line of financial services. With over 200 point-to-point applications and disparate systems, the bank needed a way to reduce its applications portfolio and streamline integration among systems, including fast integration of systems from newly acquired banks. First Citizens turned to TIBCO ActiveMatrix BusinessWorks™ and TIBCO® Messaging for their simplicity and ability to quickly get IT processes up and running. With standard services, this transformation resulted in reduced deployment time—from eight months to 18 weeks, resulting in reduced credit card loan project time.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Aug 02, 2019
Fraud is one of the biggest overheads for most financial firms. Detecting crime is hard as fraud constantly evolves and the tools have to be able to evolve with it. Also one of the key areas of focus for most firms is to address the cost of handling the false positives that all automated systems generate. Watch this short demonstration to learn how TIBCO’s advanced analytics and data science solutions can help you overcome these challenges.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Aug 02, 2019
As an insurer, the challenges you face today are unprecedented. Siloed and heterogeneous existing systems make understanding what’s going on inside and outside your business difficult and costly. Your systems weren’t set up to take advantage of, or even handle, the volume, velocity, and variety of new data streaming in from the internet of things, sensors, wearables, telematics, weather, social media, and more. And they weren’t designed for heavy human interaction. Millennials demand immediate information and services across digital channels. Can your systems keep up?
Tags : 
    
TIBCO Software
Published By: Workday APAC     Published Date: Oct 07, 2019
Limited visibility into the talents of the workforce made HR transformation difficult. The company has been relying on multiple legacy systems as a result of multiple mergers and acquisitions, and multiple HR departments. That's where Workday comes in.
Tags : 
    
Workday APAC
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Continuous data availability is a key business continuity requirement for storage systems. It ensures protection against downtime in case of serious incidents or disasters and enables recovery to an operational state within a reasonably short period. To ensure continuous availability, storage solutions need to meet resiliency, recovery, and contingency requirements outlined by the organization.
Tags : 
    
Infinidat EMEA
Published By: Deltek     Published Date: Sep 26, 2019
Is your accounting system ready for the pre–award compliance audit? The accounting system review is a critical part of the pre–award survey. An inadequate system can delay the award of your contract. In this white paper, learn how by using the right accounting solution, you can reduce the risk of failing a pre–award audit. See why Government Contracting solutions from Deltek are among the very few where audit agencies presume compliance.
Tags : 
    
Deltek
Published By: Avetta     Published Date: Sep 17, 2019
A new NPR/Marist poll reveals that one in five jobs in the U.S. is held by a worker under contract. In fact, independent contractors could make up half of the entire workforce in the U.S. within the next decade. More and more organizations have begun to see contractors and suppliers as valuable business partners intrinsic to driving service and product innovation. For many companies, especially those operating in highly regulated industries, managing compliance in-house for all of these suppliers can be burdensome. But the cost of non-compliance — in the form of penalties, fines, productivity losses, settlement costs, and inefficiencies — is ruinous. This white paper will discuss: • The hidden costs of ignoring contractor management • Best practices towards holistic compliance and governance • The cost of different contractor management systems • How to get the highest ROI in your supply chain
Tags : 
    
Avetta
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.