CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

hr compliance

Results 126 - 150 of 249Sort Results By: Published Date | Title | Company Name
Published By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance, security management, pci compliance
    
NETIQ
Published By: EVault     Published Date: Mar 21, 2014
Hier sind die vier bekanntesten Mythen zum Thema Cloud Backup und Recovery : 1. Es ist unmöglich die Datensicherheit in der Cloud zu gewährleisten. 2. Es lässt sich unmöglich kontrollieren, wer Zugriff auf die Cloud-Daten hat. 3. Cloud und Compliance-Themen sind nicht vereinbar. 4. Cloud Backup erlaubt keine schnelle Datenwiederherstellung. Erfahren Sie mehr zu diesen Themen und warum die Cloud nicht nur eine praktikable Option, sondern vielleicht sogar die beste ist. Füllen Sie einfach das Formular auf der rechten Seite aus und Ihr Whitepaper ist sofort auf dem Weg zu Ihnen.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
    
EVault
Published By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
Download the complimentary guidebook and learn how your organization can achieve this kind of return through optimized scheduling, ensured compliance, improved productivity and real-time data analysis.
Tags : 
sumtotal, workforce management, optimization, scheduling, compliance, productivity, data analysis, roi
    
SumTotal, a Skillsoft Company
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Microsoft     Published Date: Jul 20, 2018
Microsoft provides a solution to easily run small segments of code in the cloud with Azure Functions. Azure Functions provides solutions for processing data, integrating systems, and building simple APIs and microservices. The book starts with intermediate-level recipes on serverless computing along with some use cases on the benefits and key features of Azure Functions. Then, we'll deep dive into the core aspects of Azure Functions, such as the services it provides, how you can develop and write Azure Functions, and how to monitor and troubleshoot them. Moving on, you'll get practical recipes on integrating DevOps with Azure Functions, and providing continuous deployment with Visual Studio Team Services. The book also provides hands-on steps and tutorials based on real-world serverless use cases to guide you through configuring and setting up your serverless environments with ease. Finally, you'll see how to manage Azure Functions, providing enterprise-level security and compliance to
Tags : 
    
Microsoft
Published By: SAP Concur     Published Date: Aug 07, 2019
"Creating an expense policy can be a time-consuming process, but when you consider that almost 20% of T&E expenses fall outside of policy it makes sense to invest the time and effort. This template walks you through how to build a best-practice expense policy and also explains what each section should cover. In the template you will find: Explanations for each expense category in plain language Lists of common questions about expense policies, pitfalls 11 tips for creating a straight-forward policy that increases compliance Get started on your expense policy today."
Tags : 
    
SAP Concur
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
In this webcast, you will hear from an attorney specializing in Information Technology Law and a technology specialist who can help you sort through different solutions in the marketplace. You will learn how to adapt to the number of compliance regulations, data privacy laws, and court orders relating to electronic records.
Tags : 
it compliance, mainline information systems, information technology law, data privacy laws, government regulations, industry best practices, compliance
    
Mainline Information Systems
Published By: IBM     Published Date: Jun 16, 2009
Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.
Tags : 
pci dss, ibm, mmdg, payment card industry, assessment, design, deployment, management
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
Are untested Web applications putting your business at risk?
Tags : 
ibm, rational appscan, web application security, risk, threat, compliance, scan, fix
    
IBM
Published By: IBM     Published Date: Jun 16, 2009
Previously known as Watchfire AppScan, Rational® AppScan® Standard Edition V7.8 is a leading testing tool that scans and tests your Web applications for all common vulnerabilities. Download the trial to see how it automates the testing process so you can address problems early.
Tags : 
trial, appscan, watchfire, rational appscan, ibm, mmdg, testing, web application
    
IBM
Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati, application security
    
IBM
Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance
    
netForensics
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
    
netForensics
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations
    
HP Service Management
Published By: IBM     Published Date: May 31, 2012
The topic of security is now unquestionably a C-suite priority. An enterprise that delegates security matters solely to the CIO is compounding its risk factors. Organizations need to move toward a more systematic and proactive approach to addressing security threats and managing compliance requirements. Download the white paper to learn more.
Tags : 
ibm, cyber terrorism, digital age, c suite, security, technology, business technology, business
    
IBM
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log
    
Tripwire, Inc
Published By: SAS     Published Date: Jun 08, 2017
The underground economy is thriving, thanks in part to new technologies and business models such as digital currencies and online marketplaces for freelance services. SAS fraud specialists reveal how government agencies can uncover these activities – and the tax obligations not reported from them. A former head of compliance for the country’s fourth-largest state workers' comp program describes how a comprehensive analytics program found a tax gap of $718 million and was granted funding to double the team’s size without even asking.
Tags : 
    
SAS
Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event, infrastructure, threat, threat detection
    
NetIQ
Published By: CenturyLink     Published Date: Nov 18, 2011
Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
Published By: CDW     Published Date: Apr 04, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW
Published By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection
    
Kaseya
Published By: NAVEX Global     Published Date: Mar 04, 2014
NAVEX Global commissioned an independent third party study of over 300 Ethics and Compliance senior level decision makers in compliance, HR, legal and risk roles across multiple industries, to understand how they are allocating their budgets and which activities are contributing to their program success. Download this spending research report to benchmark your program and use these key lessons from your peers to boost your ethics and compliance programs' effectiveness.
Tags : 
navex global, ethics and compliance, compliance function, organizational imperative, corporate management, compliance implementation, effective compliance, budget driver
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 04, 2014
The following six lessons will help you assess the focus of your compliance training program and formulate a strategy to tackle your biggest training risks.
Tags : 
navex global, compliance training, compliance implementation, effective compliance, risks, hr issues, human resources, compliance mix
    
NAVEX Global
Published By: NetApp     Published Date: Dec 12, 2013
Read how the NetApp Distributed Content Repository Solution is an efficient and risk-reducing active archive solution. Based on customer data, Forrester created a composite organization and concluded that the NetApp Distributed Content Repository delivered a three year ROI of 47% with a payback period of 1.3 months. The key benefits are reduced risk of losing unregulated archived data, denser storage, storage solution efficiency, and compliance for regulated data. The study also provides readers with a framework to do their own financial impact evaluation.
Tags : 
forrester, tei, economic impact, netapp, distributed content, repository solution, key benefits, reduce risk
    
NetApp
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search